Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C353P / ineo+ 353P Control Software version A02E0Y0-100_GM012
JISEC-CC-CRP-C0148
Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open platform (version 2.1).
ANSSI-CC-2007/08
name bizhub C353P / ineo+ 353P Control Software version A02E0Y0-100_GM012 Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open platform (version 2.1).
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 07.10.2013 01.09.2019
not_valid_before 26.03.2008 30.03.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2007_08en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2007_08en.pdf
manufacturer Konica Minolta Business Technologies, Inc Gemalto - Infineon Technologies AG
manufacturer_web https://www.konicaminolta.com/ https://www.gemalto.com/
security_level EAL3 ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2
dgst b41c1858c9432c46 ae320d6accec3536
heuristics/cert_id JISEC-CC-CRP-C0148 ANSSI-CC-2007/08
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 ATE_COV.2, ADV_RCR.1, AVA_VLA.4, ALC_TAT.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_FSP.2, ADV_IMP.2, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1, AVA_MSU.3
heuristics/extracted_versions - 2.1
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2007/19
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0269-2006
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2007/19
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0269-2006
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0148
  • certification_date: 01.03.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0148_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. network printer (bizhub C353P / ineo+ 353P). This product offers the protection from exposure of the highly confidential document stored in the printer, and aims at protecting the data which may be exposed against a user's intention. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions. - All area overwrite deletion function - HDD encryption key generation function - HDD verification function - Public box authentication function - Secure print authentication function - Trusted channel function - Administrator identification and authentication functions - Service engineer identification and authentication functions
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: Japanese name:bizhub C353P / ineo+ 353P Control Software English name:bizhub C353P / ineo+ 353P Control Software
    • product_type: IT Product (Data protection function in printer systems)
    • report_link: https://www.ipa.go.jp/en/security/c0148_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0148_est.pdf
    • toe_version: A02E0Y0-0100-GM0-12
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.10.2013
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0148_it7166.html
  • toe_overseas_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
pdf_data/report_filename c0148_erpt.pdf 2007_08en.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
    • cc_version: Common Criteria version 2.2
    • cert_id: DCSSI-2007/08
    • cert_item: Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open plate-form (version 2.1). Product reference
    • cert_item_version: T1000230 Usimera Protect 128K crypto on Infineon Code version: 2.1
    • cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]
    • developer: Gemalto 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG St.-Martin-Straße 76, 81609 München, Allemagne Sponsor Gemalto 6 rue de la verrerie, 92197 Meudon, France
    • match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
    • ref_protection_profiles: Java Card System Protection Profile Collection, V1.0b, Configuration Standard 2.2. Reference PP/0305
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0148-01: 1
    • Certification No. C0148: 1
  • DE:
    • BSI-DSZ-CC-0269-2006: 6
    • BSI-DSZ-CC-0269-2006-MA-02: 1
  • FR:
    • DCSSI-2007/08: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 3
    • EAL4+: 1
    • EAL5: 1
    • EAL5+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 and: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 1
    • ACM_SCP: 1
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
  • AGD:
    • AGD_ADM: 1
    • AGD_USR: 1
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_CCA: 1
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 1
    • AVA_VLA: 1
    • AVA_VLA.4: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.BRING-OUT-STORAGE: 2
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 24
  • Infineon:
    • Infineon: 8
    • Infineon Technologies AG: 3
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/cipher_mode
  • CCM:
    • CCM: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 180-1: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • BSI:
    • AIS 34: 1
    • AIS31: 3
    • AIS34: 2
  • CC:
    • CCIMB-2004-01-001: 1
    • CCIMB-2004-01-002: 1
    • CCIMB-2004-01-003: 1
    • CCIMB-2004-01-004: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Hereinafter referred to as”printer”). This TOE offers the protection from exposure of the highly confidential document CRP-C0148-01 2 stored in the printer. Moreover, TOE can encrypt the image data written in HDD for: 1
pdf_data/report_metadata
  • /CreationDate: D:20080617154414+09'00'
  • /ModDate: D:20080617154414+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 218797
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
  • /Author: Mathieu Robert
  • /CreationDate: D:20070330160630+02'00'
  • /Creator: Acrobat PDFMaker 5.0 pour Word
  • /Keywords: CER/F/07.5
  • /ModDate: D:20070330160633+03'00'
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • /Subject: Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open plate-form ...
  • /Title: DCSSI-2007/08
  • pdf_file_size_bytes: 273691
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 17
pdf_data/st_filename c0148_est.pdf cible2007_08en.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1: 2
    • CC-2: 2
    • CC-3: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 6
    • EAL4: 1
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 3
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ACM:
    • ACM_AUT: 1
    • ACM_AUT.1: 9
    • ACM_CAP: 1
    • ACM_CAP.4: 19
    • ACM_SCP: 1
    • ACM_SCP.2: 5
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.2: 8
    • ADO_IGS: 1
    • ADO_IGS.1: 6
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.2: 10
    • ADV_HLD: 1
    • ADV_HLD.2: 14
    • ADV_IMP: 1
    • ADV_IMP.2: 12
    • ADV_LLD: 1
    • ADV_LLD.1: 15
    • ADV_RCR: 1
    • ADV_RCR.1: 5
    • ADV_SPM: 1
    • ADV_SPM.1: 9
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 12
    • AGD_USR: 1
    • AGD_USR.1: 10
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 11
    • ALC_LCD: 1
    • ALC_LCD.1: 7
    • ALC_TAT: 1
    • ALC_TAT.1: 8
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 6
    • ATE_DPT: 1
    • ATE_DPT.1: 5
    • ATE_FUN: 1
    • ATE_FUN.1: 10
    • ATE_IND: 1
    • ATE_IND.2: 8
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.3: 17
    • AVA_SOF: 8
    • AVA_SOF.1: 7
    • AVA_VLA: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 18
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 6
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 41
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 47
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ITC.1: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 65
    • FIA_AFL.1.1: 7
    • FIA_AFL.1.2: 7
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 14
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 58
    • FIA_SOS.1.1: 6
    • FIA_SOS.2: 11
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 22
    • FIA_UAU.2: 76
    • FIA_UAU.2.1: 5
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 2
    • FIA_UID: 3
    • FIA_UID.1: 21
    • FIA_UID.2: 34
    • FIA_UID.2.1: 4
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MOF.1: 136
    • FMT_MOF.1.1: 4
    • FMT_MSA: 5
    • FMT_MSA.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 86
    • FMT_MTD.1.1: 6
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 73
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_ITC.1: 2
    • FPT_RVM.1: 17
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP: 3
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 3
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 16
    • FCS_CKM.1: 3
    • FCS_CKM.2: 3
    • FCS_CKM.3: 3
    • FCS_CKM.4: 3
    • FCS_COP: 19
    • FCS_COP.1: 8
  • FDP:
    • FDP_ACC: 13
    • FDP_ACC.1: 2
    • FDP_ACC.2: 7
    • FDP_ACF: 14
    • FDP_ACF.1: 22
    • FDP_IFC: 8
    • FDP_IFC.1: 2
    • FDP_IFC.2: 4
    • FDP_IFF: 11
    • FDP_IFF.1: 18
    • FDP_IFF.2: 7
    • FDP_IFF.2.2: 1
    • FDP_IFF.2.7: 2
    • FDP_ITC: 2
    • FDP_ITC.2: 5
    • FDP_RIP: 18
    • FDP_RIP.1: 8
    • FDP_ROL: 2
    • FDP_ROL.1: 2
    • FDP_SDI: 3
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 2
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 2
    • FIA_ATD.1: 1
    • FIA_UID: 13
    • FIA_UID.1: 4
    • FIA_UID.2: 1
    • FIA_USB.1: 2
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 49
    • FMT_MSA.1: 14
    • FMT_MSA.2: 3
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 2
    • FMT_MTD.1: 1
    • FMT_MTD.3: 2
    • FMT_MTD.3.1: 1
    • FMT_REV: 2
    • FMT_REV.1: 2
    • FMT_SMF: 3
    • FMT_SMF.1: 1
    • FMT_SMR: 29
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
  • FPR:
    • FPR_UNO: 3
    • FPR_UNO.1: 4
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_AMT: 2
    • FPT_AMT.1: 1
    • FPT_FLS: 16
    • FPT_FLS.1: 6
    • FPT_ITT: 6
    • FPT_ITT.1: 1
    • FPT_ITT.3: 2
    • FPT_PHP: 3
    • FPT_PHP.3: 1
    • FPT_RCV: 10
    • FPT_RCV.3: 4
    • FPT_RCV.4: 1
    • FPT_RVM: 3
    • FPT_RVM.1: 3
    • FPT_SEP: 3
    • FPT_SEP.1: 3
    • FPT_TDC.1: 2
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 2
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT: 3
    • FRU_FLT.1: 1
    • FRU_RSA: 4
    • FRU_RSA.1: 2
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 3
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.CHECK-HDD: 4
    • O.CONFIG: 13
    • O.CRYPT-KEY: 6
    • O.OVERWRITE-ALL: 4
    • O.PUBLIC-BOX: 7
    • O.SECURE-PRINT: 5
    • O.TRUSTED-PASS: 5
  • OE:
    • OE.CRYPT: 5
    • OE.CRYPTO: 1
    • OE.FEED-BACK: 11
    • OE.LOCK-HDD: 4
    • OE.SESSION: 1
  • T:
    • T.ACCESS-NET-SETTING: 3
    • T.ACCESS-PUBLIC-BOX: 3
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 3
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-PRINTER: 3
  • A:
    • A.APPLET: 2
    • A.NATIVE: 3
    • A.NET-OP_KEY_MGT: 2
    • A.VERIFICATION: 2
  • D:
    • D.API_DATA: 2
    • D.APP_CODE: 2
    • D.APP_C_DATA: 2
    • D.APP_I_DATA: 2
    • D.AUTH-APPLI_ATTRIB: 2
    • D.AUTH-CRYPTO_ALGO: 3
    • D.AUTH-KEY_ATTRIB: 2
    • D.AUTH_CODE: 2
    • D.CRYPTO: 3
    • D.JCS_CODE: 2
    • D.JCS_DATA: 2
    • D.NET_ACCESS: 2
    • D.NET_AUTH_KEY: 3
    • D.PIN: 2
    • D.SEC_DATA: 2
  • O:
    • O.APPLET: 23
    • O.CODE_PCKG: 8
    • O.CODE_PKG: 6
    • O.JAVAOBJECT: 39
    • O.REMOTE_MTHD: 6
    • O.REMOTE_OBJ: 8
    • O.REMOTE_OBJECT: 1
    • O.RMI_SERVICE: 9
    • O.ROR: 10
  • OE:
    • OE.APPLET: 2
    • OE.DEVELOPMENT: 2
    • OE.KEY_MANAGEMENT: 2
    • OE.NATIVE: 1
    • OE.VERIFICATION: 2
  • OP:
    • OP.ARRAY_ACCESS: 3
    • OP.BYTECODE: 1
    • OP.CREATE: 5
    • OP.DELETE_APPLET: 3
    • OP.DELETE_PCKG: 2
    • OP.DELETE_PCKG_APPLET: 2
    • OP.GET_ROR: 3
    • OP.INSTANCE_FIELD: 3
    • OP.INVK_INTERFACE: 4
    • OP.INVK_VIRTUAL: 3
    • OP.INVOKE: 6
    • OP.JAVA: 4
    • OP.PUT: 3
    • OP.RECEIVE: 1
    • OP.RET_RORD: 2
    • OP.SEND: 1
    • OP.THROW: 3
    • OP.TYPE_ACCESS: 3
  • OSP:
    • OSP.NATIVE: 3
    • OSP.VERIFICATION: 2
  • OT:
    • OT.ACCOUNT_NET_ACCESS: 2
    • OT.ALARM: 2
    • OT.AUTH-ALGO_CONFID: 2
    • OT.AUTH-ALGO_EXEC: 2
    • OT.AUTH-ALGO_INTEG: 2
    • OT.AUTH-KEYS_CONFID: 2
    • OT.AUTH-KEYS_INTEG: 2
    • OT.CARD-MANAGEMENT: 2
    • OT.CIPHER: 3
    • OT.DELETION: 2
    • OT.FIREWALL: 2
    • OT.INSTALL: 2
    • OT.KEY-MNGT: 6
    • OT.LOAD: 2
    • OT.NATIVE: 5
    • OT.OBJ-DELETION: 2
    • OT.OPERATE: 2
    • OT.PIN-MNGT: 3
    • OT.REALLOCATION: 2
    • OT.REMOTE: 2
    • OT.RESOURCES: 2
    • OT.SCP: 7
    • OT.SHRD_VAR_CONFID: 2
    • OT.SHRD_VAR_INTEG: 2
    • OT.SID: 2
    • OT.TRANSACTION: 3
  • R:
    • R.JAVA: 21
  • T:
    • T.AUTH-ALGO_DISCLOSURE: 2
    • T.AUTH-ALGO_EXE: 2
    • T.AUTH-ALGO_MODIFICATION: 2
    • T.AUTH-DATA_DISCLOSURE: 2
    • T.AUTH-DATA_MODIFICATION: 2
    • T.CONFID-APPLI-DATA: 2
    • T.CONFID-JCS-CODE: 2
    • T.CONFID-JCS-DATA: 2
    • T.DELETION: 2
    • T.EXE-CODE: 4
    • T.EXE-CODE-REMOTE: 2
    • T.INSTALL: 2
    • T.INTEG-APPLI-CODE: 4
    • T.INTEG-APPLI-DATA: 4
    • T.INTEG-JCS-CODE: 2
    • T.INTEG-JCS-DATA: 2
    • T.NATIVE: 2
    • T.OBJ-DELETION: 2
    • T.PHYSICAL: 3
    • T.RESOURCES: 2
    • T.SID: 4
    • T.UNAUTH_NET_ACCESS: 2
pdf_data/st_keywords/vendor
  • Axalto:
    • Axalto: 188
  • Gemalto:
    • Gemalto: 10
  • Infineon:
    • Infineon: 8
    • Infineon Technologies AG: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • TDES: 11
    • DES:
      • DES: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault injection: 2
    • malfunction: 1
    • physical tampering: 2
  • SCA:
    • side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS PUB 197: 2
  • CC:
    • CCIMB-2004-01-001: 1
    • CCIMB-2004-01-002: 1
    • CCIMB-2004-01-003: 1
    • CCIMB-2004-01-004: 1
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 197: 2
    • FIPS 46-3: 2
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.1.1: 1
  • JavaCard:
    • Java Card 2.2: 2
    • Java Card 2.2.1: 1
    • Java Card 3.4.3: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 3
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 2
  • javacard:
    • javacard.framework: 2
    • javacard.framework.service: 1
  • javacardx:
    • javacardx.rmi: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the printer. Moreover, TOE can encrypt the image data written in HDD for the danger of: 1
pdf_data/st_metadata
  • /Author:
  • /Company:
  • /CreationDate: D:20080602193009+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20080602193041+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - 【C0148】bizhub353P_英文ST-106-080118_080530.doc
  • pdf_file_size_bytes: 641424
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 97
  • /Author: Sorin Aurel SPORNIC
  • /Category: CC evaluation
  • /Company: Axalto
  • /CreationDate: D:20070323143339+01'00'
  • /Creator: Acrobat PDFMaker 6.0 for Word
  • /ModDate: D:20070327163427+03'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /SourceModified: D:20070323133327
  • /Subject: Security Target for Usimera Protect
  • /Title: D1019540
  • /classification-date: 21/03/2007
  • /classification-version: Version 3.6.0
  • /security-level: AXLT-Public
  • pdf_file_size_bytes: 555904
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different