name |
TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J |
Infineon Smart Card IC (Security Controller) SLE66C168PE/m1530-a25, SLE66C84PE/m1538-a25, SLE66C44PE/m1539-a25 and SLE66C24PE/m1563-a25 with specific IC Dedicated Software |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
01.09.2016 |
01.09.2019 |
not_valid_before |
31.08.2011 |
30.09.2005 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0308_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0340a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0308_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0340b.pdf |
manufacturer |
KYOCERA MITA Corporation |
Infineon Technologies AG |
manufacturer_web |
https://www.kyoceramita.com/ |
https://www.infineon.com/ |
security_level |
EAL3 |
EAL5+, AVA_MSU.3, ALC_DVS.2, AVA_VLA.4 |
dgst |
bc7181356569d9c6 |
589dd89276aa354f |
heuristics/cert_id |
JISEC-CC-CRP-C0308 |
BSI-DSZ-CC-0340-2005 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:kyocera:taskalfa_3500i:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_5500i:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_4500i:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_ENV.1, ALC_LCD.2, ASE_INT.1, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ATE_DPT.2, AGD_ADM.1, ADV_INT.1, ADV_RCR.2, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, ADV_HLD.3, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ADV_SPM.3, ATE_IND.2, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1, AVA_MSU.3 |
heuristics/extracted_versions |
1.00 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0308
- certification_date: 01.08.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0308_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 3500i - TASKalfa 4500i - TASKalfa 5500i This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E)
- product_type: Data protection function in digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0308_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0308_est.pdf
- toe_version: V1.00J
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.09.2016
- supplier: KYOCERA MITA Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0308_it0326.html
- toe_japan_name: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0308_erpt.pdf |
0340a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0340-2005
- cert_item: Infineon Smart Card IC (Security Controller) SLE66C168PE/m1530-a25, SLE66C84PE/m1538-a25, SLE66C44PE/m1539-a25 and SLE66C24PE/m1563-a25 with specific IC Dedicated Software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0308-01: 1
- Certification No. C0308: 1
|
- DE:
- BSI-DSZ-CC-0266-2005: 2
- BSI-DSZ-CC-0322-2005: 3
- BSI-DSZ-CC-0340-2005: 26
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 10
- EAL5 augmented: 3
- EAL5+: 2
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 3
- ACM_SCP.3: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 2
- ADV_FSP.3: 1
- ADV_HLD: 2
- ADV_HLD.3: 1
- ADV_IMP: 2
- ADV_IMP.2: 1
- ADV_INT: 2
- ADV_INT.1: 1
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.2: 1
- ADV_SPM: 2
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 2
- ALC_TAT: 2
- ALC_TAT.2: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 4
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 5
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_COP.1: 1
- FCS_RND.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FPT_TST.2: 1
- FRU:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CE: 1
- A.LOCATION: 1
- A.NETWORK: 2
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 17
- Infineon Technologies: 2
- Infineon Technologies AG: 15
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 4
- Physical Probing: 1
- SPA: 1
- physical probing: 2
- side channel: 1
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
|
- BSI:
- AIS 25: 2
- AIS 26: 3
- AIS 31: 3
- AIS 32: 2
- AIS 34: 3
- AIS 36: 3
- AIS31: 1
- ISO:
- ISO/IEC 15408:1999: 1
- ISO/IEC15408: 1999: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 03.05, (confidential document) [12] Security & Chip Card ICs – SLE 66CxxxPE – Instruction Set, 07.04, (confidential document) [13: 1
- Card Ics SLE 66CxxxPE – Instruction Set and Special Function Registers – Quick Reference, 07.04, (confidential document) [14] Application Note, SLE66CxxS, SLE66CxxxP, Using the CRC, Version 03.01 [15] Application Note: 1
- SLE66C168PE/m1530-a25, SLE66C84PE/m1538-a25, SLE66C44PE/ m1539-a25, SLE66C24PE/m1563-a2 (confidential document) [9] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
- SLE66C168PE/m1530-a25, SLE66C84PE/m1538-a25, SLE66C44PE/m1539-a25, SLE66C24PE/ m1563-a2 (confidential document) [8] ETR-lite for composition, according to AIS 36, Version 2, 27. September 2005, for the Product: 1
- and Chipcard ICs, SLE66CxxxPE, MicroSlim Security Controller Family, Data Book, Version 07.05 (confidential document) [11] Security Programmers’ Manual, SLE66xxxP (Superslim) and SLE 66CxxxPE (Microslim) Controllers: 1
- resp. SLE66C24PE/m1563-a25, Version 1.1, 28. August 2005 (i.e. TOE Configuration List, confidential document) B-28 BSI-DSZ-CC-0340-2005 Certification Report C Excerpts from the Criteria CC Part 1: Caveats on: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20111017144607+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20111017144639+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 238454
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 29
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20050930082934Z
- /Creator: Acrobat PDFMaker 5.0 für Word
- /ModDate: D:20050930103308+02'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Subject: Certification
- /Title: Certification Report BSI-DSZ-CC-0340-2005
- pdf_file_size_bytes: 1069193
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 50
|
pdf_data/st_filename |
c0308_est.pdf |
0340b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 4
- EAL5: 4
- EAL5 augmented: 1
- EAL5+: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 1
- ACM_SCP: 3
- ACM_SCP.2: 1
- ACM_SCP.3: 5
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 5
- ADV_HLD.3: 3
- ADV_IMP.2: 3
- ADV_INT.1: 3
- ADV_LLD.1: 3
- ADV_RCR.2: 3
- ADV_SPM.1: 1
- ADV_SPM.3: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS.2: 4
- ALC_LCD.2: 1
- ALC_TAT.2: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_CCA.1: 2
- AVA_MSU.3: 3
- AVA_SOF: 4
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 1
- FCS_RND: 2
- FCS_RND.1: 4
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 8
- FDP_ITC.1: 12
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 11
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 3
- FDP_SDI.1: 17
- FDP_SDI.1.1: 1
- FDP_SDI.2: 15
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FPT:
- FPT_AMT.1: 4
- FPT_FLS.1: 5
- FPT_ITT.1: 3
- FPT_PHP.3: 7
- FPT_SEP.1: 6
- FPT_TDC.1: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.2: 26
- FPT_TST.2.1: 2
- FRU:
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CE: 3
- A.LOCATION: 4
- A.NETWORK: 4
- O:
- O.ENCRYPT: 4
- O.OVERWRITE: 5
- OE:
- OE.CE: 2
- OE.LOCATION: 2
- OE.NETWORK: 2
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 8
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 15
- malfunction: 3
- SCA:
- DPA: 4
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- ISO:
- ISO/IEC 7816: 2
- ISO/IEC 7816-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- single DES is out of scope of the evaluation: 1
- smart card applications, • data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation), • advanced security sensors and physical countermeasures (e.g. shielding), •: 1
|
pdf_data/st_metadata |
- /Author: KYOCERA MITA Corporation
- /CreationDate: D:20111007112509+09'00'
- /Creator: CubePDF
- /Keywords: Security Target
- /ModDate: D:20111007112514+09'00'
- /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
- /Subject:
- /Title: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) Japan Version Security Target
- pdf_file_size_bytes: 341566
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /Author: grans
- /CreationDate: D:20050912103548+02'00'
- /Creator: pdfFactory Pro www.pdffactory.com
- /Producer: pdfFactory Pro 2.38 (Windows XP Professional German)
- /Title: SLE66C168PE+Derivates_SecurityTarget_11
- pdf_file_size_bytes: 267321
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 48
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |