Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RICOH IM 9000/9000T/8000/7000J-2.00
JISEC-CC-CRP-C0804-01-2024
Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
BSI-DSZ-CC-1045-V2-2023
name RICOH IM 9000/9000T/8000/7000J-2.00 Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
category Multi-Function Devices Other Devices and Systems
scheme JP DE
not_valid_after 31.01.2029 03.03.2028
not_valid_before 31.01.2024 03.03.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0804_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045V2c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0804_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0804_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045V2b_pdf.pdf
manufacturer Ricoh Company, Ltd. Qualcomm Technologies Inc.
manufacturer_web https://www.ricoh.com/ https://www.qualcomm.com
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL4+, AVA_VAN.5
dgst bf6eacbf491bd984 ac18c15a88b4b1bd
heuristics/cert_id JISEC-CC-CRP-C0804-01-2024 BSI-DSZ-CC-1045-V2-2023
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ALC_TAT.1, ALC_CMS.4, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_DVS.2, ALC_CMC.4
heuristics/extracted_versions 2.00 1.1.2
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1045-2019
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1045-2019
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0804
  • certification_date: 01.01.2024
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0804
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pnj-att/c0804_eimg.pdf
    • certification_date: 31.01.2024
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc., Evaluation Center
    • expiration_date: 31.01.2029
    • product: RICOH IM 9000/9000T/8000/7000
    • product_type: Multifunction Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pnj-att/c0804_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pnj-att/c0804_est.pdf
    • toe_version: J-2.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.01.2029
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0804_it3851.html
  • toe_japan_name: RICOH IM 9000 / 9000T / 8000 / 7000 J-2.00
  • toe_overseas_link: None
  • toe_overseas_name: -----
  • category: System on a chip (SOC)
  • cert_id: BSI-DSZ-CC-1045-V2-2023
  • certification_date: 03.03.2023
  • enhanced:
    • applicant: Qualcomm Technologies Inc. 5775 Morehouse drive San Diego, CA 92121 USA
    • assurance_level: EAL4+; ALC_DVS.2, AVA_VAN.5
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1045V2c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 03.03.2023
    • description: The TOE is the “Qualcomm Secure Processor Unit SPU230 embedded in the SDM855 host SoC combined with a DDR in a PoP (Package on Package) configuration and its corresponding Software and associated documentation. The hardware is a hard macro (sub-unit of a System-on-Chip which is already synthesized, placed and routed, delivered as GDS file) and the special packaging. The TOE is integrated into the SDM855 SoC by the SoC integrator (Qualcomm). The firmware and software comprise the operating system of the Secure Processor Unit and the software API providing cryptographic services to SPU applications. The SPU applications can be developed by the SPU application developer using the software API. The TOE can be used for multiple applications that require a high level of security. Examples are as follows: User authentication and password storage, Content protection, Payment, Subscriber Identity Module (SIM), Storage and management of digital identities, Secure key storage, Root of trust, Storage of sensitive user data.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-1045-V2-2023 (Ausstellungsdatum / Certification Date 03.03.2023, gültig bis / valid until 02.03.2028) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificate', 'description': 'has been extended by additional cryptographic functions.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})]
    • evaluation_facility: T-Systems International GmbH atsec information security GmbH
    • expiration_date: 02.03.2028
    • product: Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
    • protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1045V2a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1045V2b_pdf.pdf?__blob=publicationFile&v=2
  • product: Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/System_on_a_Chip_SOC/1045.html
  • vendor: Qualcomm Technologies Inc.
heuristics/protection_profiles 43ce79b420f23a00 cf0f01bcd7be3e9c
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename c0804_eimg.pdf 1045V2c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0804-01-2024: 1
  • DE:
    • BSI-DSZ-CC-1045-V2-2023: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • Qualcomm:
    • Qualcomm: 2
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author:
  • /CreationDate: D:20240328140527+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20240328140702+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240328050510
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 236136
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Subject: Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
  • /Title: Certification Report BSI-DSZ-CC-1045-V2-2023
  • pdf_file_size_bytes: 289421
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0804_erpt.pdf 1045V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5 and ALC_DVS.2
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1045-V2-2023
    • cert_item: Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
    • cert_lab: BSI
    • developer: Qualcomm Technologies Inc
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0804-01-2024: 1
  • DE:
    • BSI-DSZ-CC-1045-2019: 3
    • BSI-DSZ-CC-1045-V2-2023: 17
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL 5: 4
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 3
    • T.FUNC: 2
    • T.PROT: 2
  • O:
    • O.C: 4
  • R:
    • R.O: 4
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 4
  • Qualcomm:
    • Qualcomm: 38
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • DeutscheTelekom:
    • Deutsche Telekom Security: 3
  • atsec:
    • atsec: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 3
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 1
      • HMAC-SHA-384: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 1
    • SHA2:
      • SHA-256: 6
      • SHA-384: 2
      • SHA-512: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 6
      • TLS 1.2: 3
      • TLS 1.3: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • NIST P-192: 2
    • NIST P-224: 2
    • NIST P-256: 2
    • NIST P-384: 2
    • NIST P-521: 2
    • P-192: 2
    • P-224: 2
    • P-256: 2
    • P-384: 2
    • P-521: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • Side-channel: 1
    • physical probing: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 3
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 1
    • AIS 37: 1
    • AIS 38: 1
  • FIPS:
    • FIPS 180-4: 2
    • FIPS 186-4: 3
    • FIPS 197: 5
    • FIPS 198-1: 1
    • FIPS186-4: 2
    • FIPS198-1: 1
    • FIPS46-3: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS#1: 3
  • RFC:
    • RFC3447: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 04th April 2019 (confidential document) [16] Configuration list for the TOE: Configuration List for the hardware platform, Qualcomm: 1
    • Application Programming Interface API, Qualcomm Technologies Inc., Rev. 4.6, August 26th, 2020 (confidential document) [12] Guidance documentation for the TOE: Secure Processor Unit (SPU) Anti-Replay Island (ARI: 1
    • Configuration list for the TOE: rom_v2_binaries.txt, 23.10.2018 (confidential document) [20] Configuration list for the TOE: Configuration list of the documentation for the hardware: 1
    • Inc., version 3,1; 11th April 2019 (SPU_3_1_config_list.txt (confidential document) [17] Configuration list for the TOE: Configuration list including the functional and verification: 1
    • Qualcomm Technologies Inc., Rev. AC, May 6th, 2021 (confidential document) [14] Configuration list for the TOE: Configuration List user guidance: 1
    • Revision J, Date: 14.01.2022, Qualcomm SPU230 Core Security Target, Qualcomm Technologies, Inc., (confidential document) [7] Evaluation Technical Report, Version 2.1, Date: 26.01.2023, Evaluation Technical Report -: 1
    • TOE_SW_Test_config_list_CC2_PHASE2.txt(confidential document) [23] Configuration list for the TOE: MCP Software configuration list: config_list_spu_100.txt: 1
    • Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100, Deutsche Telekom Security GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • for SM8150, Qualcomm Technologies Inc., Revision B, November, 2018 (confidential document) [13] Guidance documentation for the TOE: Qualcomm Secure Processing Unit, Enablement, 80-PF777-965: 1
    • list of the documentation for the software development process: ALC_CMC_Doc_config_list-5.2.pdf (confidential document) [25] Configuration list for the TOE: Site Security Documentation Configuration List: 1
    • of the hardware plat-form: TOE_HW_test_config_list.txt (confidential document) [18] Configuration list for the TOE: pbl_v2_config_list.txt, 22.03.2019 (confidential document: 1
    • process TOE_SW_HW_process_config_list-10.1.pdf (confidential document) [21] Configuration list for the TOE: Configuration list software specifications: 1
    • txt (confidential document) 25 / 29 Certification Report BSI-DSZ-CC-1045-V2-2023 C. Excerpts from the Criteria For the: 1
    • txt (confidential document) [22] Configuration list for the TOE: Configuration list functional and verification tests of: 1
    • v13.pdf, 09th December 2021 (confidential document) [15] Configuration list for the TOE: Configuration List hardware spec, TOE_HW_spec_config_list-4.0: 1
pdf_data/report_metadata
  • /Author:
  • /Company:
  • /CreationDate: D:20240328145542+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /Manager:
  • /ModDate: D:20240328145658+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240327021241
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 628579
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
pdf_data/st_filename c0804_est.pdf 1045V2b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 2
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ALC:
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 10
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 28
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_RIP: 1
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 24
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 25
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 18
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 26
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 32
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS.1: 4
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 62
    • FCS_CKM.1: 16
    • FCS_CKM.2: 3
    • FCS_CKM.4: 16
    • FCS_COP: 49
    • FCS_COP.1: 12
    • FCS_ITC.1: 13
    • FCS_ITC.2: 13
    • FCS_RNG.1: 3
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 2
    • FDP_ACC.2: 3
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 4
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ICT.1: 1
    • FDP_IFC.1: 5
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 1
    • FDP_ITC.1: 8
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 3
    • FDP_ITT.1.1: 1
    • FDP_RIP: 10
    • FDP_RIP.1: 2
    • FDP_SDA: 3
    • FDP_SDA.1: 12
    • FDP_SDA.1.1: 2
    • FDP_SDC.1: 11
    • FDP_SDC.1.1: 2
    • FDP_SDI: 2
    • FDP_SDI.2: 18
    • FDP_SDI.2.1: 3
    • FDP_SDI.2.2: 3
    • FDP_SDR: 3
    • FDP_SDR.1: 12
    • FDP_SDR.1.1: 2
  • FMT:
    • FMT_CMT: 2
    • FMT_CMT.1: 35
    • FMT_CMT.1.1: 7
    • FMT_LIM.1: 5
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 5
    • FMT_LIM.2.1: 1
    • FMT_MSA: 5
    • FMT_MSA.1: 2
    • FMT_MSA.3: 7
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 3
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 4
    • FRU_FLT.2.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 5
  • D:
    • D.CONF: 4
    • D.DOC: 19
    • D.FUNC: 13
    • D.PROT: 4
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 10
    • O.SOFTWARE: 9
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 4
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 20
  • T:
    • T.CONF: 10
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
  • O:
    • O.AES: 3
    • O.CMAC: 4
    • O.ECDH: 4
    • O.ECDSA: 4
    • O.HMAC: 4
    • O.KDF: 4
    • O.RND: 1
    • O.RSA_ENC: 4
    • O.RSA_SIGN: 4
    • O.SHA: 3
    • O.TDES: 3
  • T:
    • T.AUTH-APPLI-DATA: 3
    • T.AUTH-TSF-DATA: 3
    • T.CONFID-APPLI-: 1
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-TSF-CODE: 3
    • T.CONFID-TSF-DATA: 4
    • T.INTEG-: 1
    • T.INTEG-APPLI-: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 5
    • T.INTEG-TSF-CODE: 3
    • T.INTEG-TSF-DATA: 3
    • T.RBP-APPLI-DATA: 3
    • T.RBP-TSF-DATA: 3
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Qualcomm:
    • Qualcomm: 22
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • djb:
    • ChaCha:
      • ChaCha20: 2
  • AES_competition:
    • AES:
      • AES: 32
      • AES-256: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 25
      • Triple-DES: 3
  • constructions:
    • MAC:
      • CMAC: 16
      • HMAC: 25
      • HMAC-SHA-384: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 9
    • ECDH:
      • ECDH: 11
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 2
  • SHA:
    • SHA1:
      • SHA-1: 10
      • SHA1: 1
    • SHA2:
      • SHA-256: 15
      • SHA-384: 8
      • SHA-512: 8
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 9
  • TLS:
    • SSL:
      • SSL: 4
    • TLS:
      • TLS: 9
      • TLS1.2: 2
      • TLS1.3: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RND: 2
    • RNG: 17
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 4
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-192: 5
    • NIST P-224: 2
    • NIST P-256: 2
    • NIST P-384: 2
    • NIST P-521: 2
    • P-192: 13
    • P-224: 16
    • P-256: 12
    • P-384: 14
    • P-521: 16
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 4
    • Malfunction: 3
    • fault injection: 2
    • malfunction: 3
  • SCA:
    • Leak-Inherent: 3
    • Physical Probing: 2
    • Side-channel: 1
    • physical probing: 4
    • side channel: 4
    • side channels: 1
    • side-channel: 2
  • other:
    • cold boot: 4
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 180-4: 3
    • FIPS 186-4: 4
    • FIPS 197: 5
    • FIPS 198-1: 2
    • FIPS PUB 180-4: 4
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 3
    • FIPS PUB 198-1: 3
    • FIPS186-4: 2
    • FIPS198-1: 1
    • FIPS46-3: 1
  • NIST:
    • NIST SP 800-108: 3
    • NIST SP 800-38A: 3
    • NIST SP 800-38B: 2
    • NIST SP 800-38C: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-67: 1
    • NIST SP 800-90A: 1
  • PKCS:
    • PKCS#1: 7
  • RFC:
    • RFC3447: 3
    • RFC5639: 3
pdf_data/st_metadata
  • /Author: 株式会社リコー
  • /CreationDate: D:20240311170537+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240311170537+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: RICOH IM 9000/9000T/8000/7000 Security Target
  • pdf_file_size_bytes: 1332169
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
  • /Author: QTI
  • /Keywords: integrated secure element, PP0084, Qualcomm, secure processing unit, secure subsystem, SDM855, SoC, SPU230
  • /Subject: 80-NU430-6 Rev.H
  • /Title: Qualcomm® Secure Processing Unit SPU230 Core Security Target Lite
  • pdf_file_size_bytes: 824155
  • pdf_hyperlinks: mailto:[email protected], https://createpoint.qti.qualcomm.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different