Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C3850 / bizhub C3350 PKI Card System Control Software A3GN30G0213999P
JISEC-CC-CRP-C0478
eTugra SAM v1.4
OCSI/CERT/CCL/01/2023/RC
name bizhub C3850 / bizhub C3350 PKI Card System Control Software A3GN30G0213999P eTugra SAM v1.4
category Other Devices and Systems Products for Digital Signatures
scheme JP IT
status archived active
not_valid_after 26.08.2020 16.04.2029
not_valid_before 26.08.2015 16.04.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_FP_etugra_sam_14_v1.0_en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0478_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_etugra_sam_14_v1.0_en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0478_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_etugra_sam_14_v10.pdf
manufacturer KONICA MINOLTA, INC. E-Tugra EBG Information Technologies and Services Joint Stock Company
manufacturer_web https://www.konicaminolta.com/index.html https://e-tugra.com.tr/
security_level EAL3 EAL4+, AVA_VAN.5
dgst c20b0db1415da04e f4885e7bbdd8eb7d
heuristics/cert_id JISEC-CC-CRP-C0478 OCSI/CERT/CCL/01/2023/RC
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_c3850:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c3350:-:*:*:*:*:*:*:* {}
heuristics/direct_transitive_cves {} CVE-2022-36997, CVE-2022-36998, CVE-2022-37000, CVE-2022-36996, CVE-2024-52945, CVE-2022-36990, CVE-2022-36984, CVE-2022-36994, CVE-2022-42299, CVE-2022-36987, CVE-2022-36999, CVE-2022-36991, CVE-2022-42303, CVE-2022-42301, CVE-2022-42302, CVE-2022-36992, CVE-2022-36993, CVE-2022-42300, CVE-2022-42304, CVE-2022-36988, CVE-2022-36985, CVE-2022-36989, CVE-2022-42305, CVE-2022-36995, CVE-2022-36986, CVE-2024-33672, CVE-2022-42307, CVE-2023-28759
heuristics/indirect_transitive_cves {} CVE-2022-36997, CVE-2022-36998, CVE-2022-37000, CVE-2022-36996, CVE-2024-52945, CVE-2022-36990, CVE-2022-36984, CVE-2022-36994, CVE-2022-42299, CVE-2022-36987, CVE-2022-36999, CVE-2022-36991, CVE-2022-42303, CVE-2022-42301, CVE-2022-42302, CVE-2022-36992, CVE-2022-36993, CVE-2022-42300, CVE-2022-42304, CVE-2022-36988, CVE-2022-36985, CVE-2022-36989, CVE-2022-42305, CVE-2022-36995, CVE-2022-36986, CVE-2024-33672, CVE-2022-42307, CVE-2023-28759
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1
heuristics/extracted_versions - 1.4
heuristics/report_references/directly_referenced_by {} OCSI/CERT/CCL/01/2022/RC
heuristics/report_references/directly_referencing {} OCSI/CERT/CCL/13/2021/RC
heuristics/report_references/indirectly_referenced_by {} OCSI/CERT/CCL/01/2022/RC
heuristics/report_references/indirectly_referencing {} OCSI/CERT/CCL/13/2021/RC
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0478
  • certification_date: 01.08.2015
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0478_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as "MFP"), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Encryption Print Function The function that receives the encrypted print data and can print the print data only with a right IC card. - S/MIME Encryption Function The function to encrypt an image data when transmitting it by e-mail. - Digital Signature Function The function to add the digital signature by using the function of IC card when transmitting an image data by e-mail. - HDD Encryption Function The function to encrypt the image data written in HDD. - All Area Overwrite Deletion Function The function that deletes data area including the image data of HDD completely by deletion method compliant with various overwrite deletion standards.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: bizhub C3850 / bizhub C3350 PKI Card System Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0478_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0478_est.pdf
    • toe_version: A3GN30G0213999P
    • vendor: KONICA MINOLTA,INC.
  • expiration_date: 01.09.2020
  • supplier: KONICA MINOLTA,INC.
  • toe_japan_name: bizhub C3850 / bizhub C3350 PKI Card System Control SoftwareA3GN30G0213999P
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0478_it4506.html
  • toe_overseas_name: bizhub C3850 / bizhub C3850 / bizhub C3350 PKI Card System Control SoftwareA3GN30G0213999P
heuristics/protection_profiles {} eabbd431e1f174cd
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf
pdf_data/cert_filename cr_FP_etugra_sam_14_v1.0_en.pdf
pdf_data/cert_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/CCL/01/2023/RC: 1
    • OCSI/CERT/CCL/13/2021/RC: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL4: 2
    • EAL4+: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Tiziano Inzerilli
  • /CreationDate: D:20240419162007+02'00'
  • /ModDate: D:20240419162007+02'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Certification Report "eTugra SAM v1.4".pdf
  • pdf_file_size_bytes: 373181
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename c0478_erpt.pdf cr_etugra_sam_14_v1.0_en.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0478-01: 1
    • Certification No. C0478: 1
  • IT:
    • OCSI/CERT/CCL/01/2023/RC: 25
    • OCSI/CERT/CCL/13/2021/RC: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 4+: 4
    • EAL2: 4
    • EAL4: 10
    • EAL4 augmented: 3
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.IC-CARD: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
  • T:
    • T.ACCESS-HDD: 2
    • T.DISCARD-MFP: 2
  • O:
    • O.J: 1
pdf_data/report_keywords/eval_facility
  • CCLab:
    • CCLab Software Laboratory: 5
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • through the network. The TOE provides the protection function against the disclosure of the highly confidential documents stored in the MFP. Note that the TOE does not possess the audit log function. Moreover, against: 1
pdf_data/report_metadata
  • /CreationDate: D:20161018111125+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20161018111202+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 375619
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 34
  • /Author: OCSI
  • /CreationDate: D:20240416084741+02'00'
  • /Creator: Microsoft® Word per Microsoft 365
  • /ModDate: D:20240416084741+02'00'
  • /Producer: Microsoft® Word per Microsoft 365
  • /Title: Certification Report "eTugra SAM v1.4"
  • pdf_file_size_bytes: 656782
  • pdf_hyperlinks: https://www.commoncriteriaportal.org/, https://www.sogis.eu/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename c0478_est.pdf st_etugra_sam_14_v10.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 1
    • AGD_PRE: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_COP: 1
    • FCS_COP.1: 15
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC: 2
    • FDP_ITC.1: 3
    • FDP_ITC.2: 1
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_SOS.1: 16
    • FIA_SOS.1.1: 3
    • FIA_SSL.3: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 2
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 18
    • FIA_UID.2.1: 3
  • FMT:
    • FMT_MOF.1: 18
    • FMT_MOF.1.1: 2
    • FMT_MTD.1: 19
    • FMT_MTD.1.1: 3
    • FMT_SMF: 5
    • FMT_SMF.1: 28
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 43
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM: 25
    • FCS_CKM.1: 17
    • FCS_CKM.2: 6
    • FCS_CKM.4: 29
    • FCS_CKM.4.1: 1
    • FCS_COP: 26
    • FCS_COP.1: 14
    • FCS_RNG: 3
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 91
    • FDP_ACC.1: 43
    • FDP_ACF: 60
    • FDP_ACF.1: 49
    • FDP_ETC: 15
    • FDP_ETC.2: 8
    • FDP_IFC: 29
    • FDP_IFC.1: 24
    • FDP_IFF: 15
    • FDP_IFF.1: 14
    • FDP_ITC: 15
    • FDP_ITC.1: 12
    • FDP_ITC.2: 22
    • FDP_UCT.1: 7
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_UAU: 15
    • FIA_UAU.1: 5
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 4
    • FIA_UID.1: 5
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_USB.1: 18
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 1
    • FIA_UTD.1: 1
  • FMT:
    • FMT_MSA: 38
    • FMT_MSA.1: 10
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 26
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.2: 13
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_PHP.1: 11
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 14
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRP: 2
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 11
    • FTP_TDC.1: 2
    • FTP_TRP: 24
    • FTP_TRP.1: 15
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.IC-CARD: 3
    • A.NETWORK: 3
    • A.SECRET: 2
    • A.SERVICE: 2
  • O:
    • O.CRYPTO-HDD: 4
    • O.DECRYPT-PRINT: 4
    • O.MAIL-: 1
    • O.MAIL-CRYPTO: 4
    • O.MAIL-SIGN: 4
    • O.OVERWRITE-ALL: 5
    • O.PKI-CAPABILITY: 9
  • OE:
    • OE.ADMIN: 3
    • OE.CARD-USER: 3
    • OE.DRIVER: 3
    • OE.IC-CARD: 6
    • OE.NETWORK: 3
    • OE.SECRET: 3
    • OE.SERVICE: 3
    • OE.SETTING: 1
    • OE.SETTING-SECURITY: 3
    • OE.SIGN: 3
  • T:
    • T.ACCESS-HDD: 3
    • T.DISCARD-MFP: 2
  • A:
    • A.ACCESS_PROTECTED: 4
    • A.AUTH_DATA: 4
    • A.CA: 4
    • A.PRIVILEGED_USER: 4
    • A.SEC_REQ: 4
    • A.SIGNER_AUTHENTICATION_DATA_PROTECTION: 4
    • A.SIGNER_DEVICE: 4
    • A.SIGNER_ENROLMENT: 4
    • A.TSP_AUDITED: 4
  • OE:
    • OE.CA_REQUEST_CERTIFICATE: 4
    • OE.CERTIFICATE_VERFICATION: 2
    • OE.CERTIFICATE_VERIFICATION: 1
    • OE.CRYPTOMODULE_CERTIFIED: 5
    • OE.DELEGATED_AUTHENTICATION: 3
    • OE.DEVICE: 10
    • OE.ENV: 9
    • OE.SIGNER_AUTHENTICATION_DATA: 6
    • OE.SVD_AUTHENTICITY: 5
  • OSP:
    • OSP.CRYPTO: 4
    • OSP.RANDOM: 5
  • OT:
    • OT.AUDIT_PROTECTION: 5
    • OT.CRYPTO: 6
    • OT.DTBSR_INTEGRITY: 4
    • OT.PRIVILEGED_USER_AUTHENTICATION: 6
    • OT.PRIVILEGED_USER_MANAGEMENT: 19
    • OT.PRIVILEGED_USER_PROTECTION: 18
    • OT.RANDOM: 20
    • OT.REFERENCE_SIGNER_AUTHENTICATION_DATA: 7
    • OT.SAD_VERIFICATION: 18
    • OT.SAP: 8
    • OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION: 19
    • OT.SIGNATURE_INTEGRITY: 18
    • OT.SIGNER_KEY_PAIR_GENERATION: 19
    • OT.SIGNER_MANAGEMENT: 5
    • OT.SIGNER_PROTECTION: 20
    • OT.SVD: 4
    • OT.SYSTEM_PROTECTION: 19
  • R:
    • R.AUDIT: 2
    • R.RANDOM: 2
    • R.SAD: 27
    • R.SVD: 42
    • R.TSF_DATA: 11
  • T:
    • T.ADMIN_IMPERSONATION: 8
    • T.AUDIT_ALTERATION: 7
    • T.AUTHENTICATION_SIGNER_IMPERSONATION: 10
    • T.AUTHORISATION_DATA_DISCLOSE: 3
    • T.AUTHORISATION_DATA_UPDATE: 10
    • T.CONTEXT_ALTERATION: 11
    • T.DTBSR_FORGERY: 7
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_: 1
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL: 2
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED: 3
    • T.ENROLMENT_SIGNER_IMPERSONATION: 10
    • T.MAINTENANCE_AUTHENTICATION_DISCLOSE: 6
    • T.PRIVILEGED_USER_INSERTION: 10
    • T.RANDOM: 9
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_: 1
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA: 1
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION: 2
    • T.SAD_FORGERY: 6
    • T.SAP_BYPASS: 7
    • T.SAP_REPLAY: 7
    • T.SIGNATURE_FORGERY: 7
    • T.SIGNATURE_REQUEST_DISCLOSURE: 7
    • T.SIGNER_AUTHENTICATION_DATA_MODIFIED: 6
    • T.SVD_FORGERY: 8
pdf_data/st_keywords/vendor
  • Thales:
    • Thales: 4
pdf_data/st_keywords/eval_facility
  • CCLab:
    • CCLab Software Laboratory: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 6
  • RSA:
    • RSA 2048: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 9
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 2
      • SHA224: 2
      • SHA256: 7
      • SHA384: 3
      • SHA512: 5
    • SHA3:
      • SHA-3: 1
      • SHA3-224: 4
      • SHA3-256: 3
      • SHA3-384: 5
      • SHA3-512: 5
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 9
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 2
    • brainpoolP256r1: 2
    • brainpoolP256t1: 2
    • brainpoolP320r1: 2
    • brainpoolP320t1: 2
    • brainpoolP384r1: 2
    • brainpoolP384t1: 2
    • brainpoolP512r1: 2
    • brainpoolP512t1: 2
  • NIST:
    • NIST P-256: 2
    • P-256: 2
    • P-384: 2
    • P-521: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
  • SCA:
    • side-channels: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-2: 3
    • FIPS 186-2: 6
    • FIPS PUB 197: 7
    • FIPS180-3: 3
    • FIPS186-2: 1
  • BSI:
    • AIS 20: 2
    • AIS 31: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 3
  • FIPS:
    • FIPS 140-3: 1
    • FIPS 186-5: 7
    • FIPS 202: 1
    • FIPS PUB 140-3: 1
    • FIPS PUB 186-5: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 19790: 8
    • ISO/IEC 19790:2012: 1
  • PKCS:
    • PKCS#1: 5
  • RFC:
    • RFC 5639: 4
    • RFC 6151: 2
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • that encryption print for a printer data transmitted to mfp from client PC among the highly confidential document transmitted between mfp and client PC. Also, it provides a function of protecting the scanned image: 1
  • OutOfScope:
    • out of scope: 1
    • used to authenticate the signer are managed by the IdP or mobile application via SSA and are thus out of scope of this ST. 145 [selection: [assignment: the rules describing how delegated authentication is: 1
pdf_data/st_metadata
  • /Author: e09667
  • /CreationDate: D:20161014100604+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20161014100604+09'00'
  • /Producer: Acrobat Distiller 10.1.15 (Windows)
  • /Title: Microsoft Word - 【C0478】英文ASE_Venus_PKI-1.09-150724.doc
  • pdf_file_size_bytes: 417262
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 53
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different