Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BAROC/FISC Terminal Security Access Module, Version 1.0
BSI-DSZ-CC-0442-2008
bizhub C450P / ineo+ 450P Control Software 4037-0100-GM0-11-000
JISEC-CC-CRP-C0103
name BAROC/FISC Terminal Security Access Module, Version 1.0 bizhub C450P / ineo+ 450P Control Software 4037-0100-GM0-11-000
category ICs, Smart Cards and Smart Card-Related Devices and Systems Multi-Function Devices
scheme DE JP
not_valid_after 01.09.2019 28.12.2010
not_valid_before 15.09.2008 27.06.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0442a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0103_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0442b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0103_est.pdf
manufacturer Financial Information Service Co. Ltd. (FISC) Konica Minolta Business Technologies, Inc
manufacturer_web https://www.fisc.com.tw/ https://www.konicaminolta.com/
security_level EAL4+, ADV_IMP.2, AVA_VLA.4 EAL3
dgst c6c5b4a22cd38f9f 7c6a3d773b941c5e
heuristics/cert_id BSI-DSZ-CC-0442-2008 JISEC-CC-CRP-C0103
heuristics/cert_lab BSI []
heuristics/extracted_sars ADV_LLD.1, ALC_DVS.2, ATE_DPT.1, AGD_ADM.1, ADV_SPM.1, ADV_RCR.1, ADV_HLD.2, ATE_COV.2, ALC_TAT.1, ATE_IND.2, AVA_VLA.4, ATE_FUN.1, ADV_FSP.2, ADV_IMP.2, ALC_LCD.1, AVA_MSU.3, AGD_USR.1, AVA_SOF.1 AGD_ADM.1, ATE_DPT.1, AVA_VLA.1, ALC_DVS.1, ADV_RCR.1, ADV_HLD.2, ATE_COV.2, AVA_MSU.1, ADV_FSP.1, ATE_IND.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1
heuristics/extracted_versions 1.0 000, 4037, 0100, 11
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0103
  • certification_date: 01.06.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0103_eimg.pdf
    • description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. network printer ( bizhub C450P / ineo+ 450P )( Hereinafter referred to as “ printer ” ) . This software is on the flash memory on the printer controller carried in printer, and this controls the whole operation of printer such as the operation control processing and the image data management received from the panel of printer body or the network. This product offers the protection from exposure of the highly confidential document stored in the printer, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD (option part) unjustly which is a medium for storing image data in printer. If the encryption board, an option product, is installed in the printer controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: bizhub C450P / ineo+ 450P Control Software
    • product_type: IT Product (data protection function in printer systems)
    • report_link: https://www.ipa.go.jp/en/security/c0103_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0103_est.pdf
    • toe_version: 4037-0100-GM0-11-000
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.01.2011
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C450P / ineo + 450P Control Software 4037-0100-GM0-11-000
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0103_it6079.html
  • toe_overseas_name: bizhub C450P / ineo + 450P Control Software 4037-0100-GM0-11-000
pdf_data/report_filename 0442a.pdf c0103_erpt.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0442-2008
    • cert_item: BAROC/FISC Terminal Security Access Module Version 1.0
    • cert_lab: BSI
    • developer: Financial Information Service Co., Ltd. (FISC) sponsored by The Bankers Association of the Republic of China (BAROC
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0426: 2
    • BSI-DSZ-CC-0426-2007-MA-01: 1
    • BSI-DSZ-CC-0442: 1
    • BSI-DSZ-CC-0442-2008: 17
  • NL:
    • CC-0426-2007: 1
  • JP:
    • CRP-C0103-01: 1
    • Certification No. C0103: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_IMP.2: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_TAT: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS: 1
    • T.ACCESS-BOX: 1
    • T.ACCESS-NET: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.BACKUP: 1
    • T.BRING-OUT: 1
    • T.DISCARD-PRINTER: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 12
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 9
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 4
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 1
    • AIS 36: 3
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 180-1: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 0, Date: 2008-05-21, Authors: BAROC & FISC (confidential document) [9] Java Card System Protection Profile Collection, Version: 1.0b, August 2003. This Document: 1
    • Product: NXP P541G072V0P (JCOP 41, v2.3.1), Version 1.0, Date 2007-07-27, ITSEF: TÜVIT (confidential document) [13] Administrator and User Guidance for BAROC/FISC TSAM 1.0, Version 1.0.0, date: 2008-05-21: 1
    • Report, BSI-DSZ-CC-0442, Version 3, Date 2008-07-30, Product:BAROC/FISC TSAM 1.0, ITSEF: TÜVIT (confidential document) [8] Configuration list for the TOE: Configuration Management for 1 BAROC/FISC TSAM 1.0, Version: 1: 1
  • ConfidentialDocument:
    • panel of Printer body or the network. This TOE offers the protection from exposure of the highly confidential document stored in the Printer, and aims at protecting the data which may be exposed against a user’s: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20081217084137+01'00'
  • /Creator: Writer
  • /Keywords: "BSI-DSZ-CC-0442-2008, Common Criteria, Certification, Zertifizierung, BAROC Terminal Security Access Module Version 1.0, Financial Information Services Co., Ltd. (FISC), The Bankers Association of the Republic of China (BAROC)"
  • /ModDate: D:20090105105200+01'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria, Certification
  • /Title: Certification Report BSI-DSZ-CC-0442-2008
  • pdf_file_size_bytes: 1307314
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
  • /CreationDate: D:20070906134509+09'00'
  • /ModDate: D:20070906134509+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 313368
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
pdf_data/st_filename 0442b.pdf c0103_est.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0348: 1
    • BSI-DSZ-CC-0426: 1
    • BSI-DSZ-CC-0442: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 1600: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 12
    • EAL4 augmented: 8
    • EAL4+: 1
  • EAL:
    • EAL3: 6
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_HLD.2: 3
    • ADV_IMP.1: 1
    • ADV_IMP.2: 13
    • ADV_LLD.1: 4
    • ADV_RCR.1: 3
    • ADV_SPM.1: 4
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 3
  • ALC:
    • ALC_DVS.1: 3
    • ALC_DVS.2: 3
    • ALC_LCD.1: 2
    • ALC_TAT.1: 3
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.2: 3
    • AVA_MSU.3: 3
    • AVA_SOF.1: 2
    • AVA_VLA: 1
    • AVA_VLA.3: 2
    • AVA_VLA.4: 12
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
    • FAU_SAA.1: 1
  • FCS:
    • FCS_CKM: 11
    • FCS_CKM.1: 4
    • FCS_CKM.2: 1
    • FCS_CKM.3: 1
    • FCS_CKM.4: 4
    • FCS_COP: 6
    • FCS_COP.1: 3
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 23
    • FDP_ACC.1: 13
    • FDP_ACC.2: 1
    • FDP_ACF: 12
    • FDP_ACF.1: 19
    • FDP_CKM: 1
    • FDP_ETC.1: 1
    • FDP_IFC: 4
    • FDP_IFC.1: 7
    • FDP_IFF: 4
    • FDP_IFF.1: 1
    • FDP_ITC: 14
    • FDP_ITC.1: 15
    • FDP_ITC.1.3: 4
    • FDP_RIP.1: 1
    • FDP_ROL.1: 1
    • FDP_SDI: 5
    • FDP_SDI.2: 7
    • FDP_UCT: 11
    • FDP_UCT.1: 4
    • FDP_UIT: 13
    • FDP_UIT.1: 9
  • FIA:
    • FIA_AFL: 7
    • FIA_AFL.1: 5
    • FIA_ATD.1: 1
    • FIA_UAU: 20
    • FIA_UAU.1: 7
    • FIA_UAU.3: 1
    • FIA_UAU.4: 3
    • FIA_UAU.5: 8
    • FIA_UID: 6
    • FIA_UID.1: 8
    • FIA_UID.2: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA: 40
    • FMT_MSA.1: 8
    • FMT_MSA.2: 7
    • FMT_MSA.3: 9
    • FMT_MTD.1: 1
    • FMT_MTD.3: 1
    • FMT_SMF: 15
    • FMT_SMF.1: 3
    • FMT_SMR: 12
    • FMT_SMR.1: 7
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 1
    • FPT_PHP.1: 1
    • FPT_PHP.3: 1
    • FPT_RCV.3: 1
    • FPT_RCV.4: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TDC.1: 1
    • FPT_TST.1: 1
  • FRU:
    • FRU_FLT.2: 1
    • FRU_RSA: 4
  • FTP:
    • FTP_ITC: 17
    • FTP_ITC.1: 19
    • FTP_TRP.1: 2
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_COP: 2
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 6
    • FDP_ACC.1: 34
    • FDP_ACC.1.1: 3
    • FDP_ACF: 3
    • FDP_ACF.1: 42
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ITC.1: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 62
    • FIA_AFL.1.1: 7
    • FIA_AFL.1.2: 7
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 12
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 47
    • FIA_SOS.1.1: 5
    • FIA_SOS.2: 10
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU: 9
    • FIA_UAU.1: 13
    • FIA_UAU.2: 64
    • FIA_UAU.2.1: 5
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 2
    • FIA_UID: 11
    • FIA_UID.1: 13
    • FIA_UID.2: 34
    • FIA_UID.2.1: 4
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MOF.1: 69
    • FMT_MOF.1.1: 3
    • FMT_MSA: 9
    • FMT_MSA.2: 2
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 81
    • FMT_MTD.1.1: 6
    • FMT_SMF: 18
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 51
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_RVM.1: 17
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.DEV: 10
    • A.DLV: 10
    • A.DLV_PROTECT: 2
    • A.KEYS: 7
    • A.NATIVE: 2
    • A.NO-DELETION: 2
    • A.NO-INSTALL: 2
    • A.TEST_OPERATE: 1
    • A.USE_DIAG: 8
    • A.USE_KEYS: 1
    • A.VERIFICATION: 2
  • D:
    • D.APP_CODE: 1
    • D.APP_C_DATA: 1
    • D.APP_I_DATA: 1
    • D.APP_KEYS: 1
  • O:
    • O.ALARM: 2
    • O.CARD-MANAGEMENT: 2
    • O.CIPHER: 3
    • O.FAULT_PROTECT: 2
    • O.FIREWALL: 3
    • O.KEY-MNGT: 3
    • O.NATIVE: 2
    • O.OPERATE: 3
    • O.OS_DECEIVE: 2
    • O.PHYSICAL: 3
    • O.PIN-MNGT: 2
    • O.PROTECT_DATA: 7
    • O.REALLOCATION: 2
    • O.RESOURCES: 3
    • O.RND: 3
    • O.SCP: 8
    • O.SHRD_VAR_CONFID: 2
    • O.SHRD_VAR_INTEG: 3
    • O.SID: 3
    • O.SIDE_CHANNEL: 3
    • O.TRANSACTION: 2
  • OE:
    • OE.DEL_NOS: 1
    • OE.DEV_NOS: 1
    • OE.DLV_DATA: 1
    • OE.DLV_PROTECT: 1
    • OE.IC_ORG: 1
    • OE.NATIVE: 2
    • OE.NO-DELETION: 2
    • OE.NO-INSTALL: 2
    • OE.TEST_OPERATE: 1
    • OE.USE_DIAG: 1
    • OE.USE_KEYS: 1
    • OE.VERIFICATION: 2
  • OSP:
    • OSP.IC_ORG: 1
    • OSP.SN: 7
    • OSP.TXN: 1
    • OSP.TXN_SECURE: 6
  • T:
    • T.ACCESS_DATA: 3
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 2
    • T.CONFID-JCS-DATA: 3
    • T.DEL: 2
    • T.DEL_IC_NOS: 2
    • T.DEV_IC: 2
    • T.DEV_NOS: 2
    • T.EXE-CODE: 4
    • T.FAULT: 3
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 3
    • T.INTEG-JCS-CODE: 2
    • T.INTEG-JCS-DATA: 2
    • T.INTEGRITY: 6
    • T.KEY_ACCESS: 5
    • T.LEAKAGE: 3
    • T.NATIVE: 3
    • T.OS_DECEIVE: 3
    • T.OS_OPERATE: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.RND: 3
    • T.SID: 6
    • T.TMD_ACCESS: 5
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SETTING: 1
  • O:
    • O.BOX: 5
    • O.CHECK-HDD: 2
    • O.CONFIG: 9
    • O.CRYPT-KEY: 3
    • O.OVERWRITE-ALL: 2
    • O.SECURE-PRINT: 3
  • OE:
    • OE.CRYPT: 4
    • OE.FEED-BACK: 8
    • OE.LOCK-HDD: 1
  • T:
    • T.ACCESS-BOX: 1
    • T.ACCESS-NET-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.DISCARD-PRINTER: 1
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 5
  • Philips:
    • Philips: 1
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜViT: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • SHA:
    • SHA1:
      • SHA-1: 8
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 39
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 6
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS20: 5
  • FIPS:
    • FIPS 1573: 1
  • ISO:
    • ISO/IEC 7816-4: 1
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS PUB 197: 2
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the printer. Moreover, TOE can encrypt the image data written in HDD for the danger of: 1
pdf_data/st_metadata
  • /Author: BAROC & FISC
  • /CreationDate: D:20080714065458+02'00'
  • /Creator: pdfFactory Pro www.context-gmbh.de
  • /Keywords: Document Version 1.0.0; Terminal Security Access Module; secure transactions; POS terminal; remote host application; integrity; authenticity; confidentiality; encryption; decryption; MAC generation; JavaCard applet; NXP P541G072V0P smart card controller
  • /Producer: pdfFactory Pro 3.30 (Windows XP Professional German)
  • /Subject: Evaluation of BAROC/FISC TSAM 1.0
  • /Title: Security Target for BAROC/FISC TSAM 1.0
  • pdf_file_size_bytes: 318324
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
  • /CreationDate: D:20070904141305+09'00'
  • /Creator: クセロPDF v1.14 Rev0495
  • /ModDate: D:20070904141305+09'00'
  • /Producer: Xelo PDF Library
  • pdf_file_size_bytes: 1735424
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different