name |
bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software Version: A2XK0Y0-0100-G00-56 |
CONEXA 3.0, SW: v3.80.0-cc, HW V01.00 & V01.01 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
JP |
DE |
status |
archived |
active |
not_valid_after |
06.12.2017 |
07.02.2032 |
not_valid_before |
15.11.2012 |
08.02.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0378_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0378_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6b_pdf.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Theben Smart Energy GmbH |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.theben.de |
security_level |
EAL3 |
ALC_FLR.2, EAL4+ |
dgst |
ca756a37746bc3cd |
df3f2ac26199d021 |
heuristics/cert_id |
JISEC-CC-CRP-C0378 |
BSI-DSZ-CC-0918-V6-2024 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_c454:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c554:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c224:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c364:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c284:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMC.3, ADV_ARC.1, ADV_TDS.2, ATE_IND.2, ADV_FSP.3, AGD_PRE.1, AGD_OPE.1, ALC_CMS.3, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ATE_COV.2, ASE_OBJ.2, ASE_SPD.1, ASE_INT.1, ASE_TSS.1, ATE_DPT.1, ALC_DVS.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1 |
AGD_OPE.1, ADV_IMP.1, ATE_COV.2, ALC_DEL.1, AVA_VAN.5, ADV_ARC.1, ASE_REQ.2, ADV_FSP.4, ALC_CMS.4, ASE_CCL.1, ALC_LCD.1, ALC_FLR.2, ALC_CMC.4, ATE_FUN.1, ASE_INT.1, ASE_TSS.1 |
heuristics/extracted_versions |
284, 364, 454, 0100, 224, 554, 56 |
01.00, 3.80.0, 3.0, 01.01 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0918-V7-2025 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0918-V5-2023 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0918-V7-2025 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0918-V4-2022, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0957-2015, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0918-2020, BSI-DSZ-CC-0918-V5-2023, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0918-V3-2022, BSI-DSZ-CC-0918-V2-2021 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0378
- certification_date: 01.11.2012
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0378_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Japanese : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software English : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0378_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0378_est.pdf
- toe_version: A2XK0Y0-0100-G00-56
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.12.2017
- revalidations: [frozendict({'date': '2013-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386_01.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software A2XK0Y0-0100-G00-56
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386.html
- toe_overseas_name: bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 / D410 / D411 / D412 / D415 / D416 / D417 / D710 / D711 / D715 / D716 Control Software A2XK0Y0-0100-G00-56
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0957-V2-2016 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0957-V2-2016 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
0918V6c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0918-V6-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa"
- /Subject: Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa
- /Title: Certification Report BSI-DSZ-CC-0918-V6-2024
- pdf_file_size_bytes: 337823
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0378_erpt.pdf |
0918V6a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5 valid until: 07 February 2032
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0918-V6-2024
- cert_item: CONEXA 3.0 SW: v3.80.0-cc, HW V01.00 & V01.01
- cert_lab: BSI
- developer: Theben Smart Energy GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0378-01: 1
- Certification No. C0378: 1
|
- DE:
- BSI-DSZ-CC-0918-V5-: 1
- BSI-DSZ-CC-0918-V5-2023: 2
- BSI-DSZ-CC-0918-V6-2024: 14
- BSI-DSZ-CC-0957-V2-2016: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMS.4: 2
- ALC_FLR: 3
- ALC_FLR.2: 5
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- T:
- T.ACCESS-GROUP-: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-PRIVATE-: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 2
- T.BRING-OUT-STORA: 1
- T.BRING-OUT-STORAGE: 1
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRA: 1
- T.UNEXPECTED-TRANSMISSION: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 1
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- secp256r1: 1
- secp384r1: 1
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
- BSI TR-02102-1: 1
- BSI TR-03109-1: 1
- BSI TR-03109-3: 1
- BSI TR-03116: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- AIS 46: 2
- AIS 48: 2
- FIPS:
- FIPS 180-4: 4
- FIPS 197: 7
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- RFC 2104: 3
- RFC 3394: 3
- RFC 4493: 6
- RFC 5084: 3
- RFC 5114: 3
- RFC 5246: 3
- RFC 5289: 3
- RFC 5639: 3
- RFC5246: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of: 1
|
- ConfidentialDocument:
- 3.0 (ALC_CMS.4) FÜR FIRMWARE VERSION 3.80.0-cc, 2024-01-19, Theben Smart Energy GmbH (confidential document) [11] Handbuch CONEXA 3.0 für Gateway Administrator, Version 2.12.1, 2023-09-04, Theben Smart: 1
- ALC_CMS.4 Konfigurationsliste Smart Meter Gateway CONEXA 3.0 Version 1.0, Theben Smart Energy GmbH (confidential document) [10] Configuration list for the TOE SW, “ASSURANCE LIFE CYCLE – CONFIGURATION MANAGEMENT” DER: 1
- Report – Smart Meter Gateway CONEXA 3.0, Version 1.0, 2024-01- 23, Theben Smart Energy GmbH (confidential document) [20] Technische Richtlinie BSI TR-03109-1 Anforderungen an die Interoperabilität der: 1
- Smart Energy GmbH [7] ETR Summary CONEXA 1.5, Version 2, 31.01.2024, TÜV Informationstechnik GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20130419151909+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20130419151955+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 477272
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 42
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa"
- /Subject: Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa
- /Title: Certification Report BSI-DSZ-CC-0918-V6-2024
- pdf_file_size_bytes: 497994
- pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
pdf_data/st_filename |
c0378_est.pdf |
0918V6b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0957-V2-2016: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0073: 1
- BSI-CC-PP-0077: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 5
- EAL 4 augmented: 2
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GNE.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 2
- FAU_SAR.2.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 2
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 72
- FDP_ACC.1.1: 4
- FDP_ACF.1: 57
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ACP.1: 1
- FDP_IFC.1: 14
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 3
- FDP_RIP.1.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 66
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 8
- FIA_ATD.1: 29
- FIA_ATD.1.1: 1
- FIA_MSA.3: 1
- FIA_SOS.1: 40
- FIA_SOS.1.1: 4
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU: 2
- FIA_UAU.1: 41
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 43
- FIA_UAU.2.1: 4
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 32
- FIA_UID.2: 63
- FIA_UID.2.1: 7
- FIA_USB.1: 26
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 48
- FMT_MOF.1.1: 5
- FMT_MSA: 5
- FMT_MSA.1: 34
- FMT_MSA.1.1: 3
- FMT_MSA.3: 42
- FMT_MSA.3.1: 8
- FMT_MSA.3.2: 7
- FMT_MTD.1: 123
- FMT_MTD.1.1: 15
- FMT_SMF.1: 128
- FMT_SMF.1.1: 1
- FMT_SMR.1: 185
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SOS.1: 1
- FPT:
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_ARP: 10
- FAU_ARP.1: 1
- FAU_GEN: 38
- FAU_GEN.1: 22
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAA: 11
- FAU_SAA.1: 4
- FAU_SAR: 30
- FAU_SAR.1: 7
- FAU_STG: 32
- FAU_STG.1: 8
- FAU_STG.2: 15
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.3: 3
- FAU_STG.4: 3
- FCO:
- FCO_NRO: 3
- FCO_NRO.1: 1
- FCO_NRO.2: 9
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 44
- FCS_CKM.1: 16
- FCS_CKM.2: 6
- FCS_CKM.4: 32
- FCS_CKM.4.1: 1
- FCS_COP: 63
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 9
- FDP_ACC.2: 11
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 3
- FDP_IFC: 29
- FDP_IFC.1: 12
- FDP_IFC.2: 4
- FDP_IFF: 25
- FDP_IFF.1: 24
- FDP_IFF.1.3: 1
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_RIP: 2
- FDP_RIP.1: 1
- FDP_RIP.2: 9
- FDP_RIP.2.1: 1
- FDP_SDI: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_UAU: 5
- FIA_UAU.1: 2
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID: 3
- FIA_UID.1: 8
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FIA_USB: 3
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA: 64
- FMT_MSA.1: 9
- FMT_MSA.3: 12
- FMT_SMF: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 30
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_CON: 6
- FPR_CON.1: 10
- FPR_CON.1.1: 3
- FPR_CON.1.2: 5
- FPR_PSE: 2
- FPR_PSE.1: 8
- FPR_PSE.1.1: 3
- FPR_PSE.1.2: 2
- FPR_PSE.1.3: 2
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 3
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_RPL: 3
- FPT_RPL.1: 8
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 3
- FPT_STM.1: 18
- FPT_STM.1.1: 1
- FPT_TST: 3
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 5
- A.NETWORK: 6
- A.SECRET: 3
- A.SERVICE: 4
- O:
- O.AUDIT: 2
- O.AUDIT-LOGGED: 5
- O.AUTH: 2
- O.AUTH-CAPABILITY: 7
- O.CONFIG: 12
- O.CRYPT: 4
- O.CRYPTO: 5
- O.CRYPTO-CAPABILITY: 1
- O.CRYPTO-KEY: 2
- O.CRYPTO-MAIL: 4
- O.FAX: 2
- O.FAX-CONTROL: 3
- O.GROUP: 3
- O.GROUP-BOX: 3
- O.OVERWRITE: 7
- O.PRIVATE: 3
- O.PRIVATE-BOX: 3
- O.PUBLIC: 3
- O.PUBLIC-BOX: 5
- O.REGISTERED: 3
- O.REGISTERED-USER: 11
- O.SECURE: 4
- O.SECURE-PRINT: 5
- O.TRU: 1
- O.TRUSTED: 5
- OE:
- OE.ADMIN: 3
- OE.AUDIT: 3
- OE.AUDIT-REVIEWED: 2
- OE.AUDIT_ACCESS-AUT: 1
- OE.AUDIT_ACESS-AUTHORIZED: 1
- OE.AUDIT_STORAGE-PR: 1
- OE.AUDIT_STORAGE-PROTECTED: 1
- OE.FAX: 2
- OE.FAX-UNIT: 2
- OE.FEED: 2
- OE.FEED-BACK: 8
- OE.NETWORK: 4
- OE.S: 1
- OE.SECRET: 3
- OE.SERVER: 5
- OE.SERVICE: 3
- OE.SESSION: 10
- OE.SETTING: 2
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS: 19
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.BACKUP: 3
- T.BACKUP-RESTORE: 1
- T.BRING: 3
- T.DISCARD: 3
- T.DISCARD-MFP: 1
- T.UNEXPECTED: 2
- T.UNEXPECTED-TRANSMISSION: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 3
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 3
- NIST P-384: 3
- P-256: 3
- P-384: 3
- secp256r1: 3
- secp384r1: 3
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 2
- physical tampering: 4
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03109: 1
- BSI TR-03109-1: 2
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 186: 2
- FIPS 186-2: 4
- FIPS PUB 197: 2
- X509:
|
- FIPS:
- FIPS 140-2: 3
- FIPS 180-4: 8
- FIPS 197: 12
- RFC:
- RFC 2104: 6
- RFC 2616: 5
- RFC 3394: 3
- RFC 4493: 8
- RFC 5084: 4
- RFC 5114: 5
- RFC 5246: 7
- RFC 5289: 6
- RFC 5639: 5
- RFC 5905: 4
- RFC5246: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20130415152125+09'00'
- /Creator: CubePDF
- /Keywords:
- /ModDate: D:20130415152132+09'00'
- /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
- /Subject:
- /Title:
- pdf_file_size_bytes: 1193119
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 115
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |