name |
SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX110240Q100 |
distributed remote Qualified Signature Creation Device (drQSCD) v1.0 |
category |
Multi-Function Devices |
Products for Digital Signatures |
scheme |
JP |
IT |
status |
archived |
archived |
not_valid_after |
03.06.2024 |
15.05.2024 |
not_valid_before |
20.02.2023 |
15.05.2019 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0772_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0772_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_drqscd_10_v1.0_en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0772_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_drqscd_v1.2_public.pdf |
manufacturer |
Sharp Corporation |
I4P-informatikai Kft. (I4P Informatics Ltd.) |
manufacturer_web |
https://sharp-world.com/ |
https://www.i4p.com |
security_level |
{} |
EAL4+, AVA_VAN.5, ALC_FLR.3 |
dgst |
d4887615050aaec9 |
e02d709e88d5eb5e |
heuristics/cert_id |
JISEC-CC-CRP-C0772-01-2023 |
OCSI/CERT/SYS/06/2017/RC |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
cpe:2.3:h:sharp:bp-70m65:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:bp-50m55:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:bp-50m31:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:bp-70m31:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:bp-50m36:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:bp-70m55:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:bp-50m26:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:bp-50m45:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:bp-70m45:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:bp-70m36:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
OCSI/CERT/CCL/02/2020/RC |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
OCSI/CERT/CCL/02/2020/RC, OCSI/CERT/CCL/14/2022/RC |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0772
- certification_date: 01.02.2023
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0772
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000mxv-att/c0772_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device (MFD) that has the functions, such as copy, print, scan, fax and filing. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: Identification and Authentication Function Access Control Function Stored Data Encryption Function Network Protection Function Security Management Function Audit Function Software Verification Function Self-testing Function Fax Line Separation Function
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX11
- product_type: Multifunction Device
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000mxv-att/c0772_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000mxv-att/c0772_est.pdf
- toe_version: 0240Q100
- vendor: SHARP CORPORATION
- expiration_date: 01.06.2024
- supplier: SHARP CORPORATION
- toe_japan_name: SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX110240Q100
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0772_it2824.html
- toe_overseas_name: SHARP BP-70M65 / 70M55 / 70M45 fax-standard PS-optional model with BP-FR12U and MX-PK13; BP-70M65 / 70M55 / 70M45 / 70M36 / 70M31 fax-optional PS-standard model with BP-FR12U and BP-FX11; and BP-50M65 / 50M55 / 50M45 / 50M36 / 50M31 / 50M26 fax-optional PS-optional model with BP-FR12U, MX-PK13 and BP-FX110240Q100
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2014/50, BSI-DSZ-CC-0999-2016 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2014/50, BSI-DSZ-CC-0999-2016, BSI-DSZ-CC-0695-2011 |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
ee319f4a624019b0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-PP-2016_05 PP.pdf |
pdf_data/cert_filename |
c0772_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0772-01-2023: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230314092924+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20230314093217+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 134774
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0772_erpt.pdf |
cr_drqscd_10_v1.0_en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0772-01-2023: 1
|
- IT:
- OCSI/CERT/SYS/06/2017/RC: 32
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 2
- EAL4: 9
- EAL4 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.3: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FPT:
- FPT_PHP.1: 1
- FPT_PHP.3: 1
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- CCLab:
- CCLab Software Laboratory: 3
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20230613155415+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /Keywords:
- /ModDate: D:20230613155730+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20230608022650
- /Subject:
- /Title:
- pdf_file_size_bytes: 515813
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 32
|
- /Author: OCSI
- /CreationDate: D:20190522100728+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20190522100728+02'00'
- /Producer: Microsoft® Word 2010
- /Title: Certification Report “drQSCD v1.0”
- pdf_file_size_bytes: 787938
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
pdf_data/st_filename |
c0772_est.pdf |
st_drqscd_v1.2_public.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 13
- EAL4 augmented: 6
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR.3: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 3
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 16
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 4
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 39
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 4
- FCS_CKM_EXT.4: 24
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 95
- FCS_COP.1.1: 5
- FCS_KDF_EXT.1: 4
- FCS_KYC_EXT: 5
- FCS_KYC_EXT.1: 8
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 4
- FCS_RBG_EXT.1: 21
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT: 4
- FCS_SMC_EXT.1: 11
- FCS_SMC_EXT.1.1: 2
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 7
- FCS_TLS_EXT.1: 24
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 4
- FDP_DSK_EXT.1: 9
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 4
- FDP_FXS_EXT.1: 6
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 16
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 3
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 4
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 4
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 5
- FPT_TUD_EXT.1: 10
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 20
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN: 32
- FAU_GEN.1: 23
- FAU_GEN.1.1: 2
- FAU_GEN.2: 4
- FAU_STG.1: 1
- FAU_STG.2: 8
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCS:
- FCS_CKM: 89
- FCS_CKM.1: 46
- FCS_CKM.2: 14
- FCS_CKM.4: 45
- FCS_COP: 161
- FCS_COP.1: 43
- FCS_RND.1: 1
- FCS_RNG: 4
- FCS_RNG.1: 19
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 123
- FDP_ACC.1: 55
- FDP_ACF: 100
- FDP_ACF.1: 76
- FDP_ETC: 17
- FDP_ETC.2: 8
- FDP_IFC: 39
- FDP_IFC.1: 31
- FDP_IFF: 31
- FDP_IFF.1: 29
- FDP_ITC: 17
- FDP_ITC.1: 32
- FDP_ITC.2: 42
- FDP_RIP.1: 9
- FDP_RIP.1.1: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 25
- FIA_AFL.1: 7
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU: 57
- FIA_UAU.1: 13
- FIA_UAU.5: 4
- FIA_UAU.6: 5
- FIA_UID: 14
- FIA_UID.1: 17
- FIA_UID.2: 3
- FIA_USB: 3
- FIA_USB.1: 12
- FIA_USB.1.1: 2
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 80
- FMT_MSA.1: 15
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 37
- FMT_MTD: 25
- FMT_MTD.1: 3
- FMT_SMF: 24
- FMT_SMF.1: 12
- FMT_SMR: 24
- FMT_SMR.1: 23
- FMT_SMR.2: 3
- FPT:
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_ITT.1: 18
- FPT_ITT.1.1: 1
- FPT_PHP.1: 12
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_RPL.1: 7
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_SSP.1: 1
- FPT_SSP.2: 9
- FPT_SSP.2.1: 1
- FPT_SSP.2.2: 1
- FPT_STM: 13
- FPT_STM.1: 7
- FPT_TDC.1: 16
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TRC.1: 8
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FPT_TST.1: 1
- FPT_TST_EXT: 5
- FPT_TST_EXT.1: 14
- FPT_TST_EXT.1.1: 2
- FRU:
- FRU_FLT.1: 9
- FRU_FLT.1.1: 1
- FTP:
- FTP_ITC: 10
- FTP_ITC.1: 11
- FTP_TRP: 66
- FTP_TRP.1: 24
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS_CONTROL: 7
- O.ADMIN_ROLES: 4
- O.AUDIT: 4
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.ACCESS_PROTECTED: 4
- A.AUTH_DATA: 3
- A.CA: 4
- A.CRYPTO: 3
- A.PRIVILEGED_USER: 4
- A.SEC_REQ: 4
- A.SIGNER_AUTHENTCIATION_DATA_PROTECTION: 1
- A.SIGNER_AUTHENTICATION_DATA_PROTECTION: 2
- A.SIGNER_DEVICE: 4
- A.SIGNER_ENROLMENT: 4
- A.SIG_AUTH_DATA_PROT: 2
- A.TSP_AUDITED: 3
- OE:
- OE.CA_REQUEST_CERTIFICATE: 4
- OE.CA_REQ_CERT: 2
- OE.CERTIFICATE_VERFICATION: 2
- OE.CERT_VERFICATION: 1
- OE.CM_CERTFIED: 1
- OE.CM_CERTIFIED: 1
- OE.CRYPTOMODULE_CERTIFIED: 9
- OE.DELEGATED_AUTHENTICATION: 2
- OE.DEVICE: 7
- OE.ENV: 3
- OE.SAP: 1
- OE.SIGNER_AUTHENTICATION_DATA: 5
- OE.SIG_AUTH_DATA: 2
- OE.SVD_AUTHENTICITY: 3
- OT:
- OT.AUDIT_PROTECTI: 1
- OT.AUDIT_PROTECTION: 6
- OT.CRYPTO: 5
- OT.DTBSR_INTEGRIT: 1
- OT.DTBSR_INTEGRITY: 6
- OT.PRIV-U-AUTH: 2
- OT.PRIVILEGED_USER: 2
- OT.PRIVILEGED_USER_AUTHENTICATION: 6
- OT.PRIVILEGED_USER_MANAGEMENT: 5
- OT.PRIVILEGED_USER_PROTECTION: 2
- OT.PRIV_U_AUTH: 2
- OT.PRIV_U_MANAGE: 1
- OT.PRIV_U_MANAGEMENT: 1
- OT.PRIV_U_PROT: 1
- OT.RANDOM: 3
- OT.RCRYPTO: 2
- OT.REF-SIG_AUTH_DATA: 2
- OT.REFERENCE_SIGNER_AUTHENTICATION_DATA: 7
- OT.REF_SIG_AUTH_D: 1
- OT.REF_SIG_AUTH_DATA: 1
- OT.RNG: 14
- OT.SAD_VERIFICATION: 4
- OT.SAM_BACKUP: 6
- OT.SAP: 10
- OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION: 5
- OT.SIGNATURE_INTEGRITY: 4
- OT.SIGNER-: 2
- OT.SIGNER_KEY_PAIR_GENERATION: 4
- OT.SIGNER_MANAGE: 1
- OT.SIGNER_MANAGEMENT: 5
- OT.SIGNER_PROTECT: 1
- OT.SIGNER_PROTECTIO: 2
- OT.SIGNER_PROTECTION: 5
- OT.SIGN_INTEGRITY: 2
- OT.SIG_AUTH_DATA_PROT: 1
- OT.SIG_KEY_GEN: 2
- OT.SVD: 6
- OT.SYSTEM-: 2
- OT.SYSTEM_PROETECTION: 2
- OT.SYSTEM_PROTEC: 1
- OT.SYSTEM_PROTECTION: 4
- R:
- R.AUDIT: 2
- R.RAD: 2
- R.RANDOM: 1
- R.SAD: 19
- R.SVD: 32
- R.TSF_DATA: 10
- T:
- T.ADMIN_IMPERSONATION: 4
- T.AUDIT_ALTERATION: 4
- T.AUTHENTICATION_SIGNER_IMPERSONATION: 3
- T.AUTHORISATION_DATA_DISCLOSE: 1
- T.AUTHORISATION_DATA_UPDATE: 4
- T.AUTH_SIG_IMPERS: 2
- T.CONTEXT_ALTERATION: 4
- T.DTBSR_FORGERY: 4
- T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED: 3
- T.ENROLMENT_SIGNER_IMPERSONAL: 1
- T.ENROLMENT_SIGNER_IMPERSONATION: 3
- T.ENR_SIG_AUTH_DATA_DISCL: 2
- T.MAINTENANCE_AUTHENTICATION_DISCLOSE: 2
- T.MAINT_AUTH_DISCL: 2
- T.PRIVILEGED_USER_INSERTION: 4
- T.RANDOM: 4
- T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION: 3
- T.REF_PRIV_U_AUTH_DATA_MOD: 2
- T.SAD_FORGERY: 4
- T.SAP_BYPASS: 4
- T.SAP_REPLAY: 4
- T.SIGNATURE_FORGERY: 4
- T.SIGNATURE_REQUEST_DISCLOSURE: 3
- T.SIGNER_AUTHENTICATION_DATA_MODIFIED: 3
- T.SIGN_REQ_DISCL: 2
- T.SIG_AUTH_DATA_MOD: 2
- T.SVD_FORGERY: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 14
- AES-128: 1
- AES-256: 2
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 12
- SHA-384: 7
- SHA-512: 4
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA256: 4
- SHA384: 3
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 40
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 7
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- c2pnb208w1: 1
- c2pnb272w1: 1
- c2tnb239v2: 1
- c2tnb359v1: 1
- secp224k1: 2
- secp384r1: 2
- sect233k1: 2
- sect233r1: 2
- sect409k1: 2
- sect409r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 4
- malfunction: 1
- physical tampering: 5
- SCA:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197: 1
- FIPS PUB 198-1: 2
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 10118-: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 2
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- NIST SP 800-90A: 5
- RFC:
- RFC 2246: 1
- RFC 2818: 4
- RFC 4346: 1
- RFC 5246: 3
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS31: 3
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 140-2: 5
- FIPS 186-4: 21
- FIPS 197: 4
- FIPS PUB 140-2: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15946-2: 1
- ISO/IEC 19790:2012: 1
- NIST:
- SP 800-38A: 4
- SP 800-56A: 1
- SP 800-90A: 3
- PKCS:
- PKCS #1: 8
- PKCS#1: 15
- PKCS#11: 7
- PKCS#5: 4
- PKCS#7: 1
- RFC:
- RFC 2104: 5
- RFC 2797: 2
- RFC 4226: 1
- RFC 4493: 2
- RFC 5208: 2
- RFC 5246: 3
- RFC 5639: 2
- RFC 6238: 4
- RFC4226: 7
- RFC4493: 2
- RFC5246: 2
- RFC6238: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20230608114432+09'00'
- /ModDate: D:20230608114432+09'00'
- pdf_file_size_bytes: 753168
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 66
|
- /CreationDate: D:20190502142005+02'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20190502142005+02'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 2798270
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 147
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |