Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Data Security Kit (E) Software Type II V1.00J
JISEC-CC-CRP-C0268
IDEAL CITIZ V2.17-I on Infineon M7892 B11 embedding ID.me 1.6-i application
ANSSI-CC-2018/44-S01
name Data Security Kit (E) Software Type II V1.00J IDEAL CITIZ V2.17-I on Infineon M7892 B11 embedding ID.me 1.6-i application
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
status archived active
not_valid_after 01.10.2015 03.12.2026
not_valid_before 28.09.2010 05.10.2018
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0268_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_44-s01fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0268_est-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_44en.pdf
manufacturer KYOCERA MITA Corporation Idemia
manufacturer_web https://www.kyoceramita.com/ https://www.idemia.com
security_level EAL3 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst dfd674b20f0de202 1a628b5ce7f4b999
heuristics/cert_id JISEC-CC-CRP-C0268 ANSSI-CC-2018/44-S01
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ASE_CCL.1
heuristics/extracted_versions 1.00 1.6, 2.17
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0268
  • certification_date: 01.09.2010
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0268_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 520i - TASKalfa 420i This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Data Security Kit (E) Software Type II
    • product_type: Data protection function in digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0268_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0268_est.pdf
    • toe_version: V1.00J
    • vendor: KYOCERA MITA Corporation
  • expiration_date: 01.10.2015
  • supplier: KYOCERA MITA Corporation
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0268_it9265.html
  • toe_japan_name: Data Security Kit (E) Software Type II V1.00J
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27
heuristics/protection_profiles {} cb889a58ddbeb837
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/authpp[1].pdf
pdf_data/report_filename c0268_erpt.pdf certificat-anssi-cc-2018_44-s01fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0268-01: 1
    • Certification No. C0268: 1
  • FR:
    • ANSSI-CC-2018/44-S01: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.CE: 1
    • A.LOCATION: 1
    • A.NETWORK: 2
  • T:
    • T.RESIDUAL: 2
    • T.TEMP: 3
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 2
  • Infineon:
    • Infineon: 1
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • FIPS:
    • FIPS PUB 197: 2
pdf_data/report_metadata
  • /CreationDate: D:20101215173625+09'00'
  • /ModDate: D:20101215173625+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 183868
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
  • /Author:
  • /CreationDate: D:20211207160024+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211207160024+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 280419
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/st_filename c0268_est-1.pdf anssi-cible-cc-2018_44en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-V4-2018: 2
  • FR:
    • ANSSI-CC-2018/27: 1
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0068-V2-: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-CC-PP-0086: 1
    • BSI-PP-0035: 1
  • other:
    • PP-SSCD2: 21
    • PP-SSCD3: 21
    • PP-SSCD4: 24
    • PP-SSCD5: 18
    • PP-SSCD6: 23
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 5
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL 5+: 1
    • EAL 6+: 1
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL5: 3
    • EAL5 augmented: 3
    • EAL5+: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 5
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 8
    • ADV_IMP.1: 8
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 5
    • AGD_PRE: 2
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 24
    • FCS_CKM.1: 25
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 31
    • FCS_CKM.4.1: 1
    • FCS_COP: 40
    • FCS_COP.1: 17
    • FCS_COP.1.1: 1
    • FCS_RND: 5
    • FCS_RND.1: 20
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 67
    • FDP_ACC.1: 19
    • FDP_ACF: 56
    • FDP_ACF.1: 30
    • FDP_DAU: 9
    • FDP_DAU.2: 2
    • FDP_IFC.1: 9
    • FDP_ITC: 11
    • FDP_ITC.1: 9
    • FDP_ITC.2: 6
    • FDP_RIP.1: 25
    • FDP_RIP.1.1: 1
    • FDP_SDI: 20
    • FDP_SDI.2: 4
    • FDP_UCT: 22
    • FDP_UCT.1: 2
    • FDP_UIT: 18
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 36
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 19
    • FIA_API.1: 12
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU: 93
    • FIA_UAU.1: 23
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 1
    • FIA_UAU.5: 3
    • FIA_UAU.6: 2
    • FIA_UID: 34
    • FIA_UID.1: 25
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 14
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 13
    • FMT_LIM.2.1: 2
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 21
    • FMT_MSA.1: 5
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 13
    • FMT_MSA.4.1: 1
    • FMT_MTD: 176
    • FMT_MTD.1: 15
    • FMT_MTD.3: 11
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 57
    • FMT_SMF.1.1: 1
    • FMT_SMR: 28
    • FMT_SMR.1: 37
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 16
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 15
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 17
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 73
    • FTP_ITC.1: 22
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.CE: 4
    • A.LOCATION: 5
    • A.NETWORK: 5
  • O:
    • O.ENCRYPT: 5
    • O.REMAIN: 6
  • OE:
    • OE.CE: 3
    • OE.LOCATION: 3
    • OE.NETWORK: 3
  • T:
    • T.RESIDUAL: 4
    • T.TEMP: 3
  • A:
    • A.CGA: 6
    • A.CSP: 9
    • A.SCA: 5
  • D:
    • D.SCD: 1
    • D.SVD: 1
  • OE:
    • OE.HID_VAD: 7
    • OE.HI_VAD: 2
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 17
  • Infineon:
    • Infineon: 14
pdf_data/st_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • AES_competition:
    • AES:
      • AES: 20
  • DES:
    • 3DES:
      • 3DES: 10
      • TDES: 9
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 5
      • KMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 17
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 2
  • RSA:
    • RSA-OAEP: 1
    • RSA-PSS: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-2: 2
      • SHA-224: 5
      • SHA-256: 5
      • SHA-384: 5
      • SHA-512: 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 118
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 11
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 5
    • Physical Tampering: 1
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 7
  • SCA:
    • DPA: 3
    • SPA: 3
    • physical probing: 3
    • side channel: 1
    • timing attacks: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.CardAccess: 2
    • EF.ChipSecurity: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS31: 5
  • CC:
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-2: 2
    • FIPS180-4: 1
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 15408:2005: 2
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9797-: 1
    • ISO/IEC 9797-1: 2
  • NIST:
    • NIST SP 800-38B: 1
  • PKCS:
    • PKCS#1: 4
    • PKCS1: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE: 1
    • ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDeal Citiz v2.17-i Java Card Open Platform enforces separation of the data between: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: KYOCERA MITA Corporation
  • /CreationDate: D:20101129104216+09'00'
  • /Creator: CubePDF
  • /ModDate: D:20101129104216+09'00'
  • /Producer: CubePDF
  • /Title: Data Security Kit (E) Software Type II Japan Security Target
  • pdf_file_size_bytes: 325118
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /Author: G509704
  • /CreationDate: D:20180925153329+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20180925153329+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Title
  • pdf_file_size_bytes: 2635084
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 143
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different