Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Data Security Kit (E) Software Type II V1.00J
JISEC-CC-CRP-C0268
STARCOS 3.2 eGK Version 1.0
BSI-DSZ-CC-0406-2007
name Data Security Kit (E) Software Type II V1.00J STARCOS 3.2 eGK Version 1.0
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 01.10.2015 01.09.2019
not_valid_before 28.09.2010 18.12.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0268_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080514_0406a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0268_est-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080514_0406b.pdf
manufacturer KYOCERA MITA Corporation G+D Mobile Security GmbH
manufacturer_web https://www.kyoceramita.com/ https://www.gi-de.com/de/de/mobile-security/
security_level EAL3 ADV_IMP.2, AVA_MSU.3, EAL4+, AVA_VLA.4
dgst dfd674b20f0de202 1d84f97a0f8761d5
heuristics/cert_id JISEC-CC-CRP-C0268 BSI-DSZ-CC-0406-2007
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ADV_RCR.1, ALC_TAT.1, ADV_FSP.1, AVA_VLA.4, ADV_HLD.2, AGD_USR.1, AGD_ADM.1, ADV_LLD.1, ADV_IMP.2, ADV_SPM.1, AVA_MSU.3
heuristics/extracted_versions 1.00 3.2, 1.0
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0407-2008, BSI-DSZ-CC-0533-2009
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0322-2005
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0407-2008, BSI-DSZ-CC-0533-2009
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0223-2003
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0268
  • certification_date: 01.09.2010
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0268_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 520i - TASKalfa 420i This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Data Security Kit (E) Software Type II
    • product_type: Data protection function in digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0268_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0268_est.pdf
    • toe_version: V1.00J
    • vendor: KYOCERA MITA Corporation
  • expiration_date: 01.10.2015
  • supplier: KYOCERA MITA Corporation
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0268_it9265.html
  • toe_japan_name: Data Security Kit (E) Software Type II V1.00J
  • toe_overseas_link: None
  • toe_overseas_name: -----
pdf_data/report_filename c0268_erpt.pdf 20080514_0406a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0406-2007
    • cert_item: STARCOS 3.2 eGK Version 1.0
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH Certification Report V1.1 ZS-01-01-F-326 V4.04 BSI -
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0268-01: 1
    • Certification No. C0268: 1
  • DE:
    • BSI-DSZ-CC-0322-2005: 1
    • BSI-DSZ-CC-0406-2007: 19
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0020-: 1
    • BSI-PP-0020-V2-: 1
    • BSI-PP-0020-V2-2007: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 1: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_IMP.2: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_TAT: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 3
    • ATE_IND: 4
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 5
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.CE: 1
    • A.LOCATION: 1
    • A.NETWORK: 2
  • T:
    • T.RESIDUAL: 2
    • T.TEMP: 3
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 5
    • Giesecke & Devrient: 9
  • Infineon:
    • Infineon: 3
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • AES_competition:
    • E2:
      • E2: 1
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 3
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 1
    • RSA 1280: 1
    • RSA 1536: 1
    • RSA 2048: 2
pdf_data/report_keywords/hash_function
  • RIPEMD:
    • RIPEMD: 1
    • RIPEMD-160: 3
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 3
      • SHA-256: 3
      • SHA-384: 3
      • SHA-512: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
    • physical tampering: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS: 1
    • STARCOS 3: 25
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • FIPS:
    • FIPS PUB 197: 2
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
    • ISO/IEC 9796-1: 1
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 2007, Version 7, 13.12.2007, Evaluation Body for IT-Security of TÜV Informationstechnik GmbH (confidential document) [9] Common Criteria Protection Profile electronic Health Card (eHC) – elektronische: 1
    • Security Target of STARCOS 3.2 eGK, BSI-DSZ-0406-2007, Version 1.4, 20.11.2007, Giesecke&Devrient (confidential document) [7] Security Target Lite of STARCOS 3.2 eGK, BSI-DSZ-0406-2007, Version 1.1, 20.11.2007: 1
    • list for the TOE, Version 1.7, 13.12.2007, Configuration List STARCOS 3.2 eGK, Giesecke&Devrient (confidential document) [11] Administrator Guidance STARCOS 3.2 eGK; STARCOS 3.2 QES V1.0, Version 1.0/Status 13.12.07: 1
pdf_data/report_metadata
  • /CreationDate: D:20101215173625+09'00'
  • /ModDate: D:20101215173625+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 183868
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20080303080757+01'00'
  • /Creator: Acrobat PDFMaker 8.1 für Word
  • /Keywords: "Common Criteria, Certification, Zertifizierung, elektronische Gesundheitskarte, eGK, Common Criteria, CC"
  • /ModDate: D:20080303164731+01'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20080303070750
  • /Title: Certification Report BSI-DSZ-CC-0406-2007
  • pdf_file_size_bytes: 254398
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename c0268_est-1.pdf 20080514_0406b.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0322-2005-MA-04: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-****: 1
    • BSI-PP-0002: 2
    • BSI-PP-0002-2001: 1
    • BSI-PP-0005-: 1
    • BSI-PP-0006-2002T: 1
    • BSI-PP-0020-V2-2007: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 5
  • EAL:
    • EAL4: 11
    • EAL4 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADO:
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 6
    • ADV_LLD.1: 2
    • ADV_RCR.1: 1
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_TAT.1: 1
  • AVA:
    • AVA_MSU.3: 5
    • AVA_VLA.4: 6
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FCS:
    • FCS_CKM: 7
    • FCS_CKM.1: 24
    • FCS_CKM.2: 2
    • FCS_CKM.4: 26
    • FCS_CKM.4.1: 3
    • FCS_COP: 45
    • FCS_COP.1: 27
    • FCS_RND: 9
    • FCS_RND.1: 13
    • FCS_RND.1.1: 4
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.2: 14
    • FDP_ACC.2.1: 4
    • FDP_ACC.2.2: 5
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC.1: 4
    • FDP_ITC.1: 16
    • FDP_ITC.2: 15
    • FDP_RIP: 14
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 2
    • FDP_SDI.1: 2
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 3
    • FDP_SDI.2.2: 3
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 3
    • FDP_UIT.1: 6
    • FDP_UIT.1.1: 3
    • FDP_UIT.1.2: 3
  • FIA:
    • FIA_AFL: 42
    • FIA_AFL.1: 25
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 3
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 8
    • FIA_UAU.4.1: 3
    • FIA_UID.1: 8
    • FIA_UID.1.1: 3
    • FIA_UID.1.2: 3
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 20
    • FMT_LIM.1.1: 4
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 3
    • FMT_MSA.1: 1
    • FMT_MSA.2: 19
    • FMT_MSA.3: 2
    • FMT_MTD: 27
    • FMT_MTD.1: 19
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 3
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_AMT.1: 2
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 3
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 3
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 3
    • FPT_SEP.1: 10
    • FPT_SEP.1.1: 3
    • FPT_SEP.1.2: 3
    • FPT_TST.1: 11
    • FPT_TST.1.1: 3
    • FPT_TST.1.2: 3
    • FPT_TST.1.3: 3
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 3
    • FTP_ITC.1.3: 3
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.CE: 4
    • A.LOCATION: 5
    • A.NETWORK: 5
  • O:
    • O.ENCRYPT: 5
    • O.REMAIN: 6
  • OE:
    • OE.CE: 3
    • OE.LOCATION: 3
    • OE.NETWORK: 3
  • T:
    • T.RESIDUAL: 4
    • T.TEMP: 3
pdf_data/st_keywords/vendor
  • GD:
    • Giesecke & Devrient: 11
  • Infineon:
    • Infineon: 9
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • AES_competition:
    • HPC:
      • HPC: 17
  • DES:
    • 3DES:
      • 3-DES: 2
      • TDES: 5
      • Triple-DES: 11
    • DES:
      • DES: 5
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 1
pdf_data/st_keywords/hash_function
  • RIPEMD:
    • RIPEMD-160: 5
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-2: 8
      • SHA-224: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 21
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 2
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 4
    • physical tampering: 7
  • SCA:
    • DPA: 1
    • physical probing: 5
    • side channel: 1
    • side channels: 2
  • other:
    • Bleichenbacher attack: 1
    • reverse engineering: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 7
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS 20: 1
    • AIS20: 2
    • AIS31: 2
  • CC:
    • CCIMB-2005-08-001: 1
    • CCIMB-2005-08-002: 1
    • CCIMB-2005-08-003: 1
    • CCIMB-2005-08-004: 1
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
  • FIPS:
    • FIPS 180-2: 3
    • FIPS 46-3: 2
    • FIPS PUB 46-3: 2
  • ISO:
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9796-1: 1
    • ISO/IEC9796-2: 5
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 8
  • X509:
    • X.509: 8
    • x.509: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • FDP_ACF.1 Note by the ST-author 31: Keys and other data for creation of qualified signatures are out of scope of this Security Target. The TOE shall meet the requirement “Security attribute based access: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: KYOCERA MITA Corporation
  • /CreationDate: D:20101129104216+09'00'
  • /Creator: CubePDF
  • /ModDate: D:20101129104216+09'00'
  • /Producer: CubePDF
  • /Title: Data Security Kit (E) Software Type II Japan Security Target
  • pdf_file_size_bytes: 325118
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /CreationDate: D:20071120144357+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20080303164809+01'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Security Target Lite STARCOS 3.2 eGK V1.0
  • pdf_file_size_bytes: 374430
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 114
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different