name |
Data Security Kit (E) Software Type II V1.00J |
Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
01.10.2015 |
21.05.2020 |
not_valid_before |
28.09.2010 |
21.05.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0268_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0268_est-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17_cible.pdf |
manufacturer |
KYOCERA MITA Corporation |
Incard Division / ST Microelectronics |
manufacturer_web |
https://www.kyoceramita.com/ |
|
security_level |
EAL3 |
EAL4+, AVA_VAN.5 |
dgst |
dfd674b20f0de202 |
ce97d64b517bf270 |
heuristics/cert_id |
JISEC-CC-CRP-C0268 |
ANSSI-CC-2015/17 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, AVA_SOF.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, AVA_VLA.4, ADV_FSP.4, ATE_IND.2, ASE_CCL.1, AVA_MSU.3 |
heuristics/extracted_versions |
1.00 |
2.11.0, 1.8.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2025/17 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2015/16, ANSSI-CC-2012/68 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2025/17 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/01, ANSSI-CC-2009/26, ANSSI-CC-2009/51, ANSSI-CC-2009/05, ANSSI-CC-2009/06, ANSSI-CC-2012/68, ANSSI-CC-2015/16, ANSSI-CC-2009/50, ANSSI-CC-2010/02, ANSSI-CC-2009/62, ANSSI-CC-2009/28 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0268
- certification_date: 01.09.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0268_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 520i - TASKalfa 420i This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Data Security Kit (E) Software Type II
- product_type: Data protection function in digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0268_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0268_est.pdf
- toe_version: V1.00J
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.10.2015
- supplier: KYOCERA MITA Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0268_it9265.html
- toe_japan_name: Data Security Kit (E) Software Type II V1.00J
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2010/02 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2010/02 |
heuristics/protection_profiles |
{} |
40002c3611fc465f |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0268_erpt.pdf |
ANSSI-CC-2015_17.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2015/17
- cert_item: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
- cert_item_version: Version 1.8.4
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics S.r.l. - Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP-0006] Protection Profile - Secure Signature Creation Device Type 3, version 1.05
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0268-01: 1
- Certification No. C0268: 1
|
- FR:
- ANSSI-CC-2012/68: 1
- ANSSI-CC-2015/16: 1
- ANSSI-CC-2015/17: 17
- ANSSI-CC-PP-2010/07-M01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2010/07-M01: 1
- BSI:
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CE: 1
- A.LOCATION: 1
- A.NETWORK: 2
- T:
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20101215173625+09'00'
- /ModDate: D:20101215173625+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 183868
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /Author: Administrateur
- /CreationDate: D:20150522134048+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.016
- /ModDate: D:20150522134048+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
- /Title: ANSSI-CC-2015/17
- pdf_file_size_bytes: 637015
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
c0268_est-1.pdf |
ANSSI-CC-2015_17_cible.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-2010/02-M01: 1
- ANSSI-CC-2010/02: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 4+: 1
- EAL4: 5
- EAL4 augmented: 2
- EAL4+: 3
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 2
- ADV_IMP.1: 4
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.4: 2
- ALC_DEL.1: 3
- ALC_DVS.1: 3
- ALC_DVS.2: 2
- ALC_LCD.1: 4
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 2
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ.2: 3
- ASE_SPD.1: 2
- ASE_TSS.1: 3
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 3
- ATE_IND.2: 2
- AVA:
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VAN.3: 1
- AVA_VAN.5: 15
- AVA_VLA.4: 2
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
|
- FAU:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 7
- FCS_CKM.1.1: 7
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 9
- FCS_CKM.4.1: 4
- FCS_COP: 10
- FCS_COP.1: 21
- FDP:
- FDP_ACC: 29
- FDP_ACC.1: 9
- FDP_ACC.1.1: 16
- FDP_ACF: 22
- FDP_ACF.1: 23
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 16
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 10
- FDP_ETC: 4
- FDP_ETC.1: 3
- FDP_ETC.1.1: 2
- FDP_ETC.1.2: 2
- FDP_ITC: 6
- FDP_ITC.1: 4
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_RIP.1: 5
- FDP_RIP.1.1: 11
- FDP_SDI: 7
- FDP_SDI.2: 6
- FDP_SDI.2.1: 9
- FDP_SDI.2.2: 7
- FDP_UIT: 10
- FDP_UIT.1: 11
- FDP_UIT.1.1: 7
- FDP_UIT.1.2: 7
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 22
- FIA_AFL.1.2: 4
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_UAU.1: 7
- FIA_UAU.1.1: 6
- FIA_UAU.1.2: 2
- FIA_UID.1: 8
- FIA_UID.1.1: 5
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 7
- FMT_MOF.1.1: 2
- FMT_MSA: 10
- FMT_MSA.1: 2
- FMT_MSA.1.1: 4
- FMT_MSA.2: 8
- FMT_MSA.2.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 5
- FMT_SMF: 4
- FMT_SMF.1: 23
- FMT_SMF.1.1: 4
- FMT_SMR.1: 9
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 4
- FPT_FLS: 1
- FPT_FLS.1: 3
- FPT_FLS.1.1: 8
- FPT_PHP.1: 4
- FPT_PHP.1.1: 7
- FPT_PHP.1.2: 7
- FPT_PHP.3: 4
- FPT_PHP.3.1: 7
- FPT_TRP: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 4
- FPT_TST.1.2: 4
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 17
- FTP_ITC.1.1: 11
- FTP_ITC.1.2: 8
- FTP_ITC.1.3: 8
- FTP_TRP: 8
- FTP_TRP.1: 12
- FTP_TRP.1.1: 7
- FTP_TRP.1.2: 4
- FTP_TRP.1.3: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CE: 4
- A.LOCATION: 5
- A.NETWORK: 5
- O:
- OE:
- OE.CE: 3
- OE.LOCATION: 3
- OE.NETWORK: 3
- T:
|
- A:
- A.CGA: 5
- A.NO-DELETION: 2
- A.NO-INSTALL: 3
- A.SCA: 3
- A.SGA: 1
- A.VERIFICATION: 3
- O:
- O.ALARM: 5
- O.CIPHER: 4
- O.CSP: 1
- O.FIREWALL: 2
- O.GLOBAL_ARRAYS_INTEG: 1
- O.KEY-MNGT: 4
- O.NATIVE: 2
- O.OBJ-DEL: 2
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 4
- O.ROLES: 1
- O.SCP: 6
- O.SID: 1
- O.SIDE_CHANNEL: 4
- O.TRANSACTION: 1
- OE:
- OE.CARD_MANAGEMENT: 5
- OE.HI_VAD: 8
- OE.MANAGEMENT_OF_SECRETS: 5
- OE.NO-DELETION: 2
- OE.NO-INSTALL: 1
- OE.VERIFICATION: 7
- OSP:
- OSP.CARD_ADMINISTRATION_DISABLED: 2
- OSP.MANAGEMENT_OF_SECRETS: 3
- OSP.ROLES: 2
- OSP.VERIFICATION: 1
- OT:
- T:
- T.EXE-CODE: 6
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 5
- T.NATIVE: 3
- T.PHYSICAL: 3
- T.TYPE: 1
|
pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- STM: 1
- STMicroelectronics: 19
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 6
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Physical tampering: 2
- physical tampering: 6
- SCA:
- DPA: 2
- SPA: 2
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS PUB 113: 1
- FIPS PUB 180-1: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14443-3: 1
- ISO/IEC 14443-4: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 7816: 12
- ISO/IEC 7816-: 1
- ISO/IEC 9797-1: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation: 1
- This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation) o GP API (This interface is permanently disabled before TOE delivery and it: 1
- This interface is permanently disabled before TOE delivery and it is out of scope of current evaluation: 1
- out of scope: 2
- out of scope of current evaluation) o Javacard 3.0.4 API o Proprietary API o Operating System o The Secured: 1
|
pdf_data/st_metadata |
- /Author: KYOCERA MITA Corporation
- /CreationDate: D:20101129104216+09'00'
- /Creator: CubePDF
- /ModDate: D:20101129104216+09'00'
- /Producer: CubePDF
- /Title: Data Security Kit (E) Software Type II Japan Security Target
- pdf_file_size_bytes: 325118
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: saverio donatiello
- /CreationDate: D:20150429154456+02'00'
- /Creator: PDFCreator Version 1.7.3
- /Keywords:
- /ModDate: D:20150429154456+02'00'
- /Producer: GPL Ghostscript 9.10
- /Subject:
- /Title: J-SIGN_SecurtyTarget_Lite
- pdf_file_size_bytes: 1850122
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |