Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00
JISEC-CC-CRP-C0265
TCOS Residence Permit Card Version 1.1 Release 2/ SLE78CLX1440P
BSI-DSZ-CC-0835-V2-2017
name bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00 TCOS Residence Permit Card Version 1.1 Release 2/ SLE78CLX1440P
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 01.09.2015 12.01.2022
not_valid_before 31.08.2010 12.01.2017
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0835V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0835V2b_pdf.pdf
manufacturer Konica Minolta Business Technologies, Inc T-Systems International GMBH
manufacturer_web https://www.konicaminolta.com/ https://www.t-systems.de/
security_level EAL3 EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5
dgst e1cef4b86461e7ab 93c0b4b06d56ea9d
heuristics/cert_id JISEC-CC-CRP-C0265 BSI-DSZ-CC-0835-V2-2017
heuristics/cert_lab [] BSI
heuristics/extracted_sars AVA_VLA.2, ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 283, 423, 7828, 0100, 00, 363, 223 1.1
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0836-V2-2017
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0829-V2-2015
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0836-V2-2017
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0729-2011, BSI-DSZ-CC-0829-V2-2015, BSI-DSZ-CC-0640-2010
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0265
  • certification_date: 01.08.2010
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0265_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as 溺FP・ or through the network, and provides the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in MFP, TOE can encrypt all the data written in HDD including image data using ASIC (Application Specific Integrated Circuit). Besides, TOE provides the function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards, and the function that controls the access from the public telephone line against the danger using Fax function as a steppingstone to access internal network. TOE security functionality TOE provides the following security functions. - Administrator function - SNMP administrator function - Service mode function - User function - User box function - Secure print function - ID & print function - All area overwrite deletion function - Encryption key generation function - Authentication Failure Frequency Reset function - Trusted Channel function - S/MIME encryption processing function - External Server authentication operation support function - ASIC support function - WebDAV administrator function - Fax unit control function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0265_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0265_est.pdf
    • toe_version: A1UD0Y0-0100-GM0-00
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.04.2011
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software A1UD0Y0-0100-GM0-00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0265_it9283.html
  • toe_overseas_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software A1UD0Y0-0100-GM0-00
heuristics/protection_profiles {} e953e9038a8c827e
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0069b_pdf.pdf
pdf_data/report_filename c0265_erpt.pdf 0835V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 The IT Product identified in this certificate has been evaluated at an approved evaluation facility using the Common Methodology for IT Security Evaluation (CEM), Version 3.1 extended by Scheme Interpretations, by advice of the Certification Body for components beyond EAL 5 and CC Supporting Documents as listed in the Certification Report for conformance to the Common Criteria for IT Security Evaluation (CC), Version 3.1. CC and CEM are also published as ISO/IEC 15408 and ISO/IEC 18045. (*) This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report and Notification. For details on the validity see Certification Report part A chapter 4 (**
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0835-V2-2017
    • cert_item: TCOS Residence Permit Card Version 1.1 Release 2/ SLE78CLX1440P
    • cert_lab: BSI
    • developer: T-Systems International GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Electronic Residence Permit Card (RP_Card PP), Version 1.0, Compliant to EU – Residence Permit Specification, BSI-CC-PP-0069-2010, 13 August 2010 (**) and in accordance with BSI Technische Richtlinie BSI-TR-03116-2, 2016
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0265-01: 1
    • Certification No. C0265: 1
  • DE:
    • BSI-DSZ-CC-0829-V2-2015: 4
    • BSI-DSZ-CC-0829-V2-2015-MA-01: 1
    • BSI-DSZ-CC-0835-2013: 3
    • BSI-DSZ-CC-0835-2013-MA-01: 2
    • BSI-DSZ-CC-0835-2013-MA-02: 2
    • BSI-DSZ-CC-0835-V2-2017: 20
    • BSI-DSZ-CC-S-0053-2016: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0069-2010: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 13
    • EAL 4 augmented: 3
    • EAL 5: 9
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
    • EAL5: 1
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 6
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 6
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-BOX: 2
    • T.ACCESS-PRIVATE-BO: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-BOX: 2
    • T.ACCESS-SECURE-PRI: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 2
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRANS: 1
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 7
    • Infineon Technologies: 1
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
  • TSystems:
    • T-Systems International: 11
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
  • PACE:
    • PACE: 3
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • BSI:
    • AIS 20: 1
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 2
    • AIS 36: 6
    • AIS 38: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 180-2: 1
    • FIPS PUB 46-3: 1
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 15408: 6
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 6
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
  • ConfidentialDocument:
    • M7820 A11, Version 5, 16.07.2015, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [11] Configuration list for the TOE, Konfigurationsliste von TCOS Residence Permit Card Version 1: 1
    • Permit Card Version 1.1 Release 2/ SLE78CLX1440P, SRC Security Research & Consulting GmbH (confidential document) 11 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
    • Release 2/ SLE78CLX1440P, 28.11.2016, Version 1.31, T-Systems International GmbH (confidential document) [12] TCOS Residence Permit Card 1.1, Release 2, Administrator's Guidance, Guidance Documentation: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /CreationDate: D:20101213141346+09'00'
  • /ModDate: D:20101213141346+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 235716
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename c0265_est.pdf 0835V2b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0829-V2-2015-MA-01: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0061-2009: 1
    • BSI-CC-PP-0035-2007: 1
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0068-2009: 2
    • BSI-CC-PP-0068-2009’: 1
    • BSI-PP- 0056-2009’: 1
    • BSI-PP-0026: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056-2009: 1
    • BSI-PP-0069: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL4: 12
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VLA.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 2
    • ADV_COMP: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 3
    • ADV_TDS: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 6
    • ALC_DVS: 1
    • ALC_DVS.2: 11
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 6
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 72
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 55
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 71
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 29
    • FIA_ATD.1.1: 1
    • FIA_MSA.3: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 44
    • FIA_SOS.1.1: 5
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 43
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 44
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 48
    • FIA_UID.2.1: 7
    • FIA_USB.1: 26
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 31
    • FMT_MOF.1.1: 3
    • FMT_MSA: 5
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 42
    • FMT_MSA.3.1: 6
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 119
    • FMT_MTD.1.1: 13
    • FMT_SMF.1: 110
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 171
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SMS.1: 1
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_SAS: 8
    • FAU_SAS.1: 15
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 94
    • FCS_CKM.1: 23
    • FCS_CKM.2: 8
    • FCS_CKM.4: 50
    • FCS_CKM.4.1: 1
    • FCS_COP: 105
    • FCS_COP.1: 18
    • FCS_RND: 7
    • FCS_RND.1: 12
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 53
    • FDP_ACC.1: 18
    • FDP_ACF: 46
    • FDP_ACF.1: 31
    • FDP_AFC: 1
    • FDP_IFC.1: 8
    • FDP_ITC: 8
    • FDP_ITC.1: 10
    • FDP_ITC.2: 19
    • FDP_ITT.1: 1
    • FDP_RIP: 5
    • FDP_RIP.1: 20
    • FDP_RIP.1.1: 1
    • FDP_SDI: 21
    • FDP_SDI.1: 3
    • FDP_SDI.2: 5
    • FDP_UCT: 1
    • FDP_UIT: 1
  • FIA:
    • FIA_AFL: 46
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_API: 33
    • FIA_API.1: 6
    • FIA_API.1.1: 4
    • FIA_APO: 14
    • FIA_APO.1: 4
    • FIA_APO.1.1: 1
    • FIA_UAU: 100
    • FIA_UAU.1: 17
    • FIA_UAU.4: 10
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 20
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UIA: 1
    • FIA_UID: 48
    • FIA_UID.1: 16
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_LIM: 9
    • FMT_LIM.1: 24
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 22
    • FMT_LIM.2.1: 2
    • FMT_MDT.3: 1
    • FMT_MOF: 8
    • FMT_MOF.1: 1
    • FMT_MSA: 61
    • FMT_MSA.1: 10
    • FMT_MSA.2: 2
    • FMT_MSA.3: 11
    • FMT_MSA.4: 1
    • FMT_MTD: 150
    • FMT_MTD.1: 13
    • FMT_MTD.3: 14
    • FMT_MTD.3.1: 1
    • FMT_SMF: 19
    • FMT_SMF.1: 63
    • FMT_SMF.1.1: 2
    • FMT_SMR: 5
    • FMT_SMR.1: 50
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS: 4
    • FPT_FLS.1: 17
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP: 11
    • FPT_PHP.1: 2
    • FPT_PHP.3: 17
    • FPT_PHP.3.1: 1
    • FPT_TST: 5
    • FPT_TST.1: 15
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 33
    • FTP_ITC.1: 2
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 4
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.AUTH-CAPABILITY: 7
    • O.CONFIG: 11
    • O.CRYPT-KEY: 1
    • O.CRYPTO-CAPABILITY: 7
    • O.CRYPTO-KEY: 3
    • O.CRYPTO-MAIL: 4
    • O.FAX-CONTROL: 7
    • O.GROUP-BOX: 5
    • O.OVERWRITE-ALL: 7
    • O.PRIVATE-BOX: 5
    • O.PUBLIC-BOX: 8
    • O.REGISTERED-USER: 14
    • O.SECURE-PRINT: 8
    • O.TRUSTED-PASS: 7
  • OE:
    • OE.ADMIN: 3
    • OE.FAX-UNIT: 3
    • OE.FEED-BACK: 10
    • OE.NETWORK: 3
    • OE.SECRET: 3
    • OE.SERVER: 6
    • OE.SERVICE: 3
    • OE.SESSION: 10
    • OE.SETTING-SECURITY: 3
  • T:
    • T.ACCESS-GROUP-BOX: 3
    • T.ACCESS-PRIVATE-BOX: 3
    • T.ACCESS-PUBLIC-BOX: 2
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 3
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 3
    • T.UNEXPECTED-TRANSMISSION: 3
  • A:
    • A.CGA: 3
    • A.SCA: 3
  • O:
    • O.MEM_ACCESS: 1
    • O.RND: 3
  • OE:
    • OE.CGA_SSCD: 2
    • OE.HID_VAD: 4
  • T:
    • T.MEM_ACCESS: 1
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 1
    • Infineon Technologies AG: 1
pdf_data/st_keywords/eval_facility
  • TSystems:
    • T-Systems International: 159
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • 3DES: 1
  • AES_competition:
    • AES:
      • AES: 26
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 2
      • TDES: 2
      • Triple-DES: 9
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 8
      • KMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 10
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • DH: 4
      • Diffie-Hellman: 13
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-2: 3
      • SHA-224: 3
      • SHA-256: 4
      • SHA-384: 1
      • SHA-512: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 4
  • PACE:
    • PACE: 131
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 7
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP192r1: 1
    • brainpoolP224r1: 1
    • brainpoolP256r1: 1
    • brainpoolP320r1: 1
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
  • NIST:
    • NIST P-256: 3
    • P-256: 3
    • secp256r1: 1
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 10
    • Physical Tampering: 2
    • Physical tampering: 1
    • fault injection: 2
    • malfunction: 6
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • Leak-Inherent: 6
    • Physical Probing: 2
    • physical probing: 3
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG14: 1
    • EF.SOD: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186-2: 6
    • FIPS PUB 197: 3
  • X509:
    • X.509: 1
  • BSI:
    • AIS 31: 1
    • AIS 36: 1
    • AIS31: 5
    • AIS36: 4
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS 180: 1
    • FIPS 180-2: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 180-2: 1
    • FIPS PUB 186-3: 1
    • FIPS PUB 46-3: 1
    • FIPS180: 1
    • FIPS186: 7
    • FIPS197: 4
    • FIPS46: 2
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#3: 4
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
    • RFC 5639: 6
    • RFC3369: 1
    • RFC5639: 8
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
  • OutOfScope:
    • For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf: 1
    • For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf. [EACTR, Part 3, B.7]). 8 For the ePassport application: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20101202154851+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20101202155121+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - C0265_ASE.doc
  • /_AdHocReviewCycleID: -379351262
  • /_PreviousAdHocReviewCycleID: 467482879
  • pdf_file_size_bytes: 772548
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 111
  • /Author: T-Systems International GmbH
  • /CreationDate: D:20161124163234+01'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Electronic Identity Card, Residence Permit Card, eID, eSign, MRTD, PACE, EAC, SSCD, QSCD
  • /ModDate: D:20161124163234+01'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: TCOS Residence Permit Card Version 1.1 Release 2
  • /Title: Security Target TCOS Residence Permit Card Version 1.1 Release 2 (IFX)
  • pdf_file_size_bytes: 2046144
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 151
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different