name |
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00 |
MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
01.09.2015 |
30.04.2023 |
not_valid_before |
31.08.2010 |
30.04.2018 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0995c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0995a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0995b_pdf.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
MaskTech International GmbH |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.masktech.de/ |
security_level |
EAL3 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
e1cef4b86461e7ab |
fb79b6e113f0e45e |
heuristics/cert_id |
JISEC-CC-CRP-C0265 |
BSI-DSZ-CC-0995-2018 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VLA.2, ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ASE_TSS.2, ADV_TDS.4, ASE_REQ.2, ALC_COMP.1, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
283, 423, 7828, 0100, 00, 363, 223 |
2.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1001-2018, BSI-DSZ-CC-1064-2020, BSI-DSZ-CC-0996-2018, BSI-DSZ-CC-1033-2019 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0996-2018, BSI-DSZ-CC-0973-V2-2016 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-1221-2024, BSI-DSZ-CC-1065-2020, BSI-DSZ-CC-1147-2020, BSI-DSZ-CC-1211-2023, BSI-DSZ-CC-1064-2020, BSI-DSZ-CC-1220-2024, BSI-DSZ-CC-1219-2024, BSI-DSZ-CC-1034-V2-2021, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-1147-V3-2023, BSI-DSZ-CC-1033-V2-2021, BSI-DSZ-CC-0996-2018, BSI-DSZ-CC-1034-2019, BSI-DSZ-CC-1001-2018, BSI-DSZ-CC-0995-2018, BSI-DSZ-CC-1148-V2-2023, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1036-2019 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0996-2018, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0995-2018, BSI-DSZ-CC-0973-V2-2016 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0265
- certification_date: 01.08.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0265_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as 溺FP・ or through the network, and provides the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in MFP, TOE can encrypt all the data written in HDD including image data using ASIC (Application Specific Integrated Circuit). Besides, TOE provides the function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards, and the function that controls the access from the public telephone line against the danger using Fax function as a steppingstone to access internal network. TOE security functionality TOE provides the following security functions. - Administrator function - SNMP administrator function - Service mode function - User function - User box function - Secure print function - ID & print function - All area overwrite deletion function - Encryption key generation function - Authentication Failure Frequency Reset function - Trusted Channel function - S/MIME encryption processing function - External Server authentication operation support function - ASIC support function - WebDAV administrator function - Fax unit control function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0265_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0265_est.pdf
- toe_version: A1UD0Y0-0100-GM0-00
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.04.2011
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software A1UD0Y0-0100-GM0-00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0265_it9283.html
- toe_overseas_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software A1UD0Y0-0100-GM0-00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
a33327d40f253f46 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename |
|
0995c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 2
- EAL 5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ICAO:
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180504104251+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, MRTD, EAC with PACE"
- /ModDate: D:20180524121743+02'00'
- /Producer: LibreOffice 5.2
- /Subject: MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB)
- /Title: Certificate BSI-DSZ-CC-0995-2018
- pdf_file_size_bytes: 364943
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0265_erpt.pdf |
0995a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0995-2018
- cert_item: MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB
- cert_lab: BSI
- developer: MaskTech International GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Machine Readable Travel Document with "ICAO Application", Extended Access Control with PACE (EAC PP), Version 1.3.2, 5 December 2012, BSI- CC-PP-0056-V2-2012-MA-02
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0265-01: 1
- Certification No. C0265: 1
|
- DE:
- BSI-DSZ-CC-0973-V2-2016: 1
- BSI-DSZ-CC-0995-2018: 18
- BSI-DSZ-CC-0996-2018: 2
- BSI-DSZ-CC-1001-: 1
- BSI-DSZ-CC-S-0064-2016: 1
- BSI-DSZ-CC-S-0073-2016: 1
- NL:
- CC-17-67206: 3
- CC-67206-CR2: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0056-V2-2012-MA-: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0068-V2-: 1
- BSI-CC-PP-0068-V2-2011: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL 5: 8
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-GROUP-BOX: 2
- T.ACCESS-PRIVATE-BO: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRI: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 2
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRANS: 1
- T.UNEXPECTED-TRANSMISSION: 1
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 6
- NXP Semiconductors: 2
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 1
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 4
- AIS 38: 1
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
|
- ConfidentialDocument:
- - MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with "ICAO Application", Extended Access: 1
- 11.2017, TÜV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID: 1
- 2.5 EAC with PACE / P60D145VB_J (P6022y VB), MaskTech International GmbH, Version 0.3, 16.02.2018 (confidential document) [12] MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) User Guidance, MaskTech International: 1
- Application”, MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), MaskTech International GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0995-2018, Version 1.1, 16.02.2018, Security Target – Machine: 1
- Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VB: 1
- VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, TÜV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20101213141346+09'00'
- /ModDate: D:20101213141346+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 235716
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180504104224+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, MRTD, EAC with PACE"
- /ModDate: D:20180504111206+02'00'
- /Producer: LibreOffice 5.2
- /Subject: MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB)
- /Title: Certification Report BSI-DSZ-CC-0995-2018
- pdf_file_size_bytes: 825111
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
pdf_data/st_filename |
c0265_est.pdf |
0995b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0995: 1
- BSI-DSZ-CC-1001: 1
- BSI-DSZ-CC-S-0064-2016: 1
- BSI-DSZ-CC-S-0073-2016: 1
- BSI-DSZ-CC-S-0097-2017: 1
- NL:
- CC-17-67206: 1
- NSCIB-CC-15-67206-CR2: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP-0056-: 1
- BSI-CC-PP-0056-V2: 1
- BSI-CC-PP-0056-V2-2011: 1
- BSI-CC-PP-0056-V2-2012: 2
- BSI-CC-PP-0068-V2: 2
- BSI-CC-PP-0068-V2-2011: 2
- BSI-CC-PP-0084-2014: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL5: 14
- EAL5 augmented: 6
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 7
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ASE_TSS.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 2
- ATE_DPT.3: 2
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 7
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 72
- FDP_ACC.1.1: 4
- FDP_ACF.1: 55
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ACP.1: 1
- FDP_IFC.1: 14
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 71
- FIA_AFL.1.1: 9
- FIA_AFL.1.2: 9
- FIA_ATD.1: 29
- FIA_ATD.1.1: 1
- FIA_MSA.3: 1
- FIA_SOS: 1
- FIA_SOS.1: 44
- FIA_SOS.1.1: 5
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU: 2
- FIA_UAU.1: 43
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 44
- FIA_UAU.2.1: 4
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID.1: 31
- FIA_UID.2: 48
- FIA_UID.2.1: 7
- FIA_USB.1: 26
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 31
- FMT_MOF.1.1: 3
- FMT_MSA: 5
- FMT_MSA.1: 34
- FMT_MSA.1.1: 3
- FMT_MSA.3: 42
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 7
- FMT_MTD.1: 119
- FMT_MTD.1.1: 13
- FMT_SMF.1: 110
- FMT_SMF.1.1: 1
- FMT_SMR.1: 171
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SMS.1: 1
- FMT_SOS.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_SAS.1: 13
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 59
- FCS_CKM.1: 27
- FCS_CKM.2: 8
- FCS_CKM.4: 48
- FCS_CKM.4.1: 1
- FCS_COP: 87
- FCS_COP.1: 49
- FCS_RND.1: 16
- FCS_RND.1.1: 1
- FCS_RND.1.2: 1
- FCS_RNG.1: 5
- FDP:
- FDP_ACC: 18
- FDP_ACC.1: 14
- FDP_ACF: 16
- FDP_ACF.1: 21
- FDP_IFC.1: 7
- FDP_ITC: 8
- FDP_ITC.1: 14
- FDP_ITC.2: 7
- FDP_ITT.1: 3
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_SOP.1: 4
- FDP_UCT: 9
- FDP_UCT.1: 2
- FDP_UIT: 8
- FDP_UIT.1: 3
- FIA:
- FIA_ACC.1.1: 1
- FIA_AFL: 7
- FIA_AFL.1: 2
- FIA_API: 8
- FIA_API.1: 10
- FIA_API.1.1: 1
- FIA_UAU: 68
- FIA_UAU.1: 5
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 6
- FIA_UAU.6: 3
- FIA_UID: 15
- FIA_UID.1: 7
- FMT:
- FMT_LIM.1: 18
- FMT_LIM.1.1: 1
- FMT_LIM.2: 17
- FMT_LIM.2.1: 1
- FMT_MSA.1: 3
- FMT_MSA.3: 5
- FMT_MTD: 83
- FMT_MTD.1: 16
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 53
- FMT_SMF.1.1: 1
- FMT_SMR: 26
- FMT_SMR.1: 13
- FPT:
- FPT_EMS.1: 15
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 3
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 16
- FTP_ITC.1: 7
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.NETWORK: 4
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.AUTH-CAPABILITY: 7
- O.CONFIG: 11
- O.CRYPT-KEY: 1
- O.CRYPTO-CAPABILITY: 7
- O.CRYPTO-KEY: 3
- O.CRYPTO-MAIL: 4
- O.FAX-CONTROL: 7
- O.GROUP-BOX: 5
- O.OVERWRITE-ALL: 7
- O.PRIVATE-BOX: 5
- O.PUBLIC-BOX: 8
- O.REGISTERED-USER: 14
- O.SECURE-PRINT: 8
- O.TRUSTED-PASS: 7
- OE:
- OE.ADMIN: 3
- OE.FAX-UNIT: 3
- OE.FEED-BACK: 10
- OE.NETWORK: 3
- OE.SECRET: 3
- OE.SERVER: 6
- OE.SERVICE: 3
- OE.SESSION: 10
- OE.SETTING-SECURITY: 3
- T:
- T.ACCESS-GROUP-BOX: 3
- T.ACCESS-PRIVATE-BOX: 3
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTED-TRANSMISSION: 3
|
- O:
- O.AES: 4
- O.COMPARE: 1
- O.COPY: 1
- O.CUST_RECONFIG_PLAIN: 1
- O.ECC_DHKE: 4
- O.ECDSA: 5
- O.EEPROM_INTEGRITY: 3
- O.FM_FW: 1
- O.MEM_ACCESS: 3
- O.PUF: 1
- O.REUSE: 1
- O.RND: 1
- O.RSA: 5
- O.SFR_ACCESS: 3
- O.SHA: 3
- O.SW_AES: 4
- O.SW_DES: 4
- O.TDES: 4
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 13
- TDES: 15
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 4
- SHA-256: 5
- SHA-384: 4
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 14
- Physical tampering: 3
- fault injection: 1
- malfunction: 8
- physical tampering: 3
- SCA:
- DPA: 1
- Leak-Inherent: 5
- physical probing: 6
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 3
- EF.DG1: 10
- EF.DG13: 1
- EF.DG14: 5
- EF.DG15: 2
- EF.DG16: 8
- EF.DG2: 4
- EF.DG3: 14
- EF.DG4: 14
- EF.DG5: 3
- EF.SOD: 5
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 186-2: 6
- FIPS PUB 197: 3
- X509:
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS 140-2: 2
- FIPS 180-4: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15946-3: 1
- ISO/IEC 7816: 2
- ISO/IEC 7816-4: 1
- ISO/IEC 7816:2008: 1
- ISO/IEC 9797:1999: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20101202154851+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20101202155121+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - C0265_ASE.doc
- /_AdHocReviewCycleID: -379351262
- /_PreviousAdHocReviewCycleID: 467482879
- pdf_file_size_bytes: 772548
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 111
|
- /Author: MaskTech International GmbH
- /CreationDate: D:20180222124104+01'00'
- /Creator: LaTeX with hyperref package
- /Keywords: Common Criteria, CC, Machine Readable Travel Document, MRTD, EAC with PACE, ePass, MTCOS, EAL 5+
- /ModDate: D:20180427095219+02'00'
- /PTEX.Fullbanner: This is pdfTeX, Version 3.14159265-2.6-1.40.15 (TeX Live 2014/Cygwin) kpathsea version 6.2.0
- /Producer: pdfTeX-1.40.15
- /Subject: Common Criteria Certification
- /Title: MTCOS Pro 2.5 ICAO - EAC with PACE / P60D145VB_J (P6022y VB) - Security Target lite
- /Trapped: /False
- pdf_file_size_bytes: 629043
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 115
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |