name |
TOSHIBA e-STUDIO330AC/400AC Models with FAX unit and FIPS Hard Disk SYS V1.0 |
NXP P541G072V0P (JCOP 41 v2.3.1) |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
active |
archived |
not_valid_after |
02.10.2025 |
01.09.2019 |
not_valid_before |
02.10.2020 |
10.08.2007 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0684_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0684_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0426a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0684_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0426b.pdf |
manufacturer |
Toshiba TEC Corporation |
IBM Deutschland Entwicklung GmbH |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.ibm.com/de/entwicklung/ |
security_level |
{} |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
dgst |
e5255e40c05b52dc |
1c12f1d98a292597 |
heuristics/cert_id |
JISEC-CC-CRP-C0684-01-2020 |
BSI-DSZ-CC-0426-2007 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ADV_INT.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, AVA_CCA.1, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
1.0 |
2.3.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0294-2006, BSI-DSZ-CC-0348-2006 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0294-2006, BSI-DSZ-CC-0348-2006 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0684
- certification_date: 01.10.2020
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0684
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000boi-att/c0684_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan and fax. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE Security functions The TOE provides the following security features: Identification and Authentication Function Access Control Function Stored Data Encryption Function Network Protection Function Security Management Function Audit Function Software Verification Function Self-testing Function Fax Line Separation Function
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: TOSHIBA e-STUDIO330AC/400AC Models with FAX unit and FIPS Hard Disk
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000boi-att/c0684_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000boi-att/c0684_est.pdf
- toe_version: SYS V1.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date:
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0684_it9734.html
- toe_overseas_name: TOSHIBA e-STUDIO330AC / 400AC Models with FAX unit and FIPS Hard DiskSYS V1.0
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0348-2006 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0348-2006 |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
{} |
pdf_data/cert_filename |
c0684_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0684-01-2020: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20201106135945+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20201106140255+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 83036
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0684_erpt.pdf |
0426a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0426-2007
- cert_item: NXP P541G072V0P (JCOP 41 v2.3.1
- cert_lab: BSI
- developer: IBM Deutschland Entwicklung GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0684-01-2020: 1
|
- DE:
- BSI-DSZ-CC-0294-: 1
- BSI-DSZ-CC-0294-2006: 1
- BSI-DSZ-CC-0348: 1
- BSI-DSZ-CC-0348-2006: 2
- BSI-DSZ-CC-0426-2007: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 11
- EAL4 augmented: 1
- EAL5: 7
- EAL5 augmented: 1
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.3: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.3: 1
- ADV_HLD: 2
- ADV_HLD.3: 1
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_INT.1: 1
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.2: 1
- ADV_SPM: 2
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 1
- ALC_TAT: 2
- ALC_TAT.2: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.2: 2
- AVA_MSU.3: 8
- AVA_SOF: 3
- AVA_SOF.1: 1
- AVA_VLA: 3
- AVA_VLA.2: 3
- AVA_VLA.3: 1
- AVA_VLA.4: 9
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 1
- FCS_COP: 7
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACF: 2
- FDP_ETC.1: 1
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_ITC.1: 1
- FDP_RIP: 6
- FDP_ROL: 1
- FDP_SDI.2: 1
- FIA:
- FIA_AFL: 2
- FIA_ATD: 1
- FIA_UAU: 2
- FIA_UAU.1: 1
- FIA_UID: 2
- FIA_USB.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA: 8
- FMT_MTD: 1
- FMT_MTD.3: 1
- FMT_SMF.1: 1
- FMT_SMR: 3
- FPR:
- FPT:
- FPT_AMT: 1
- FPT_FLS: 2
- FPT_PHP: 1
- FPT_PHP.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 1
- FRU:
- FTP:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.DLV_PROTECT: 1
- A.NATIVE: 1
- A.NO-DELETION: 1
- A.NO-INSTALL: 1
- A.TEST_OPERATE: 1
- A.USE_DIAG: 1
- A.USE_KEYS: 1
- A.VERIFICATION: 1
- OSP:
- T:
- T.ACCESS_DATA: 1
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DEL: 1
- T.DEL_IC_NOS: 1
- T.DEV_IC: 1
- T.DEV_NOS: 1
- T.EXE-CODE: 2
- T.FAULT: 1
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 1
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.LEAKAGE: 1
- T.NATIVE: 1
- T.OS_DECEIVE: 1
- T.OS_OPERATE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.RND: 1
- T.SID: 2
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 25
- NXP Semiconductors: 3
- Philips:
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Fault Injection: 1
- malfunction: 1
- SCA:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 20: 4
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 3
- AIS 36: 3
- ISO:
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
- Java Card 2.2.1: 1
- JavaCard 2.2.1: 2
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 3.1) Secure Smart Card Controller, Version 2.13, 01. June 2007, IBM Deutschland Entwicklung GmbH (confidential document) [7] Security Target lite NXP P541G072V0P (JCOP 41, v2.3.1) Secure Smart Card Controller, Version 1: 1
- 8] Evaluation Technical Report (ETR), Version 1, 27. July 2007, NXP P541G072V0P (JCOP 41 v2.3.1) (confidential document) [9] Java Card System – Minimal Configuration Protection Profile (registered at DCSSI under: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20201216095523+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20201216095720+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 767273
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20070816101337+02'00'
- /Creator: Acrobat PDFMaker 8.1 für Word
- /Keywords: Common Criteria, Certification, Zertifizierung, NXP P541G072V0P (JCOP 41 v2.3.1) , IBM Deutschland Entwirklung GmbH
- /ModDate: D:20070816102333+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20070816081328
- /Title: Certification Report BSI-DSZ-CC-0426-2007
- pdf_file_size_bytes: 389804
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 48
|
pdf_data/st_filename |
c0684_est.pdf |
0426b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0348: 1
- BSI-DSZ-CC-0348-2006: 3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 2
- BSI-PP-0017: 4
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 46
- EAL4 augmented: 7
- EAL5: 2
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 2
- ADV_FSP.2: 4
- ADV_HLD.2: 3
- ADV_IMP.1: 3
- ADV_IMP.2: 16
- ADV_LLD.1: 4
- ADV_RCR.1: 3
- ADV_SPM.1: 14
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 6
- AGD_USR: 2
- AGD_USR.1: 4
- ALC:
- ALC_DVS.1: 2
- ALC_DVS.2: 16
- ALC_LCD.1: 2
- ALC_TAT.1: 3
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 3
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 2
- AVA_MSU.3: 15
- AVA_SOF.1: 2
- AVA_VLA.2: 2
- AVA_VLA.3: 1
- AVA_VLA.4: 17
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 14
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 7
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 43
- FCS_CKM.1.1: 2
- FCS_CKM.4: 13
- FCS_CKM.4.1: 2
- FCS_CKM_EXT: 5
- FCS_CKM_EXT.4: 27
- FCS_CKM_EXT.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 126
- FCS_COP.1.1: 6
- FCS_ITC.1: 1
- FCS_KDF_EXT: 4
- FCS_KDF_EXT.1: 20
- FCS_KDF_EXT.1.1: 3
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 9
- FCS_KYC_EXT.1.1: 4
- FCS_PCC_EXT.1: 1
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 36
- FCS_RBG_EXT.1.1: 3
- FCS_RBG_EXT.1.2: 3
- FCS_RGB_EXT.1: 2
- FCS_SMC_EXT: 3
- FCS_SMC_EXT.1: 15
- FCS_SMC_EXT.1.1: 2
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 2
- FCS_TLS_EXT.1: 22
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 2
- FDP_DSK_EXT.1: 8
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 2
- FDP_FXS_EXT.1: 8
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 18
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 7
- FPT_KYP_EXT.1.1: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 18
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC_EXT.1: 2
- FTP_TRP: 2
- FTP_TRP.1: 25
- FTP_TRP.1.1: 3
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_ARP: 15
- FAU_ARP.1: 7
- FAU_GEN.1: 5
- FAU_SAA.1: 23
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FCS:
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 6
- FCS_CKM.3.1: 1
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 26
- FCS_COP.1: 6
- FCS_COP.1.1: 7
- FCS_RND: 3
- FCS_RND.1: 15
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 9
- FDP_ACC.1: 21
- FDP_ACC.2: 3
- FDP_ACF: 8
- FDP_ACF.1: 22
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 4
- FDP_IFC.1: 22
- FDP_IFC.2: 5
- FDP_IFF: 4
- FDP_IFF.1: 16
- FDP_IFF.2: 11
- FDP_IFF.2.7: 3
- FDP_ITC.1: 15
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_RIP: 12
- FDP_RIP.1: 12
- FDP_ROL: 3
- FDP_ROL.1: 17
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 7
- FIA_ATD: 3
- FIA_ATD.1: 5
- FIA_UAU: 6
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 6
- FIA_UAU.4: 5
- FIA_UID: 7
- FIA_UID.1: 12
- FIA_UID.2: 4
- FIA_USB.1: 8
- FIA_USB.1.1: 2
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 19
- FMT_LIM.1.1: 2
- FMT_LIM.2: 18
- FMT_LIM.2.1: 2
- FMT_MSA: 25
- FMT_MSA.1: 26
- FMT_MSA.2: 22
- FMT_MSA.3: 25
- FMT_MTD: 3
- FMT_MTD.1: 7
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_REV.1: 2
- FMT_SMF: 5
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR: 18
- FMT_SMR.1: 32
- FPR:
- FPR_UNO.1: 6
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT: 5
- FPT_AMT.1: 5
- FPT_FLS: 20
- FPT_FLS.1: 11
- FPT_PHP: 5
- FPT_PHP.1: 9
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_RCV: 10
- FPT_RCV.3: 10
- FPT_RCV.3.1: 1
- FPT_RCV.4: 3
- FPT_RVM: 3
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
- FPT_SEP: 6
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 2
- FPT_TDC.1: 6
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 5
- FRU_FLT.1: 1
- FRU_FLT.2: 8
- FRU_RSA: 1
- FRU_RSA.1: 4
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 11
- FTP_TDC.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 5
- O.COMMS_PROTECTION: 12
- O.FAX_NET_SEPARATION: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 3
- O.STORAGE_ENCRYPTION: 8
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.DLV_DATA: 2
- A.DLV_PROTECT: 4
- A.NATIVE: 9
- A.NO: 1
- A.NO-DELETION: 5
- A.NO-INSTALL: 5
- A.TEST_OPERATE: 7
- A.USE_DIAG: 6
- A.USE_KEY: 1
- A.USE_KEYS: 5
- A.VERIFICATION: 6
- D:
- D.API_DATA: 3
- D.APP_CODE: 9
- D.APP_C_DATA: 3
- D.APP_I_DATA: 7
- D.APP_KEY: 1
- D.CRYPTO: 7
- D.JAVA_OBJECT: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 4
- D.PIN: 15
- D.SEC_DATA: 5
- O:
- O.ALARM: 4
- O.CARD-MANAGEMENT: 5
- O.CIPHER: 9
- O.FAULT_PROTECT: 3
- O.FIREWALL: 11
- O.JAVAOBJECT: 5
- O.KEY-: 1
- O.KEY-MNGT: 7
- O.NATIVE: 6
- O.OPERATE: 11
- O.OS_DECEIVE: 5
- O.PHYSICAL: 6
- O.PIN-MNGT: 6
- O.PROTECT_DATA: 6
- O.REALLOCATION: 3
- O.RESOURCES: 7
- O.RMI_SERVICE: 1
- O.RND: 6
- O.SCP: 24
- O.SHRD_VAR_CONFID: 3
- O.SHRD_VAR_INTEG: 6
- O.SID: 9
- O.SIDE_CHANNEL: 4
- O.TRANSACTION: 6
- O.XYZ: 1
- OE:
- OE.CARD-: 1
- OE.CARD-MANAGEMENT: 1
- OE.DEL_NOS: 4
- OE.DEV_NOS: 3
- OE.DLV_DATA: 6
- OE.DLV_PROTECT: 3
- OE.IC_ORG: 5
- OE.NATIVE: 4
- OE.NO-DELETION: 3
- OE.NO-INSTALL: 4
- OE.SCP: 6
- OE.TEST_OPERATE: 6
- OE.USE_DIAG: 7
- OE.USE_KEY: 1
- OE.USE_KEYS: 7
- OE.VERIFICATION: 13
- OE.XYZ: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.BYTECODE: 1
- OP.CREATE: 9
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 5
- OP.PUT: 7
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- T:
- T.ACCESS_DATA: 4
- T.CONFID-APPLI-DATA: 5
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 5
- T.DEL: 6
- T.DEL_IC_NOS: 7
- T.DEV_IC: 5
- T.DEV_NOS: 6
- T.EXE-CODE: 8
- T.FAULT: 4
- T.INTEG-: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 5
- T.INTEG-JCS-CODE: 4
- T.INTEG-JCS-DATA: 3
- T.LEAKAGE: 4
- T.NATIVE: 6
- T.OS: 2
- T.OS_DECEIVE: 4
- T.OS_OPERATE: 5
- T.PHYSICAL: 4
- T.RESOURCES: 4
- T.RND: 4
- T.SID: 9
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 2
- SHA-512: 13
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 45
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- TLS1.2: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Physical tampering: 4
- malfunction: 4
- physical tampering: 3
- SCA:
- DPA: 3
- SPA: 2
- physical probing: 4
- side channel: 1
- side-channel: 1
- timing attack: 1
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197: 1
- FIPS PUB 198-1: 2
- FIPS140-2: 1
- FIPSPUB 180-3: 1
- ISO:
- ISO/IEC 10116: 2
- ISO/IEC 10118: 4
- ISO/IEC 18031:2011: 6
- NIST:
- NIST SP 800-108: 2
- NIST SP 800-132: 1
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-56B: 1
- NIST SP 800-90A: 7
- NIST SP 800-90B: 1
- RFC:
- RFC 2246: 1
- RFC 2818: 3
- RFC 4346: 1
- RFC 5246: 3
- RFC2818: 1
|
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 180-1: 3
- FIPS 197: 3
- FIPS 46-3: 3
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.1.1: 3
- GlobalPlatform 2.1.1: 2
- JavaCard:
- Java Card 2.1.1: 3
- Java Card 2.1.2: 1
- Java Card 2.2: 3
- Java Card 2.2.1: 9
- JavaCard 2.2.1: 3
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 3
- javacard.framework.applet: 1
- javacard.framework.service: 1
- javacard.security: 8
- javacardx:
- javacardx.crypto: 6
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: TOSHIBA TEC CORPORATION
- /CreationDate: D:20201211130420+09'00'
- /Creator:
- /Keywords: HCD-PP
- /ModDate: D:20201211130421+09'00'
- /Producer: iTextSharp™ 5.5.13 ©2000-2018 iText Group NV (AGPL-version); modified using iTextSharp™ 5.5.13 ©2000-2018 iText Group NV (AGPL-version)
- /Subject:
- /Title: Security Target for e-STUDIO400AC Series
- pdf_file_size_bytes: 890629
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 86
|
- /Author: atp01700
- /CreationDate: D:20070723101548+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords: Secure Smart Card Controller, IBM, SECURITY TARGET LITE
- /ModDate: D:20070823110604+02'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: NXP P541G072V0P (JCOP 41 v2.3.1) Secure Smart Card Controller
- pdf_file_size_bytes: 679852
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 149
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |