Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TOSHIBA e-STUDIO330AC/400AC Models with FAX unit and FIPS Hard Disk SYS V1.0
JISEC-CC-CRP-C0684-01-2020
MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations
2020-33-INF-3550
name TOSHIBA e-STUDIO330AC/400AC Models with FAX unit and FIPS Hard Disk SYS V1.0 MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP ES
not_valid_after 02.10.2025 18.06.2026
not_valid_before 02.10.2020 18.06.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0684_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20CCRA.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0684_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20INF-3550.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0684_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20ST_lite.pdf
manufacturer Toshiba TEC Corporation THALES DIS FRANCE SA
manufacturer_web https://www.toshibatec.co.jp/en/ https://www.thalesgroup.com/en/europe/france
security_level {} ALC_DVS.2, AVA_VAN.5, EAL5+
dgst e5255e40c05b52dc 8ba234174b5f18cb
heuristics/cert_id JISEC-CC-CRP-C0684-01-2020 2020-33-INF-3550
heuristics/extracted_sars ADV_FSP.1, ASE_ECD.1, ASE_TSS.1, ASE_CCL.1, ASE_SPD.1, ALC_CMS.1, ASE_REQ.1, ALC_CMC.1, AGD_OPE.1, ASE_INT.1, AVA_VAN.1, AGD_PRE.1, ATE_IND.1, ASE_OBJ.1 ALC_CMC.4, ASE_CCL.1, ATE_IND.2, AGD_OPE.1, ASE_REQ.2, ALC_DEL.1, ASE_SPD.1, ASE_INT.1, ALC_DVS.2, AGD_PRE.1, ADV_INT.2, ADV_ARC.1, ADV_IMP.1, AVA_VAN.5, ALC_TAT.2, ADV_TDS.4, ALC_LCD.1, ASE_OBJ.2, ATE_COV.2, ATE_DPT.3, ALC_FLR.1, ASE_ECD.1, ASE_TSS.1, ATE_FUN.1, ADV_FSP.5
heuristics/extracted_versions 1.0 1.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0684
  • certification_date: 01.10.2020
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0684
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000boi-att/c0684_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan and fax. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE Security functions The TOE provides the following security features: Identification and Authentication Function Access Control Function Stored Data Encryption Function Network Protection Function Security Management Function Audit Function Software Verification Function Self-testing Function Fax Line Separation Function
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: TOSHIBA e-STUDIO330AC/400AC Models with FAX unit and FIPS Hard Disk
    • product_type: Multifunction Product
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000boi-att/c0684_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000boi-att/c0684_est.pdf
    • toe_version: SYS V1.0
    • vendor: TOSHIBA TEC CORPORATION
  • expiration_date:
  • supplier: TOSHIBA TEC CORPORATION
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0684_it9734.html
  • toe_overseas_name: TOSHIBA e-STUDIO330AC / 400AC Models with FAX unit and FIPS Hard DiskSYS V1.0
  • category: Smart Cards and similiar devices
  • certification_date: 18.06.2021
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1214
    • certification_date: 18.06.2021
    • description: The MultiApp Essential V1.1 Platform is a smart card operating system (IC and OS) that complies with two major industry standards: Sun Java Card 3.0.4, which consists of the Java Card 3.0.4 Virtual Machine [JCVM304], the Java Card 3.0.4 Runtime Environment [JCRE304] and the Java Card 3.0.4 Application Programming Interface [JCAPI304]. The Global Platform Card Specification version 2.2.1 [GP221]. It is intended to host a set of Java Card applications and provides cryptographic services for symmetric (3DES, AES), asymmetric (RSA) and hash (SHA) operations, Moreover, it also provides random number generation and integrity check features. The TOE allows the loading of applets before or after the issuance of the card, but the Issuer can forbid this operation to be carried out. The TOE has four possible configurations: Full Configuration. Light Configuration. XLight_T1 Configuration. XLight_NB Configuration. The details about the features of each configuration are described in [ST LITE], chapter 2.4 (TOE Description).
    • evaluation_facility: Applus Laboratories
    • level: EAL5 + ALC_DVS.2 + AVA_VAN.5
    • manufacturer: THALES
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1215
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1242
    • type: Product
  • manufacturer: THALES
  • product: MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/697-multiapp-essential-v1-1-platform-with-full-light-xlight-t1-and-xlight-nb-configurations
heuristics/st_references/directly_referencing {} ANSSI-CC-2018/51
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2018/51
heuristics/protection_profiles b2cfec7a92fa2940 9399bd94f9925b16
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf
pdf_data/cert_filename c0684_eimg.pdf 2020-33 CCRA.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0684-01-2020: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_metadata
  • /CreationDate: D:20201106135945+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20201106140255+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 83036
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 746775
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename c0684_erpt.pdf 2020-33 INF-3550.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0684-01-2020: 1
  • ES:
    • 2020-33-INF-3550- v1: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL5: 3
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RBG_EXT.1: 1
  • FDP:
    • FDP_DSK_EXT.1: 1
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 4
    • FCS_CKM.4: 1
    • FCS_COP: 6
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 3
    • FDP_ACF: 3
    • FDP_IFC: 2
    • FDP_IFF: 2
    • FDP_ITC: 1
    • FDP_RIP: 8
    • FDP_ROL: 1
    • FDP_SDI.2: 1
    • FDP_UIT: 1
  • FIA:
    • FIA_ATD: 1
    • FIA_UAU: 1
    • FIA_UID: 2
    • FIA_USB: 1
  • FMT:
    • FMT_MSA: 11
    • FMT_MTD: 2
    • FMT_SMF: 3
    • FMT_SMR: 4
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 1
  • FPT:
    • FPT_FLS: 4
    • FPT_ITT: 1
    • FPT_PHP: 1
    • FPT_RCV: 2
    • FPT_TDC.1: 1
    • FPT_TST: 1
  • FTP:
    • FTP_ITC: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 9
    • D.USER: 5
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • R:
    • R.C: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 2
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 1
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
  • Applus:
    • Applus Laboratories: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 5
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
  • RSA:
    • RSA 1024: 1
    • RSA 2048: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 4
      • TLS v1.2: 4
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • PRNG:
    • PRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • SCP:
    • SCP03: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 4
    • JavaCard 3.0.4: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • These applications could be removed based on customer needs and they are out of scope of the evaluation: 1
    • out of scope: 1
    • v1.1 & Server v1.1. (These applications could be removed based on customer needs and they are out of scope of the evaluation). Additionally, other applets – not determined at the moment of the present: 1
pdf_data/report_metadata
  • /CreationDate: D:20201216095523+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20201216095720+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 767273
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
pdf_data/st_filename c0684_est.pdf 2020-33 ST_lite.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2018/51: 1
  • NL:
    • CC-1: 2
    • CC-2: 7
    • CC-3: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 1
  • EAL:
    • EAL 5+: 2
    • EAL5: 6
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 7
    • ADV_FSP: 1
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 5
    • ADV_IMP: 1
    • ADV_IMP.1: 7
    • ADV_INT.2: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 7
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 7
    • AGD_PRE: 2
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 14
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 7
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 43
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 2
    • FCS_CKM_EXT: 5
    • FCS_CKM_EXT.4: 27
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 126
    • FCS_COP.1.1: 6
    • FCS_ITC.1: 1
    • FCS_KDF_EXT: 4
    • FCS_KDF_EXT.1: 20
    • FCS_KDF_EXT.1.1: 3
    • FCS_KYC_EXT: 4
    • FCS_KYC_EXT.1: 9
    • FCS_KYC_EXT.1.1: 4
    • FCS_PCC_EXT.1: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 36
    • FCS_RBG_EXT.1.1: 3
    • FCS_RBG_EXT.1.2: 3
    • FCS_RGB_EXT.1: 2
    • FCS_SMC_EXT: 3
    • FCS_SMC_EXT.1: 15
    • FCS_SMC_EXT.1.1: 2
    • FCS_SNI_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT: 2
    • FCS_TLS_EXT.1: 22
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT: 2
    • FDP_DSK_EXT.1: 8
    • FDP_DSK_EXT.1.1: 2
    • FDP_DSK_EXT.1.2: 2
    • FDP_FXS_EXT: 2
    • FDP_FXS_EXT.1: 8
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 18
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_KYP_EXT: 2
    • FPT_KYP_EXT.1: 7
    • FPT_KYP_EXT.1.1: 2
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 9
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC_EXT.1: 2
    • FTP_TRP: 2
    • FTP_TRP.1: 25
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_ARP.1: 13
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 68
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 1
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 46
    • FCS_CKM.4.1: 1
    • FCS_COP: 32
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
    • FCS_RND: 8
    • FCS_RND.1: 10
    • FCS_RND.1.1: 2
    • FCS_RNG: 1
  • FDP:
    • FDP_ACC: 36
    • FDP_ACC.1: 14
    • FDP_ACC.2: 6
    • FDP_ACF: 30
    • FDP_ACF.1: 17
    • FDP_IFC: 22
    • FDP_IFC.1: 13
    • FDP_IFC.2: 2
    • FDP_IFF: 12
    • FDP_IFF.1: 12
    • FDP_ITC: 11
    • FDP_ITC.1: 18
    • FDP_ITC.2: 23
    • FDP_ITT.1: 1
    • FDP_RIP: 69
    • FDP_RIP.1: 10
    • FDP_ROL: 12
    • FDP_ROL.1: 2
    • FDP_SDC.1: 1
    • FDP_SDI: 3
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 3
  • FIA:
    • FIA_API.1: 1
    • FIA_ATD: 6
    • FIA_ATD.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 3
    • FIA_UID: 12
    • FIA_UID.1: 10
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA: 83
    • FMT_MSA.1: 12
    • FMT_MSA.2: 1
    • FMT_MSA.3: 16
    • FMT_MTD: 16
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_SMF: 30
    • FMT_SMF.1: 13
    • FMT_SMR: 39
    • FMT_SMR.1: 25
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 42
    • FPT_FLS.1: 8
    • FPT_ITT: 5
    • FPT_ITT.1: 2
    • FPT_PHP: 6
    • FPT_PHP.3: 2
    • FPT_RCV: 13
    • FPT_RCV.3: 4
    • FPT_RCV.4: 1
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 5
    • FPT_TST.1: 3
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 5
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 8
    • D.USER: 32
  • O:
    • O.ACCESS: 1
    • O.ACCESS_CONTROL: 6
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 5
    • O.COMMS_PROTECTION: 12
    • O.FAX_NET_SEPARATION: 1
    • O.KEY_MATERIAL: 1
    • O.PURGE_DATA: 3
    • O.STORAGE_ENCRYPTION: 8
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.APPLET: 5
    • A.VERIFICATION: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 16
    • O.APPLET: 28
    • O.CARD-MANAGEMENT: 3
    • O.CARD_MANAGEMENT: 18
    • O.CIPHER: 11
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 9
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 10
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 12
    • O.JAVAOBJECT: 57
    • O.KEY-MNGT: 6
    • O.KEY_MNGT: 5
    • O.LOAD: 7
    • O.NATIVE: 12
    • O.OBJ-DELETION: 4
    • O.OPERATE: 15
    • O.PIN-: 1
    • O.PIN-MNGT: 5
    • O.REALLOCATION: 5
    • O.RESOURCES: 10
    • O.RND: 14
    • O.SCP: 35
    • O.SID: 14
    • O.TRANSACTION: 6
  • OE:
    • OE.APPLET: 4
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 10
    • OE.SCP: 3
    • OE.VERIFICATION: 26
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.RND: 4
    • OSP.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 3
    • T.EXE-CODE: 8
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RESOURCES: 3
    • T.SID: 8
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 11
  • Microsoft:
    • Microsoft: 4
  • Thales:
    • Thales: 133
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 19
      • HMAC-SHA-512: 3
  • AES_competition:
    • AES:
      • AES: 15
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 8
    • DES:
      • DES: 17
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • DH: 10
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 8
      • SHA-384: 2
      • SHA-512: 13
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-224: 2
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 3
      • SHA224: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 45
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
      • TLS1.2: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 12
    • PRNG: 6
  • RNG:
    • RBG: 4
    • RNG: 3
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 18
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • Malfunction: 3
    • fault induction: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 3
    • physical probing: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 2
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 2
    • FIPS140-2: 1
    • FIPSPUB 180-3: 1
  • ISO:
    • ISO/IEC 10116: 2
    • ISO/IEC 10118: 4
    • ISO/IEC 18031:2011: 6
  • NIST:
    • NIST SP 800-108: 2
    • NIST SP 800-132: 1
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-56B: 1
    • NIST SP 800-90A: 7
    • NIST SP 800-90B: 1
  • RFC:
    • RFC 2246: 1
    • RFC 2818: 3
    • RFC 4346: 1
    • RFC 5246: 3
    • RFC2818: 1
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS180-4: 1
    • FIPS197: 3
  • ISO:
    • ISO/IEC 18033-3: 1
  • PKCS:
    • PKCS#1: 8
    • PKCS#5: 3
  • SCP:
    • SCP01: 4
    • SCP02: 3
    • SCP03: 3
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.2.1: 1
  • JavaCard:
    • Java Card 3.0.4: 4
    • JavaCard 3.0.4: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Client v1.1 & Server v1.1 (These applications could be removed based on customer needs and they are out of scope of the evaluation). Additionally, other applets – not determined at the moment of the present: 1
    • These applications could be removed based on customer needs and they are out of scope of the evaluation: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: TOSHIBA TEC CORPORATION
  • /CreationDate: D:20201211130420+09'00'
  • /Creator:
  • /Keywords: HCD-PP
  • /ModDate: D:20201211130421+09'00'
  • /Producer: iTextSharp™ 5.5.13 ©2000-2018 iText Group NV (AGPL-version); modified using iTextSharp™ 5.5.13 ©2000-2018 iText Group NV (AGPL-version)
  • /Subject:
  • /Title: Security Target for e-STUDIO400AC Series
  • pdf_file_size_bytes: 890629
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 86
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 1421244
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 100
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different