name |
Following MFP with FCU, DataOverwriteSecurity Unit, HDD Encryption Unit and Printer/Scanner Unit, MFP: Ricoh Aficio MP 6001, Ricoh Aficio MP 7001, Ricoh Aficio MP 8001, Ricoh Aficio MP 9001, Gestetner MP 6001, Gestetner MP 7001, Gestetner MP 8001, Gestetner MP 9001, infotec MP 6001, infotec MP 7001, infotec MP 8001, infotec MP 9001, Lanier LD360, Lanier LD370, Lanier LD380, Lanier LD390, Lanier MP 6001, Lanier MP 7001, Lanier MP 8001, Lanier MP 9001, nashuatec MP 6001, nashuatec MP 7001, nashuatec MP 8001, nashuatec MP 9001, Rex-Rotary MP 6001, Rex-Rotary MP 7001, Rex-Rotary MP 8001, Rex-Rotary MP 9001, Savin 9060, Savin 9070, Savin 9080, Savin 9090 Or Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Gestetner MP 6001 SP, Gestetner MP 7001 SP, Gestetner MP 8001 SP, Gestetner MP 9001 SP, infotec MP 6001 SP, infotec MP 7001 SP, infotec MP 8001 SP, infotec MP 9001 SP, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP, nashuatec MP 9001 SP, Rex-Rotary MP 6001 SP, Rex-Rotary MP 7001 SP, Rex-Rotary MP 8001 SP, Rex-Rotary MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp FCU: Fax Option Type 9001 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type H HDD Encryption Unit: HDD Encryption Unit Type A Printer/Scanner Unit : Printer/Scanner Unit Type 9001 Version: - Software version: System/Copy 1.18 Network Support 8.69.1 Scanner 01.20 Printer 1.16e Fax 03.00.00 RemoteFax 03.00.00 Web Support 1.13.1 Web Uapl 1.05 Network DocBox 1.04 animation 1.2.1 Option PCL 1.02 OptionPCLFont 1.02 Engine 1.61:04 OpePanel 1.04 LANG0 1.03 LANG1 1.03 - Hardware version: Ic Key 1100 Ic Ctlr 03 - Options version: GWFCU3-16(WW) 04.00.00 Data Erase Opt 1.01x
|
IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
|
category |
Multi-Function Devices
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2011-04-28
|
2024-09-04
|
not_valid_after |
2016-05-10
|
2028-12-05
|
scheme |
JP
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0289_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107V5b_pdf.pdf
|
status |
archived
|
active
|
manufacturer |
Ricoh Company, Ltd.
|
Infineon Technologies AG
|
manufacturer_web |
https://www.ricoh.com/
|
https://www.infineon.com/
|
security_level |
ALC_FLR.2, EAL3+ |
ALC_FLR.1, EAL6+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0289_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107V5a_pdf.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107V5c_pdf.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
9dc01d9d970d0b4707dba038e05dacc4328d12382b2c92c69ab6db5ba28001c7
|
state/cert/txt_hash |
None
|
25d22e66fbd62af82eb1f041903aba589997e109811fc6c631bf7f1c751ec75b
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
760cad565b239544af35257416858ee53286df46e21650e24e33074beb8a2a6f
|
51f0711acb469ae429d90936d5af0adcb71bca4402a648a76b46e4f61781131d
|
state/report/txt_hash |
df11fb5a4e10c827f983c67f1e348cd89abf687c407dbbb86dfa04cff1ff3af6
|
ee9662a9bd5407ebc6bf41c5d72f129f09ec358ef73a7920ad07d21489d6bb2f
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
False
|
state/st/pdf_hash |
dca69cc052493da1c686b5ab50dd63a982bbc50b6c79d583e39f0a146c37a03f
|
ef618c6cbe2bc308e69e55e99db7a539a8fd5756a45d8c9f0bfd5ed50a4363b6
|
state/st/txt_hash |
3c8de3b2140351c0e457a7ba93f3eb90ffab46710e22102d6dc2dcced524bb30
|
f0460d25360fba5f733797f03d978ee2510a8dc590313210709136186655fc4d
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0289
|
BSI-DSZ-CC-1107-V5-2024
|
heuristics/cert_lab |
None
|
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.05, 1.01, 1.02, 1.2.1, 01.20, 1.61, 1.16, 1.03, 1.04, 04.00.00, 1.13.1, 8.69.1, 1.18, 03.00.00 |
3.35.001, 2.15.000, 05.03.4097, 3.34.000, 1.13.002, 3.02.000, 80.306.16.0, 80.306.16.1, 80.312.02.0, 3.33.003, 3.52.9708, 2.11.003, 01.30.0564, 1.10.007 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
None
|
BSI-DSZ-CC-1107-V4-2023 |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
None
|
BSI-DSZ-CC-1107-V4-2023, BSI-DSZ-CC-1107-V3-2022 |
heuristics/scheme_data |
- cert_id:
C0289
- supplier: RICOH COMPANY, LTD.
- toe_overseas_name: Following MFP with FCU, DataOverwriteSecurity Unit, HDD Encryption Unit and Printer/Scanner Unit,
MFP : Ricoh Aficio MP 6001, Ricoh Aficio MP 7001, Ricoh Aficio MP 8001, Ricoh Aficio MP 9001, Gestetner MP 6001, Gestetner MP 7001, Gestetner MP 8001, Gestetner MP 9001, infotec MP 6001, infotec MP 7001, infotec MP 8001, infotec MP 9001, Lanier LD360, Lanier LD370, Lanier LD380, Lanier LD390, Lanier MP 6001, Lanier MP 7001, Lanier MP 8001, Lanier MP 9001, nashuatec MP 6001, nashuatec MP 7001, nashuatec MP 8001, < Cont. >
- expiration_date: 2016-05
- claim: EAL3+
ALC_FLR.2
PP
- certification_date:
2011-04
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0289_it0302.html
- toe_japan_name: -----
- enhanced:
- product:
Following MFP with FCU, DataOverwriteSecurity Unit, HDD Encryption Unit and Printer/Scanner Unit,
MFP:
Ricoh Aficio MP 6001, Ricoh Aficio MP 7001, Ricoh Aficio MP 8001, Ricoh Aficio MP 9001, Gestetner MP 6001, Gestetner MP 7001, Gestetner MP 8001, Gestetner MP 9001, infotec MP 6001, infotec MP 7001, infotec MP 8001, infotec MP 9001, Lanier LD360, Lanier LD370, Lanier LD380, Lanier LD390, Lanier MP 6001, Lanier MP 7001, Lanier MP 8001, Lanier MP 9001, nashuatec MP 6001, nashuatec MP 7001, nashuatec MP 8001, nashuatec MP 9001, Rex-Rotary MP 6001, Rex-Rotary MP 7001, Rex-Rotary MP 8001, Rex-Rotary MP 9001, Savin 9060, Savin 9070, Savin 9080, Savin 9090
Or Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:
Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Gestetner MP 6001 SP, Gestetner MP 7001 SP, Gestetner MP 8001 SP, Gestetner MP 9001 SP, infotec MP 6001 SP, infotec MP 7001 SP, infotec MP 8001 SP, infotec MP 9001 SP, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP, nashuatec MP 9001 SP, Rex-Rotary MP 6001 SP, Rex-Rotary MP 7001 SP, Rex-Rotary MP 8001 SP, Rex-Rotary MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp
FCU:
Fax Option Type 9001
DataOverwriteSecurity Unit:
DataOverwriteSecurity Unit Type H
HDD Encryption Unit:
HDD Encryption Unit Type A
Printer/Scanner Unit :
Printer/Scanner Unit Type 9001
- toe_version:
-Software version:
System/Copy 1.18
Network Support 8.69.1
Scanner 01.20
Printer 1.16e
Fax 03.00.00
RemoteFax 03.00.00
Web Support 1.13.1
Web Uapl 1.05
Network DocBox 1.04
animation 1.2.1
Option PCL 1.02
OptionPCLFont 1.02
Engine 1.61:04
OpePanel 1.04
LANG0 1.03
LANG1 1.03
-Hardware version:
Ic Key 1100
Ic Ctlr 03
-Options version:
GWFCU3-16(WW) 04.00.00
Data Erase Opt 1.01x
- product_type:
Multi Function Product
- certification_date:
2011-04-28
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0289_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0289_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0289_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
-
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
-
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
-
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
-
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
-
Network Protection Function: Enables the TOE to protect network communications using encryption.
-
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
-
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
-
Security Management Function: Enables the TOE administrator to control security functions.
-
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
-
Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
|
- cert_id:
BSI-DSZ-CC-1107-V5-2024
- product: IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, …
- vendor: Infineon Technologies AG
- certification_date:
04.09.2024
- category: Smart Cards and similar devices
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1107.html
- enhanced:
- product:
IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
- applicant:
Infineon Technologies AG
Am Campeon 1-15
85579 Neubiberg
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL6+,ALC_FLR.1
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- certification_date:
04.09.2024
- expiration_date:
04.12.2028
- entries:
frozendict({'id': 'BSI-DSZ-CC-1107-V5-2024', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.'}), frozendict({'id': 'BSI-DSZ-CC-1107-V4-2023', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Within this recertification penetration tests were performed, security objectives have been extended a flashloader has been added to the offered functionality and the guidance has been updated.'}), frozendict({'id': 'BSI-DSZ-CC-1107-V3-2022', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Within this recertification penetration tests were performed and the guidance has been updated.'}), frozendict({'id': 'BSI', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Besides other aspects, software libraries were changed.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5a_pdf.pdf?__blob=publicationFile&v=2
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5b_pdf.pdf?__blob=publicationFile&v=4
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5c_pdf.pdf?__blob=publicationFile&v=2
- description:
The TOE is an integrated circuit (IC), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.
- subcategory: ICs, Cryptolib
|
heuristics/scheme_data/cert_id |
C0289
|
BSI-DSZ-CC-1107-V5-2024
|
heuristics/scheme_data/certification_date |
2011-04
|
04.09.2024
|
heuristics/scheme_data/enhanced |
- product:
Following MFP with FCU, DataOverwriteSecurity Unit, HDD Encryption Unit and Printer/Scanner Unit,
MFP:
Ricoh Aficio MP 6001, Ricoh Aficio MP 7001, Ricoh Aficio MP 8001, Ricoh Aficio MP 9001, Gestetner MP 6001, Gestetner MP 7001, Gestetner MP 8001, Gestetner MP 9001, infotec MP 6001, infotec MP 7001, infotec MP 8001, infotec MP 9001, Lanier LD360, Lanier LD370, Lanier LD380, Lanier LD390, Lanier MP 6001, Lanier MP 7001, Lanier MP 8001, Lanier MP 9001, nashuatec MP 6001, nashuatec MP 7001, nashuatec MP 8001, nashuatec MP 9001, Rex-Rotary MP 6001, Rex-Rotary MP 7001, Rex-Rotary MP 8001, Rex-Rotary MP 9001, Savin 9060, Savin 9070, Savin 9080, Savin 9090
Or Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:
Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Gestetner MP 6001 SP, Gestetner MP 7001 SP, Gestetner MP 8001 SP, Gestetner MP 9001 SP, infotec MP 6001 SP, infotec MP 7001 SP, infotec MP 8001 SP, infotec MP 9001 SP, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP, nashuatec MP 9001 SP, Rex-Rotary MP 6001 SP, Rex-Rotary MP 7001 SP, Rex-Rotary MP 8001 SP, Rex-Rotary MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp
FCU:
Fax Option Type 9001
DataOverwriteSecurity Unit:
DataOverwriteSecurity Unit Type H
HDD Encryption Unit:
HDD Encryption Unit Type A
Printer/Scanner Unit :
Printer/Scanner Unit Type 9001
- toe_version: -Software version:
System/Copy 1.18
Network Support 8.69.1
Scanner 01.20
Printer 1.16e
Fax 03.00.00
RemoteFax 03.00.00
Web Support 1.13.1
Web Uapl 1.05
Network DocBox 1.04
animation 1.2.1
Option PCL 1.02
OptionPCLFont 1.02
Engine 1.61:04
OpePanel 1.04
LANG0 1.03
LANG1 1.03
-Hardware version:
Ic Key 1100
Ic Ctlr 03
-Options version:
GWFCU3-16(WW) 04.00.00
Data Erase Opt 1.01x
- product_type: Multi Function Product
- certification_date:
2011-04-28
- cc_version: 3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor: RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0289_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0289_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0289_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
-
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
-
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
-
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
-
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
-
Network Protection Function: Enables the TOE to protect network communications using encryption.
-
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
-
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
-
Security Management Function: Enables the TOE administrator to control security functions.
-
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
-
Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
|
- product:
IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
- applicant: Infineon Technologies AG
Am Campeon 1-15
85579 Neubiberg
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL6+,ALC_FLR.1
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- certification_date:
04.09.2024
- expiration_date: 04.12.2028
- entries: frozendict({'id': 'BSI-DSZ-CC-1107-V5-2024', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.'}), frozendict({'id': 'BSI-DSZ-CC-1107-V4-2023', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Within this recertification penetration tests were performed, security objectives have been extended a flashloader has been added to the offered functionality and the guidance has been updated.'}), frozendict({'id': 'BSI-DSZ-CC-1107-V3-2022', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Within this recertification penetration tests were performed and the guidance has been updated.'}), frozendict({'id': 'BSI', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Besides other aspects, software libraries were changed.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5a_pdf.pdf?__blob=publicationFile&v=2
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5b_pdf.pdf?__blob=publicationFile&v=4
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5c_pdf.pdf?__blob=publicationFile&v=2
- description:
The TOE is an integrated circuit (IC), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL3 Augmented with ALC_FLR.2
|
EAL6+,ALC_FLR.1
|
heuristics/scheme_data/enhanced/cert_link |
https://www.ipa.go.jp/en/security/c0289_eimg.pdf
|
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5c_pdf.pdf?__blob=publicationFile&v=2
|
heuristics/scheme_data/enhanced/certification_date |
2011-04-28
|
04.09.2024
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
-
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
-
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
-
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
-
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
-
Network Protection Function: Enables the TOE to protect network communications using encryption.
-
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
-
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
-
Security Management Function: Enables the TOE administrator to control security functions.
-
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
-
Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
|
The TOE is an integrated circuit (IC), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
|
TÜV Informationstechnik GmbH
|
heuristics/scheme_data/enhanced/product |
Following MFP with FCU, DataOverwriteSecurity Unit, HDD Encryption Unit and Printer/Scanner Unit,
MFP:
Ricoh Aficio MP 6001, Ricoh Aficio MP 7001, Ricoh Aficio MP 8001, Ricoh Aficio MP 9001, Gestetner MP 6001, Gestetner MP 7001, Gestetner MP 8001, Gestetner MP 9001, infotec MP 6001, infotec MP 7001, infotec MP 8001, infotec MP 9001, Lanier LD360, Lanier LD370, Lanier LD380, Lanier LD390, Lanier MP 6001, Lanier MP 7001, Lanier MP 8001, Lanier MP 9001, nashuatec MP 6001, nashuatec MP 7001, nashuatec MP 8001, nashuatec MP 9001, Rex-Rotary MP 6001, Rex-Rotary MP 7001, Rex-Rotary MP 8001, Rex-Rotary MP 9001, Savin 9060, Savin 9070, Savin 9080, Savin 9090
Or Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:
Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Gestetner MP 6001 SP, Gestetner MP 7001 SP, Gestetner MP 8001 SP, Gestetner MP 9001 SP, infotec MP 6001 SP, infotec MP 7001 SP, infotec MP 8001 SP, infotec MP 9001 SP, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP, nashuatec MP 9001 SP, Rex-Rotary MP 6001 SP, Rex-Rotary MP 7001 SP, Rex-Rotary MP 8001 SP, Rex-Rotary MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp
FCU:
Fax Option Type 9001
DataOverwriteSecurity Unit:
DataOverwriteSecurity Unit Type H
HDD Encryption Unit:
HDD Encryption Unit Type A
Printer/Scanner Unit :
Printer/Scanner Unit Type 9001
|
IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
|
heuristics/scheme_data/enhanced/protection_profile |
IEEE Std 2600.1-2009
|
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0289_erpt.pdf
|
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5a_pdf.pdf?__blob=publicationFile&v=2
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0289_est.pdf
|
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5b_pdf.pdf?__blob=publicationFile&v=4
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
1107V5c_pdf.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- DE:
- BSI-DSZ-CC-1107-V5-2024:
1
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL 6:
1
- EAL 5:
1
- EAL 2:
1
- EAL 6 augmented:
1
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- Infineon:
- Infineon Technologies AG:
1
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
235059
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Keywords:
Common Criteria, Certification, Zertifizierung, PP-0084, Infineon, Smart Card, IFX
- /Subject:
Common Criteria, Certification, Zertifizierung, PP-0084, Infineon, Smart Card, IFX
- /Title:
Certificate BSI-DSZ-CC-1107-V5-2024
- pdf_hyperlinks:
|
pdf_data/report_filename |
c0289_erpt.pdf
|
1107V5a_pdf.pdf
|
pdf_data/report_frontpage |
|
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-1107-V5-2024
- cert_item:
IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
- developer:
Infineon Technologies AG
- cert_lab:
BSI
- ref_protection_profiles:
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- cc_version:
PP conformant plus product specific extensions Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 4 December 2028 SOGIS Recognition Agreement
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0289-01:
1
- Certification No. C0289:
1
|
- DE:
- BSI-DSZ-CC-1107-V5-2024:
23
- BSI-DSZ-CC-1107-V4-2023:
4
|
pdf_data/report_keywords/cc_claims |
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014:
2
- BSI-CC-PP-0084-:
1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.5:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
|
pdf_data/report_keywords/cc_sar/ALC |
|
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.5:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL3:
4
- EAL3 augmented:
1
|
- EAL 6:
4
- EAL 5:
4
- EAL 2:
3
- EAL 1:
1
- EAL 4:
1
- EAL5+:
1
- EAL6:
1
- EAL 6 augmented:
3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- out of scope:
1
- 2: Deliverables of the TOE Please note that NRG functionality and most toolbox functionality are out of scope of this evaluation (unless stated otherwise), hence no evaluated TOE guidance documentation applies:
1
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh T11 Security Target”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 2, 2024-09-02, EVALUATION TECHNICAL REPORT SUMMARY (ETR:
1
- TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January:
1
- EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) and Addendum to ETR for composite, Version V2, 2024-09-02, TÜV Informationstechnik GmbH:
1
- AG Chipcard and Security Evaluation Documentation Life Cycle Support”, Infineon Technologies AG (confidential document) [12] 32-bit Security Controller – V11, Hardware Reference Manual, V6.2, 2020-12-21, Infineon:
1
- Standards Compliance Verification”, Version 2, 2024-08-23, TÜV Informationstechnik GmbH (confidential document) [26] SLx3 (40 nm) Security Controllers Production and Personalization Manual Flash Loader V9 Field:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
- MAC:
- KEX:
- KA:
- Key agreement:
3
- Key Agreement:
1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik:
6
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256:
2
- SHA-224:
1
- SHA-384:
1
- SHA-512:
1
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- physical probing:
1
- SPA:
4
- DPA:
4
- FI:
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
- FIPS:
- FIPS197:
3
- FIPS186-4:
11
- FIPS180-4:
7
- FIPS PUB 186-4:
1
- PKCS:
- BSI:
- AIS 34:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 20:
2
- AIS 25:
1
- AIS 26:
1
- AIS 27:
1
- AIS 31:
2
- AIS 32:
1
- AIS 35:
3
- AIS 36:
3
- AIS 37:
1
- AIS 38:
1
- AIS 41:
1
- AIS 46:
1
- AIS 47:
1
- AIS31:
4
- AIS20:
5
- RFC:
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- Triple-DES:
2
- TDES:
2
- TDEA:
1
- constructions:
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
1
|
6
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG:
23
- Infineon:
3
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
755428
- pdf_is_encrypted:
True
- pdf_number_of_pages:
42
- /Author:
IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110823111704+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110823111809+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title:
CRP-e
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
942242
- pdf_is_encrypted:
False
- pdf_number_of_pages:
41
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, PP-0084, Smart Card, IFX, Infineon"
- /Subject: Common Criteria, Certification, Zertifizierung, PP-0084, Smart Card, IFX, Infineon
- /Title:
Certification Report BSI-DSZ-CC-1107-V5-2024
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
pdf_data/report_metadata//Author |
IPA/JISEC
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//Title |
CRP-e
|
Certification Report BSI-DSZ-CC-1107-V5-2024
|
pdf_data/report_metadata/pdf_file_size_bytes |
755428
|
942242
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
pdf_data/report_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
42
|
41
|
pdf_data/st_filename |
c0289_est.pdf
|
1107V5b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- D:
- O:
- O.STORAGE:
9
- O.DOC:
16
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
20
- O.INTERFACE:
8
- O.SOFTWARE:
8
- O.AUDIT:
9
- T:
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
- A:
- A.ACCESS:
5
- A.USER:
4
- A.ADMIN:
10
- OE:
- OE.AUDIT_STORAGE:
3
- OE.AUDIT_ACCESS:
2
- OE.INTERFACE:
4
- OE.PHYSICAL:
5
- OE.USER:
21
- OE.ADMIN:
8
- OE.AUDIT:
3
- OE.AUDIT_ACCESS_AUTHORIZED:
1
|
- O:
- O.RND:
1
- O.TDES:
2
- O.AES:
2
- O.RSA:
5
- O.ECC:
5
- O.AES-TDES-MAC:
5
- O.HASH:
5
- T:
|
pdf_data/st_keywords/cc_claims/O |
- O.STORAGE:
9
- O.DOC:
16
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
20
- O.INTERFACE:
8
- O.SOFTWARE:
8
- O.AUDIT:
9
|
- O.RND:
1
- O.TDES:
2
- O.AES:
2
- O.RSA:
5
- O.ECC:
5
- O.AES-TDES-MAC:
5
- O.HASH:
5
|
pdf_data/st_keywords/cc_claims/T |
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
|
- ADV_ARC.1:
1
- ADV_FSP.5: 4
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_TDS.5: 1
- ADV_SPM.1: 6
- ADV_IMP: 1
- ADV_FSP: 1
- ADV_FSP.4: 2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.2: 3
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 2
- ALC_LCD.1:
1
|
- ALC_DVS: 1
- ALC_FLR.1: 4
- ALC_CMC.5: 3
- ALC_CMS.5: 3
- ALC_DEL.1:
1
- ALC_DVS.2: 1
- ALC_LCD.1:
1
- ALC_TAT.3: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMC: 1
- ALC_FLR: 1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_INT: 14
- ASE_CCL: 4
- ASE_SPD: 4
- ASE_OBJ: 6
- ASE_ECD: 4
- ASE_REQ: 36
- ASE_TSS: 5
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2:
1
|
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2:
1
- ATE_COV: 1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
- EAL6+:
2
- EAL6:
5
- EAL 6:
2
- EAL6 augmented:
2
- EAL 6 augmented:
2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_STG.1:
9
- FAU_STG.4:
7
- FAU_SAR.1:
9
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FCS:
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
- FDP:
- FDP_ACC.1:
33
- FDP_ACF.1:
30
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
4
- FDP_ACF.1.4:
3
- FDP_ACF.1.3:
6
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
2
- FDP_RIP.1:
8
- FDP_RIP.1.1:
1
- FDP_IFC.1:
4
- FIA:
- FIA_AFL.1:
7
- FIA_UAU.7:
7
- FIA_SOS.1:
7
- FIA_UID.1:
17
- FIA_UAU.1:
13
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
8
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1:
6
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_SMF.1:
22
- FMT_SMR.1:
28
- FMT_MSA.3:
22
- FMT_MSA.1:
20
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
12
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_FDI_EXP:
4
- FPT_FDI_EXP.1:
10
- FPT_FDI_EXP.1.1:
2
- FPT_STM.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1:
5
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTA:
- FTA_SSL.3:
9
- FTA_SSL.3.1:
1
- FTP:
- FTP_ITC.1:
17
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1:
1
|
- FAU:
- FAU_SAS:
4
- FAU_SAS.1:
6
- FAU_GEN:
1
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG:
37
- FCS_COP:
40
- FCS_CKM:
30
- FCS_RNG.1:
23
- FCS_CKM.1:
21
- FCS_CKM.4:
20
- FCS_COP.1:
14
- FCS_CKM.2:
3
- FDP:
- FDP_SDC:
2
- FDP_SDC.1:
5
- FDP_SDI.2:
5
- FDP_ITT.1:
4
- FDP_IFC.1:
8
- FDP_UCT.1:
10
- FDP_UIT.1:
12
- FDP_ACC:
13
- FDP_ACF:
15
- FDP_ACC.1:
18
- FDP_ACF.1:
15
- FDP_ITC.1:
18
- FDP_ITC.2:
18
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
1
- FDP_SDI.1:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_SDC.1.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FIA:
- FIA_API:
2
- FIA_API.1:
7
- FIA_UID:
7
- FIA_UID.1:
6
- FIA_UID.2:
3
- FIA_API.1.1:
1
- FMT:
- FMT_LIM:
16
- FMT_LIM.1:
7
- FMT_LIM.2:
6
- FMT_MSA.1:
8
- FMT_MSA.3:
11
- FMT_SMF.1:
11
- FMT_SMR.1:
16
- FMT_MTD:
11
- FMT_SMR:
8
- FMT_SMF:
8
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
1
- FPT:
- FPT_TST.2:
28
- FPT_TST:
5
- FPT_TST.1:
11
- FPT_FLS.1:
7
- FPT_PHP.3:
4
- FPT_ITT.1:
4
- FPT_FLS:
11
- FPT_TST.2.1:
1
- FRU:
- FTP:
- FTP_ITC.1:
18
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
4
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_STG.1:
9
- FAU_STG.4:
7
- FAU_SAR.1:
9
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
|
- FAU_SAS:
4
- FAU_SAS.1:
6
- FAU_GEN:
1
- FAU_SAS.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1: 1
- FCS_COP.1.1: 1
|
- FCS_RNG: 37
- FCS_COP: 40
- FCS_CKM: 30
- FCS_RNG.1: 23
- FCS_CKM.1:
21
- FCS_CKM.4:
20
- FCS_COP.1:
14
- FCS_CKM.2:
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
10
|
21
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
7
|
20
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
14
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
33
- FDP_ACF.1:
30
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
4
- FDP_ACF.1.4:
3
- FDP_ACF.1.3:
6
- FDP_IFF: 1
- FDP_IFC: 1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_IFC.1:
4
|
- FDP_SDC: 2
- FDP_SDC.1: 5
- FDP_SDI.2: 5
- FDP_ITT.1: 4
- FDP_IFC.1:
8
- FDP_UCT.1: 10
- FDP_UIT.1: 12
- FDP_ACC: 13
- FDP_ACF: 15
- FDP_ACC.1:
18
- FDP_ACF.1:
15
- FDP_ITC.1:
18
- FDP_ITC.2:
18
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
1
- FDP_SDI.1: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SDC.1.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
33
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
30
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
6
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
2
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
2
|
18
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1: 7
- FIA_UAU.7: 7
- FIA_SOS.1: 7
- FIA_UID.1:
17
- FIA_UAU.1: 13
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7.1: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
|
- FIA_API: 2
- FIA_API.1: 7
- FIA_UID: 7
- FIA_UID.1:
6
- FIA_UID.2: 3
- FIA_API.1.1: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
17
|
6
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_SMF.1:
22
- FMT_SMR.1:
28
- FMT_MSA.3:
22
- FMT_MSA.1:
20
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
12
- FMT_MTD.1.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_LIM: 16
- FMT_LIM.1: 7
- FMT_LIM.2: 6
- FMT_MSA.1:
8
- FMT_MSA.3:
11
- FMT_SMF.1:
11
- FMT_SMR.1:
16
- FMT_MTD: 11
- FMT_SMR: 8
- FMT_SMF: 8
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
20
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
22
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
12
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
22
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
28
|
16
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FDI_EXP: 4
- FPT_FDI_EXP.1: 10
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1:
5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
- FPT_TST.2: 28
- FPT_TST: 5
- FPT_TST.1:
11
- FPT_FLS.1: 7
- FPT_PHP.3: 4
- FPT_ITT.1: 4
- FPT_FLS: 11
- FPT_TST.2.1: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
5
|
11
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
17
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1: 1
|
- FTP_ITC.1:
18
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
17
|
18
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- SCA:
- Leak-Inherent:
5
- Physical Probing:
2
- side channel:
1
- SPA:
1
- DPA:
2
- FI:
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- BSI:
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
|
- FIPS:
- BSI:
- RFC:
- ISO:
- ISO/IEC 7816-3:
1
- ISO/IEC 14443:
6
- ISO/IEC 18092:
4
- ISO/IEC 14443-4:
1
- ISO/IEC14443-3:
1
- ICAO:
- CC:
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
|
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- DES:
- 3DES:
- TDES:
16
- Triple-DES:
1
- TDEA:
1
- miscellaneous:
- constructions:
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
2
|
19
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon Technologies:
7
- Infineon Technologies AG:
13
- Infineon:
3
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
957639
- pdf_is_encrypted:
False
- pdf_number_of_pages:
88
- /CreationDate:
D:20110610133143+09'00'
- /Author:
RICOH
- /Creator:
Word 用 Acrobat PDFMaker 7.0.7
- /Producer:
Acrobat Distiller 7.0.5 (Windows)
- /ModDate:
D:20110610133328+09'00'
- /Company:
株式会社リコー
- /SourceModified:
D:20110610043020
- /Title:
Microsoft Word - MP_9001_P2600_ST_1.00_ENG20110609
- pdf_hyperlinks:
|
None
|
dgst |
eeb339bc4babda8f
|
8fc68a5019758001
|