Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software, Version: A55V0Y0-0100-G00-10
JISEC-CC-CRP-C0398
ProxSIM Taurus, version 1.0
NSCIB-CC-09-26151-CR
name bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software, Version: A55V0Y0-0100-G00-10 ProxSIM Taurus, version 1.0
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP NL
not_valid_after 07.08.2018 31.05.2021
not_valid_before 12.07.2013 31.05.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0398_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-09-26151-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0398_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-LITE]%20ASE_ST_ProxSIMTaurus_Lite.pdf
manufacturer KONICA MINOLTA, INC. G+D Mobile Security GmbH
manufacturer_web https://www.konicaminolta.com/index.html https://www.gi-de.com/de/de/mobile-security/
security_level EAL3 AVA_VAN.5, ALC_DVS.2, ALC_FLR.2, EAL4+
dgst f063d400c202d861 43cfcde53a449ecc
heuristics/cert_id JISEC-CC-CRP-C0398 NSCIB-CC-09-26151-CR
heuristics/cert_lab []
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_754:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_654:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ALC_CMC.3, ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ALC_DVS.1, ASE_REQ.2, ADV_TDS.2, ALC_CMS.3, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_FSP.3, ASE_OBJ.2, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_LCD.1 AVA_VAN.5, ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ADV_IMP.1, ALC_FLR.2, ASE_REQ.2, ALC_TAT.1, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ALC_CMS.4, ASE_ECD.1, ADV_TDS.3, ALC_DEL.1, ASE_OBJ.2, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_CMC.4, ALC_LCD.1
heuristics/extracted_versions 654, 754, 10, 0100 1.0
heuristics/report_references/directly_referenced_by {} NSCIB-CC-11-32973-CR
heuristics/report_references/directly_referencing {} ANSSI-CC-2010/57, ANSSI-CC-2009/57
heuristics/report_references/indirectly_referenced_by {} NSCIB-CC-11-32973-CR
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2009/05, ANSSI-CC-2010/02, ANSSI-CC-2009/57, ANSSI-CC-2009/26, ANSSI-CC-2009/51, ANSSI-CC-2010/22, ANSSI-CC-2010/57, ANSSI-CC-2010/01, ANSSI-CC-2010/19, ANSSI-CC-2009/28, ANSSI-CC-2009/25, ANSSI-CC-2009/50, ANSSI-CC-2009/06, ANSSI-CC-2009/62
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0398
  • certification_date: 01.07.2013
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0398_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function that records the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the image data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the image data area no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite data area including the image data of HDD to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Japanese : bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Zentai Seigyo Software English : bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0398_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0398_est.pdf
    • toe_version: A55V0Y0-0100-G00-10
    • vendor: KONICA MINOLTA, INC.
  • expiration_date: 01.08.2018
  • revalidations: [frozendict({'date': '2014-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0398_it3440_01.html'})]
  • supplier: KONICA MINOLTA, INC.
  • toe_japan_name: bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Zentai Seigyo SoftwareA55V0Y0-0100-G00-10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0398_it3440.html
  • toe_overseas_name: bizhub 754 / bizhub 654 / ineo 754 / ineo 654 / N906 / N905 / N901 / N900 Control Software A55V0Y0-0100-G00-10
heuristics/st_references/directly_referencing {} ANSSI-CC-2009/57
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2009/57
heuristics/protection_profiles {} 85bef5b6f16c4d33
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf
pdf_data/report_filename c0398_erpt.pdf Certification Report NSCIB-CC-09-26151-CR.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-09-26151-CR
    • cert_item: ProxSIM Taurus, v1.0
    • cert_lab: Brightsight
    • developer: Giesecke & Devrient GmbH
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0398-01: 1
    • Certification No. C0398: 1
  • FR:
    • ANSSI-2010/57: 1
    • ANSSI-CC-2009/57: 1
    • ANSSI-CC-PP-2010/03: 1
  • NL:
    • NSCIB-CC-09-26151: 1
    • NSCIB-CC-09-26151-CR: 15
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03: 1
  • BSI:
    • BSI-PP-0035: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5+: 1
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL4+: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
  • T:
    • T.ACCESS-GROUP-: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 2
    • T.BRING-OUT-STORA: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRA: 1
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • GD:
    • G&D: 9
    • Giesecke & Devrient: 4
  • Samsung:
    • Samsung: 3
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 10
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 4
  • SCA:
    • DPA: 1
    • side channel: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • ISO:
    • ISO/IEC 7816-3: 1
    • ISO/IEC 7816-4: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2: 1
    • Java Card 2.2.2: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of: 1
pdf_data/report_metadata
  • /CreationDate: D:20131008135938+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20131008140306+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 452687
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 40
pdf_data/st_filename c0398_est.pdf [ST-LITE] ASE_ST_ProxSIMTaurus_Lite.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2009/57: 1
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL4: 3
    • EAL4 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 5
  • ALC:
    • ALC_DVS.2: 5
  • AVA:
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GNE.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 3
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 2
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 84
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 69
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 15
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 89
    • FIA_AFL.1.1: 8
    • FIA_AFL.1.2: 8
    • FIA_ATD.1: 30
    • FIA_ATD.1.1: 1
    • FIA_MSA.3: 1
    • FIA_SOS.1: 52
    • FIA_SOS.1.1: 4
    • FIA_SOS.2: 10
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 47
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 55
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 20
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 32
    • FIA_UID.2: 84
    • FIA_UID.2.1: 7
    • FIA_USB.1: 27
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 63
    • FMT_MOF.1.1: 5
    • FMT_MSA: 5
    • FMT_MSA.1: 43
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 52
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 166
    • FMT_MTD.1.1: 15
    • FMT_SMF.1: 130
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 202
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SOS.1: 1
  • FPT:
    • FPT_STM.1: 7
  • FTA:
    • FTA_SSL: 3
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP: 4
    • FAU_ARP.1: 9
  • FCO:
    • FCO_NRO: 4
    • FCO_NRO.2: 6
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 2
    • FCS_CKM.3: 7
    • FCS_CKM.3.1: 2
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 6
    • FCS_COP.1.1: 13
  • FDP:
    • FDP_ACC: 12
    • FDP_ACC.2: 13
    • FDP_ACF: 12
    • FDP_ACF.1: 28
    • FDP_IFC: 12
    • FDP_IFC.1: 6
    • FDP_IFC.2: 4
    • FDP_IFF: 12
    • FDP_IFF.1: 30
    • FDP_ITC: 4
    • FDP_ITC.2: 10
    • FDP_RIP: 32
    • FDP_RIP.1: 32
    • FDP_ROL: 8
    • FDP_ROL.1: 8
    • FDP_SDI.2: 4
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UIT: 4
    • FDP_UIT.1: 4
  • FIA:
    • FIA_ATD: 4
    • FIA_ATD.1: 2
    • FIA_UID: 8
    • FIA_UID.1: 4
    • FIA_UID.2: 2
    • FIA_USB: 4
    • FIA_USB.1.1: 2
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 2
  • FMT:
    • FMT_MSA: 40
    • FMT_MSA.1: 12
    • FMT_MSA.2: 4
    • FMT_MSA.3: 26
    • FMT_MTD: 8
    • FMT_MTD.1: 2
    • FMT_MTD.3: 2
    • FMT_REV: 4
    • FMT_REV.1: 6
    • FMT_SMF: 14
    • FMT_SMF.1: 10
    • FMT_SMR: 18
    • FMT_SMR.1: 23
  • FPR:
    • FPR_UNO.1: 4
    • FPR_UNO.1.1: 2
  • FPT:
    • FPT_FLS: 15
    • FPT_FLS.1: 8
    • FPT_RCV: 4
    • FPT_RCV.3: 8
    • FPT_TDC.1: 5
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 3
  • FTP:
    • FTP_ITC: 4
    • FTP_ITC.1: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 5
    • A.NETWORK: 6
    • A.SECRET: 3
    • A.SERVICE: 4
  • O:
    • O.AUDIT: 3
    • O.AUDIT-LOGGED: 3
    • O.AUTH: 4
    • O.AUTH-CAPABILITY: 5
    • O.CONFIG: 12
    • O.CR: 1
    • O.CRYPT: 4
    • O.CRYPTO: 5
    • O.CRYPTO-CAPABILITY: 4
    • O.CRYPTO-KEY: 2
    • O.CRYPTO-MAIL: 2
    • O.FAX: 2
    • O.FAX-CONTROL: 6
    • O.GROUP: 3
    • O.GROUP-BOX: 3
    • O.OVERW: 1
    • O.OVERWRITE: 7
    • O.PRIVATE: 3
    • O.PRIVATE-BOX: 3
    • O.PUBLIC: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED: 3
    • O.REGISTERED-USER: 12
    • O.SECURE: 4
    • O.SECURE-PRINT: 6
    • O.TRUSTED: 3
    • O.TRUSTED-PATH: 5
  • OE:
    • OE.ADMIN: 3
    • OE.AUDIT: 6
    • OE.AUDIT-REVIEWED: 2
    • OE.AUDIT_ACCESS-AUT: 1
    • OE.AUDIT_ACESS-AUTHORIZED: 1
    • OE.AUDIT_STORAGE-PR: 1
    • OE.AUDIT_STORAGE-PROTECTED: 1
    • OE.FAX: 2
    • OE.FAX-UNIT: 2
    • OE.FEED: 2
    • OE.FEED-BACK: 8
    • OE.NETWORK: 4
    • OE.S: 1
    • OE.SECRET: 3
    • OE.SERVER: 5
    • OE.SERVICE: 3
    • OE.SESSION: 10
    • OE.SETTING: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS: 19
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.BACKUP: 3
    • T.BACKUP-RESTORE: 1
    • T.BRING: 3
    • T.DISCARD: 3
    • T.DISCARD-MFP: 1
    • T.UNEXPECTED: 4
    • T.UNEXPECTED-TRANSMISSION: 1
  • A:
    • A.APPLET: 2
    • A.DELETION: 2
    • A.VERIFICATION: 2
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 7
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.CRYPTO: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 3
    • O.APPLET: 22
    • O.CIPHER: 4
    • O.CODE_PKG: 13
    • O.DELETION: 1
    • O.FIREWALL: 3
    • O.GLOBAL_ARRAYS_CONFID: 2
    • O.GLOBAL_ARRAYS_INTEG: 2
    • O.INSTALL: 1
    • O.JAVAOBJECT: 32
    • O.KEY-: 1
    • O.KEY-MNGT: 3
    • O.KEYMNGT: 2
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 3
    • O.PIN-MNGT: 4
    • O.REALLOCATION: 3
    • O.REMOTE: 1
    • O.REMOTE_MTHD: 6
    • O.REMOTE_OBJ: 11
    • O.RESOURCES: 1
    • O.RMI_SERVICE: 13
    • O.ROR: 5
    • O.SCP: 25
    • O.SID: 3
    • O.TRANSACTION: 4
  • OE:
    • OE.APPLET: 2
    • OE.CARD-MANAGEMENT: 2
    • OE.CARDMANAGEMENT: 2
    • OE.SCP: 18
    • OE.SYM_KEY_GEN: 13
    • OE.VERIFICATION: 4
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 8
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 3
    • OP.INSTANCE_FIELD: 3
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.INVOKE: 3
    • OP.JAVA: 6
    • OP.PUT: 5
    • OP.RET_RORD: 4
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.VERIFICATION: 2
  • R:
    • R.JAVA: 11
  • T:
    • T.CONFID-APPLI-: 1
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.DELETION: 1
    • T.EXE-: 1
    • T.EXE-CODE: 2
    • T.EXE-CODE-REMOTE: 1
    • T.INSTALL: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 5
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 5
    • T.RESSOURCES: 1
    • T.SID: 2
pdf_data/st_keywords/vendor
  • GD:
    • G&D: 24
    • Giesecke & Devrient: 8
  • Samsung:
    • Samsung: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • 3DES:
      • 3-DES: 8
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CBC-MAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-CRT: 5
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 5
  • IKE:
    • IKE: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • physical probing: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 186: 2
    • FIPS 186-2: 4
    • FIPS PUB 197: 2
  • X509:
    • X.509: 1
  • BSI:
    • AIS 20: 1
    • AIS20: 3
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 14888: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC 7816-6: 1
  • PKCS:
    • PKCS1: 9
    • PKCS5: 5
  • RFC:
    • RFC 2409: 1
    • RFC 3447: 1
    • RFC2409: 5
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2: 1
    • Java Card 2.2.2: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 2
  • javacard:
    • javacard.framework: 3
    • javacard.framework.service: 1
    • javacard.security: 2
  • javacardx:
    • javacardx.crypto: 1
    • javacardx.rmi: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
  • OutOfScope:
    • Java Card API (class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation. 6.1.1.3.3 FPT_TDC.1 Inter-TSF basic TSF data consistency 6.1.1.3.3.1 FPT_TDC.1: 1
    • class Checksum) or implement its own mechanisms in the application, which both is out of scope of this evaluation: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20131007140604+09'00'
  • /Creator: CubePDF
  • /Keywords:
  • /ModDate: D:20131007140609+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1150770
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 114
  • /Author: gawlasf
  • /CreationDate: D:20110525172616+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20110525172616+02'00'
  • /Producer: Acrobat Distiller 9.4.2 (Windows)
  • /Title: Microsoft Word - ASE_ST_ProxSIMTaurus_Lite.doc
  • pdf_file_size_bytes: 471900
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 98
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different