name |
bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software, Version: A55V0Y0-0100-G00-10 |
Secured Microcontrollers ATMEL AT90SC256144RCFT and AT90SC25672RCFT (AT58879) rev. E |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
07.08.2018 |
01.09.2019 |
not_valid_before |
12.07.2013 |
20.05.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0398_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2009_10fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0398_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2009_10en.pdf |
manufacturer |
KONICA MINOLTA, INC. |
ATMEL Smart Card ICs |
manufacturer_web |
https://www.konicaminolta.com/index.html |
https://www.atmel.com |
security_level |
EAL3 |
ALC_DVS.2, EAL5+, AVA_VLA.4, AVA_MSU.3 |
dgst |
f063d400c202d861 |
f9fedf99e24bb4bc |
heuristics/cert_id |
JISEC-CC-CRP-C0398 |
ANSSI-CC-2009/10 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_754:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_654:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMC.3, ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ALC_DVS.1, ASE_REQ.2, ADV_TDS.2, ALC_CMS.3, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_FSP.3, ASE_OBJ.2, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_LCD.1 |
ADV_IMP.2, ATE_COV.2, AGD_USR.1, AVA_VLA.4, ADV_SPM.3, ADV_INT.1, ADV_RCR.2, ALC_DVS.2, ATE_IND.2, ADV_HLD.3, ADV_FSP.3, ATE_DPT.2, AGD_ADM.1, AVA_CCA.1, AVA_MSU.3, ALC_LCD.2, ALC_TAT.2, ATE_FUN.1, AVA_SOF.1, ADV_LLD.1 |
heuristics/extracted_versions |
654, 754, 10, 0100 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2009/22, ANSSI-CC-2009/23 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2008/10 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2009/22, ANSSI-CC-2009/24, NSCIB-CC-09-11192-CR2, ANSSI-CC-2009/23 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2008/10 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0398
- certification_date: 01.07.2013
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0398_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function that records the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the image data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the image data area no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite data area including the image data of HDD to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Japanese : bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Zentai Seigyo Software English : bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0398_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0398_est.pdf
- toe_version: A55V0Y0-0100-G00-10
- vendor: KONICA MINOLTA, INC.
- expiration_date: 01.08.2018
- revalidations: [frozendict({'date': '2014-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0398_it3440_01.html'})]
- supplier: KONICA MINOLTA, INC.
- toe_japan_name: bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Zentai Seigyo SoftwareA55V0Y0-0100-G00-10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0398_it3440.html
- toe_overseas_name: bizhub 754 / bizhub 654 / ineo 754 / ineo 654 / N906 / N905 / N901 / N900 Control Software A55V0Y0-0100-G00-10
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2009/36 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2010/25, ANSSI-CC-2010/37, ANSSI-CC-2010/39, ANSSI-CC-2009/36, ANSSI-CC-2010/36, ANSSI-CC-2010/38 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0398_erpt.pdf |
dcssi-2009_10fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
- cc_version: Critères Communs version 2.3 conforme à la norme ISO 15408:2005
- cert_id: DCSSI-2009/10
- cert_item: Microcontrôleur sécurisé ATMEL AT90SC256144RCFT / AT90SC25672RCFT rev. E
- cert_item_version: AT90SC256144RCFT / AT90SC25672RCFT, référence AT58879 révision E
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Tél : +33 (0)5 57 26 08 75, mél : [email protected]
- developer: ATMEL Secure Microcontroller Solutions Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR - Ecosse, Royaume-Uni Commanditaire ATMEL Secure Microcontroller Solutions Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR - Ecosse, Royaume-Uni
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP BSI-PP-0002-2001
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0398-01: 1
- Certification No. C0398: 1
|
- FR:
- DCSSI-2008/10: 1
- DCSSI-2009/10: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 4
- EAL4+: 2
- EAL5+: 3
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 1
- AVA_VLA: 1
- AVA_VLA.4: 2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- T:
- T.ACCESS-GROUP-: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-PRIVATE-: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 2
- T.BRING-OUT-STORA: 1
- T.BRING-OUT-STORAGE: 1
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRA: 1
- T.UNEXPECTED-TRANSMISSION: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
- ATMEL:
- ATMEL AT90SC256144RCFT: 20
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of: 1
|
|
pdf_data/report_metadata |
- /CreationDate: D:20131008135938+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20131008140306+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 452687
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 40
|
- /Author: bouquet
- /CreationDate: D:20090520173316
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20090520173316
- /Producer: GPL Ghostscript 8.15
- /Title: Microsoft Word - dcssi-2009_10fr.doc
- pdf_file_size_bytes: 181925
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
c0398_est.pdf |
dcssi-cible2009_10en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-002-: 1
- BSI-PP-002-2001: 13
- BSI-PP002-2001: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 7
- EAL5 augmented: 1
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 1
- ACM_SCP: 1
- ACM_SCP.3: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 1
- ADV_FSP.3: 1
- ADV_HLD: 1
- ADV_HLD.3: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 1
- ADV_RCR.2: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.2: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 1
- AVA_CCA.1: 1
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA: 1
- AVA_VLA.4: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GNE.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 3
- FAU_SAR.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 2
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 84
- FDP_ACC.1.1: 4
- FDP_ACF.1: 69
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ACP.1: 1
- FDP_IFC.1: 15
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 3
- FDP_RIP.1.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 89
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 8
- FIA_ATD.1: 30
- FIA_ATD.1.1: 1
- FIA_MSA.3: 1
- FIA_SOS.1: 52
- FIA_SOS.1.1: 4
- FIA_SOS.2: 10
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU: 2
- FIA_UAU.1: 47
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 55
- FIA_UAU.2.1: 4
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UAU.7: 20
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 32
- FIA_UID.2: 84
- FIA_UID.2.1: 7
- FIA_USB.1: 27
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 63
- FMT_MOF.1.1: 5
- FMT_MSA: 5
- FMT_MSA.1: 43
- FMT_MSA.1.1: 3
- FMT_MSA.3: 52
- FMT_MSA.3.1: 8
- FMT_MSA.3.2: 7
- FMT_MTD.1: 166
- FMT_MTD.1.1: 15
- FMT_SMF.1: 130
- FMT_SMF.1.1: 1
- FMT_SMR.1: 202
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SOS.1: 1
- FPT:
- FTA:
- FTA_SSL: 3
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_SAS.1: 3
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 4
- FCS_COP.1.1: 1
- FCS_RND.1: 3
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 4
- FDP_ACC.2: 4
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_AFC.1: 1
- FDP_IFC.1: 6
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_ITT.1: 4
- FDP_ITT.1.1: 1
- FIA:
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 2
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_ITT.1: 3
- FPT_ITT.1.1: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FPT_SEP.1: 3
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 5
- A.NETWORK: 6
- A.SECRET: 3
- A.SERVICE: 4
- O:
- O.AUDIT: 3
- O.AUDIT-LOGGED: 3
- O.AUTH: 4
- O.AUTH-CAPABILITY: 5
- O.CONFIG: 12
- O.CR: 1
- O.CRYPT: 4
- O.CRYPTO: 5
- O.CRYPTO-CAPABILITY: 4
- O.CRYPTO-KEY: 2
- O.CRYPTO-MAIL: 2
- O.FAX: 2
- O.FAX-CONTROL: 6
- O.GROUP: 3
- O.GROUP-BOX: 3
- O.OVERW: 1
- O.OVERWRITE: 7
- O.PRIVATE: 3
- O.PRIVATE-BOX: 3
- O.PUBLIC: 3
- O.PUBLIC-BOX: 6
- O.REGISTERED: 3
- O.REGISTERED-USER: 12
- O.SECURE: 4
- O.SECURE-PRINT: 6
- O.TRUSTED: 3
- O.TRUSTED-PATH: 5
- OE:
- OE.ADMIN: 3
- OE.AUDIT: 6
- OE.AUDIT-REVIEWED: 2
- OE.AUDIT_ACCESS-AUT: 1
- OE.AUDIT_ACESS-AUTHORIZED: 1
- OE.AUDIT_STORAGE-PR: 1
- OE.AUDIT_STORAGE-PROTECTED: 1
- OE.FAX: 2
- OE.FAX-UNIT: 2
- OE.FEED: 2
- OE.FEED-BACK: 8
- OE.NETWORK: 4
- OE.S: 1
- OE.SECRET: 3
- OE.SERVER: 5
- OE.SERVICE: 3
- OE.SESSION: 10
- OE.SETTING: 2
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS: 19
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.BACKUP: 3
- T.BACKUP-RESTORE: 1
- T.BRING: 3
- T.DISCARD: 3
- T.DISCARD-MFP: 1
- T.UNEXPECTED: 4
- T.UNEXPECTED-TRANSMISSION: 1
|
- D:
- D.CPU_EEPROM_DATA: 1
- D.CPU_EEPROM_DSOFT: 1
- D.CPU_EEPROM_SOFT: 1
- D.CPU_RAM_DATA: 2
- D.CPU_ROM_DATA: 2
- D.CPU_ROM_DSOFT: 2
- D.CPU_ROM_SOFT: 2
- D.CRYPTO_RAM_DATA: 2
- D.CRYPTO_ROM_DATA: 2
- D.CRYPTO_ROM_DSOFT: 2
- D.CRYPTO_ROM_SOFT: 2
- D.DESIGN: 1
- D.DEV_TOOLS: 1
- D.IC_SPEC: 1
- D.MASK: 1
- D.PERIPH_REG_DATA: 2
- D.RNG_DATA: 2
- D.TECHNO: 1
- O:
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 9
- malfunction: 4
- SCA:
- DPA: 4
- Leak-Inherent: 5
- Physical Probing: 2
- Physical probing: 1
- SPA: 2
- physical probing: 5
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 186: 2
- FIPS 186-2: 4
- FIPS PUB 197: 2
- X509:
|
- FIPS:
- FIPS 140-2: 2
- FIPS PUB 46-3: 1
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 3309: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20131007140604+09'00'
- /Creator: CubePDF
- /Keywords:
- /ModDate: D:20131007140609+09'00'
- /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
- /Subject:
- /Title:
- pdf_file_size_bytes: 1150770
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 114
|
- /Author: John Boggie
- /CreationDate: D:20090129151750Z
- /Creator: FrameMaker 6.0
- /ModDate: D:20090129152115Z
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title: AT90SC25672RCFT Security target Lite
- pdf_file_size_bytes: 679925
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 85
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |