name |
bizhub PRO 1050 control software Image control program(Image control I1):11-0000 Controller control program(IP control P1):10-0000 |
Plateforme ID Motion V1 avec AMD 122v1 sur composants M7820 A11 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
01.09.2019 |
not_valid_before |
21.02.2005 |
21.12.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0019_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2012_44.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0019_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible2012_44en.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Gemalto - Infineon Technologies AG |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.gemalto.com/ |
security_level |
EAL3 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
f7247eee0c64bc9d |
7ad4328859ad66c1 |
heuristics/cert_id |
JISEC-CC-CRP-C0019 |
ANSSI-CC-2012/44 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
AGD_PRE.1, AVA_VAN.5, ADV_COMP.1, ALC_DVS.2, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ADV_FSP.2, ADV_SPM.1, ADV_IMP.1 |
heuristics/extracted_versions |
11, 1050, 10, 0000 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2013/10 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2013/10 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0019
- certification_date: 01.02.2005
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0019_eimg.pdf
- description: PRODUCT DESCRIPTION This product (it is called "bizhub PRO 1050 control software (*1)", hereafter.) is the software installed with digital MFP (it is called "bizhub PRO 1050 series", hereafter.) manufactured by Konica Minolta Business Technologies, Inc. and for the purpose of reducing the danger to be leaked the document data stored by every user.Bizhub PRO 1050 control software prevents the document data from leaking in the function to use copier and printer etc. To protect the document data, this software has "User BOX" function and several control capabilities, additionally high-confidential hard disk drive (HDD) with lock system (*2) to store the document.Bizhub PRO 1050 control software is provided with bizhub PRO 1050 series. (*1) "bizhub PRO 1050 zentai seigyo software" for Japan and "bizhub PRO 1050 control software" are the same product with different calling name. (*2) HDD has the password so that the hard disk cannot be removed and read in another equipment.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: Japan: bizhub PRO 1050 zentai seigyo software Overseas: bizhub PRO 1050 control software
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0019_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0019_est2.pdf
- toe_version: Image control program(Image control I1):11-0000 Controller control program(IP control P1):10-0000
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2008-10', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0019_it4027_06.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub PRO 1050 control software Image control program(Image control I1):11-0000 Controller control program(IP control P1):10-0000
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0019_it4027.html
- toe_overseas_name: bizhub PRO 1050/1050e control software Image control program (Image control I1) : 70-0000 Controller control program (IP control P1) : 31-0000
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0019_erpt.pdf |
ANSSI-CC-2012_44.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2012/44
- cert_item: Plateforme ID Motion V1 avec AMD 122v1 sur composants M7820 A11
- cert_item_version: Version du logiciel embarqué : Plateformes Multos 74 et 75 Version du code correctif : AMD 122v1 Variantes du composant M7820 A11 : Microcontrôleurs SLE78CLXxxxxP et SLE78CLXxxxxPM
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0019-01: 1
- Certification No. C0019: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.ACCESS: 1
- T.HDDACCESS: 1
- T.IMPADMIN: 1
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20050812114303+09'00'
- /ModDate: D:20050812114303+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 203262
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
- /Author: torno
- /CreationDate: D:20130201153617+01'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20130201153617+01'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title: ANSSI-CC-2012_44
- pdf_file_size_bytes: 151124
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
c0019_est.pdf |
anssi-cc-cible2012_44en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0606-: 1
- BSI-DSZ-CC-0813-2012: 8
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 6
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.2: 1
- ADV_IMP.1: 1
- ADV_SPM.1: 2
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 13
- FAU_SAR.1.1: 1
- FAU_SAR.2: 11
- FAU_SAR.2.1: 1
- FAU_STG.1: 13
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 10
- FDP:
- FDP_ACC.1: 26
- FDP_ACC.1.1: 2
- FDP_ACF.1: 28
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_MTD.1: 16
- FDP_MTD.1.1: 1
- FDP_SOS: 1
- FDP_SOS.1: 20
- FDP_SOS.1.1: 1
- FDP_UAU.2: 1
- FDP_UID.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 13
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS: 2
- FIA_SOS.1: 32
- FIA_SOS.1.1: 2
- FIA_UAU: 2
- FIA_UAU.1: 9
- FIA_UAU.2: 20
- FIA_UAU.2.1: 1
- FIA_UAU.7: 15
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 10
- FIA_UID.2: 23
- FMT:
- FMT_MOF.1: 43
- FMT_MOF.1.1: 1
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 56
- FMT_MTD.1.1: 5
- FMT_RVM.1: 1
- FMT_SMF.1: 24
- FMT_SMF.1.1: 1
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 39
- FPT_RVM.1.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
|
- FAU:
- FAU_ARP: 3
- FAU_ARP.1: 3
- FAU_ARP.1.1: 2
- FAU_GEN.1: 4
- FAU_SAA: 3
- FAU_SAA.1: 4
- FAU_SAA.1.1: 2
- FAU_SAA.1.2: 2
- FAU_SAS.1: 1
- FCS:
- FCS_CKM: 4
- FCS_CKM.3: 3
- FCS_CKM.3.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 3
- FCS_COP.1: 6
- FCS_COP.1.1: 3
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 5
- FDP_ACC.2: 3
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 6
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_DAU: 3
- FDP_DAU.1: 3
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_IFC.1: 1
- FDP_ITC: 3
- FDP_ITC.1: 6
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 1
- FDP_RIP: 3
- FDP_RIP.1: 3
- FDP_RIP.1.1: 1
- FDP_ROL: 3
- FDP_ROL.1: 3
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI: 3
- FDP_SDI.1: 1
- FDP_SDI.2: 4
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 4
- FIA_ATD.1.1: 2
- FIA_UAU: 4
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 3
- FIA_UAU.4.1: 1
- FIA_UID: 3
- FIA_UID.1: 5
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 3
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF: 3
- FMT_MOF.1: 3
- FMT_MOF.1.1: 2
- FMT_MSA: 5
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.2: 6
- FMT_MSA.2.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 4
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_MTD.2: 3
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMF.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 3
- FPR_UNO.1: 3
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 3
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_RCV: 2
- FPT_RCV.4: 3
- FPT_RCV.4.1: 1
- FPT_TDC: 3
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 3
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FRU_FLT.2: 1
- FRU_RSA: 3
- FRU_RSA.1: 3
- FRU_RSA.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AUDIT: 9
- O.CE: 5
- O.DATAACCESS: 8
- O.IA: 11
- O.MANAGE: 7
- OE:
- OE.ADMIN: 4
- OE.CE: 4
- OE.HDD: 6
- OE.NET: 4
- OE.PLACE: 4
- OE.USR: 4
- T:
- T.ACCESS: 2
- T.HDDACCESS: 2
- T.IMPADMIN: 2
|
- A:
- O:
- O.APPLI_DEV: 3
- O.CIPHER: 1
- O.DECIPHER: 1
- O.DEV_DIS_ES: 4
- O.DLV_DATA: 4
- O.EFFECT_L: 2
- O.EFFECT_R: 2
- O.INIT_ACS: 3
- O.LOAD: 3
- O.REMOVE: 1
- O.RESOURCE: 1
- O.RND: 1
- O.ROLLBACK: 1
- O.SAMPLE_ACS: 1
- O.SECURITY: 2
- O.SEGREGATE: 1
- O.SIDE: 3
- O.TAMPER_ES: 6
- OSP:
- OSP.CIPHER: 1
- OSP.CONF-ALU: 1
- T:
- T.APP_CORR: 3
- T.APP_DISC: 3
- T.APP_MOD: 4
- T.APP_READ: 3
- T.APP_REMOVE: 4
- T.DEL_REMOVE: 4
- T.DIS_DATA: 6
- T.DIS_TEST_ES: 2
- T.ERR_REMOVE: 3
- T.LOAD_APP: 4
- T.LOAD_MAN: 2
- T.LOAD_MOD: 2
- T.LOAD_OTHER: 2
- T.MOD: 2
- T.MOD_DATA: 4
- T.MOD_EXE: 4
- T.MOD_LOAD: 2
- T.MOD_SHARE: 2
- T.MOD_TSF: 3
- T.RESOURCES: 2
- T.RND: 1
- T.T_CMD: 4
- T.T_ES: 2
- T.T_TOOLS: 2
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 5
- Infineon Technologies: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- Physical tampering: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- Leak-Inherent: 3
- Physical Probing: 2
- physical probing: 1
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 2
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- access to the code or data of another loaded application. Note that cryptographic primitives are out of scope. 1.3.3 Smartcard Product Life Cycle The Smartcard product life-cycle is decomposed into seven: 1
- out of scope: 3
- the TOE, the product also contain native applications and native modules used by ICAO application (out of scope of the TOE) • Mel applications and modules ROMed: • MPCOS V3.7 • Pin Server Application (PSA) v1.0: 1
- to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 7.1.1: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20050713110304+09'00'
- /ModDate: D:20050713110304+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 342087
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 90
|
- /Author: ccrippam
- /CreationDate: D:20120712171249+02'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120712171249+02'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - ST_D184441-pub.doc
- pdf_file_size_bytes: 425525
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |