Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub PRO 1050 control software Image control program(Image control I1):11-0000 Controller control program(IP control P1):10-0000
JISEC-CC-CRP-C0019
Pasaporte electrónico versión 4.0
2018-70-INF-4292
name bizhub PRO 1050 control software Image control program(Image control I1):11-0000 Controller control program(IP control P1):10-0000 Pasaporte electrónico versión 4.0
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP ES
status archived active
not_valid_after 07.10.2013 28.04.2029
not_valid_before 21.02.2005 28.04.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-70_Certificado_CC.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0019_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-70_INF-4292.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0019_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-70_ST-lite.pdf
manufacturer Konica Minolta Business Technologies, Inc FNMT-RCM
manufacturer_web https://www.konicaminolta.com/ https://www.fnmt.es
security_level EAL3 EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5
dgst f7247eee0c64bc9d 9c5baa7237068051
heuristics/cert_id JISEC-CC-CRP-C0019 2018-70-INF-4292
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 11, 1050, 10, 0000 4.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0019
  • certification_date: 01.02.2005
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.1
    • cert_link: https://www.ipa.go.jp/en/security/c0019_eimg.pdf
    • description: PRODUCT DESCRIPTION This product (it is called "bizhub PRO 1050 control software (*1)", hereafter.) is the software installed with digital MFP (it is called "bizhub PRO 1050 series", hereafter.) manufactured by Konica Minolta Business Technologies, Inc. and for the purpose of reducing the danger to be leaked the document data stored by every user.Bizhub PRO 1050 control software prevents the document data from leaking in the function to use copier and printer etc. To protect the document data, this software has "User BOX" function and several control capabilities, additionally high-confidential hard disk drive (HDD) with lock system (*2) to store the document.Bizhub PRO 1050 control software is provided with bizhub PRO 1050 series. (*1) "bizhub PRO 1050 zentai seigyo software" for Japan and "bizhub PRO 1050 control software" are the same product with different calling name. (*2) HDD has the password so that the hard disk cannot be removed and read in another equipment.
    • evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
    • product: Japan: bizhub PRO 1050 zentai seigyo software Overseas: bizhub PRO 1050 control software
    • product_type: IT Product (data protection function in digital MFD)
    • report_link: https://www.ipa.go.jp/en/security/c0019_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0019_est2.pdf
    • toe_version: Image control program(Image control I1):11-0000 Controller control program(IP control P1):10-0000
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.10.2013
  • revalidations: [frozendict({'date': '2008-10', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0019_it4027_06.html'})]
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub PRO 1050 control software Image control program(Image control I1):11-0000 Controller control program(IP control P1):10-0000
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0019_it4027.html
  • toe_overseas_name: bizhub PRO 1050/1050e control software Image control program (Image control I1) : 70-0000 Controller control program (IP control P1) : 31-0000
  • category: Smart Cards and similiar devicesQSCD/SSCD
  • certification_date: 28.04.2024
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1971
    • certification_date: 29.07.2024
    • description: El TOE es una libreta con funcionalidades de documento de viaje. El TOE está compuesto de un chip previamente certificado (que proporciona la librería criptográfica y el firmware con el loader para la actualización del código), el sistema operativo y las librerías biométricas. Esta libreta implementa un sistema de ficheros que incluye las siguientes aplicaciones: eSign (aplicación de firma). eID (aplicación de identificación). ePass (aplicación de pasaporte). Mantenimiento DNIe 4.01 (29/07/2024): De acuerdo a los requisitos del CCRA (Common Criteria Recognition Arrangement) para continuidad de las garantías de seguridad y considerando el Informe de Análisis de Impacto proporcionado por la empresa Fábrica Nacional de Moneda y Timbre - Real Casa de Ia Moneda, la versión del TOE DNIe 4.01, considerando la naturaleza de los cambios, la conclusión es clasificar éstos como cambios menores y por tanto se lleva a cabo el mantenimiento del certificado como garantía de continuidad de la seguridad del producto. Los únicos cambios declarados por el solicitante con respecto a la certificación del producto Pasaporte electrónico versión 4 .0 son: Se han modificado los bytes históricos 3, 4, 5 y 6, que identifican el TOE en el ATR y ATS y el identificador WINDOWS SMARTCARD FRAMEWORK CARD IDENTIFIER pasando de denominarse ‘MRTD’ a ‘DNIe’. La versión del sistema operativo sigue siendo la misma 5.52. Se ha modificado la definición de compilación condicional a “DNIe_5_52”. Se han actualizado de los scripts de pre-personalización y personalización reflejando en la nomenclatura de los mismos la nueva versión a DNIe 4.01. Se han modificado las guías para introducir la nueva denominación del TOE. El punto de partida para la valoración del mantenimiento ha sido el Informe de Certificación INF-4292, la Declaración de Seguridad y el Informe Técnico de Evaluación EXT-8912 del producto Pasaporte electrónico versión 4 .0 con certificado referencia CCN-CC-5/2024, con número de expediente 2018-70, así como la Declaración de Seguridad modificada con motivo del mantenimiento realizado con número de expediente 2024-41 y su correspondiente Informe de Análisis de Impacto. El TOE DNIe 4.01 es una tarjeta inteligente que proporciona las funcionalidades de firma, identificación y documento de viaje. Esta tarjeta está compuesta por un chip previamente certificado (que proporciona la librería criptográfica y el firmware con el loader para la actualización del código), el sistema operativo y las librerías biométricas.
    • evaluation_facility: Applus Laboratories
    • level: EAL4 + ALC_DVS.2 + ATE_DPT.2 + AVA_VAN.5
    • manufacturer: FNMT-RCM
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1982
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2029
    • type: Product
  • manufacturer: FNMT-RCM
  • product: Pasaporte electrónico versión 4.0 / DNIe versión 4.01
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/1009-pasaporte-electronico-version-4-0-dnie-version-4-01
heuristics/protection_profiles {} b380aabf93b29692, d9553e7194783182, d918b28fd7bb5d79, a33327d40f253f46, 1f7ea2e05de5b88b
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf
pdf_data/cert_filename 2018-70_Certificado_CC.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0086: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 873831
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename c0019_erpt.pdf 2018-70_INF-4292.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0019-01: 1
    • Certification No. C0019: 1
  • ES:
    • 2018-70-INF-4292- v1: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0086: 2
    • BSI-CC-PP-0056-V2-2012: 2
    • BSI-CC-PP-0059-2009-MA-01: 3
    • BSI-CC-PP-0068-V2-2011-: 3
    • BSI-CC-PP-0071: 3
    • BSI-CC-PP-0072: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL4: 8
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 8
    • ALC_FLR: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 8
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 9
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 3
  • FCS:
    • FCS_CKM: 16
    • FCS_COP: 17
    • FCS_RND: 2
  • FDP:
    • FDP_ACC: 6
    • FDP_ACF: 7
    • FDP_DAU: 1
    • FDP_IFC: 1
    • FDP_IFF: 1
    • FDP_RIP: 4
    • FDP_SDI: 2
    • FDP_UCT: 2
    • FDP_UIT: 3
  • FIA:
    • FIA_AFL: 7
    • FIA_API: 3
    • FIA_UAU: 13
    • FIA_UID: 5
  • FMT:
    • FMT_LIM: 6
    • FMT_MOF: 1
    • FMT_MSA: 5
    • FMT_MTD: 27
    • FMT_SMF: 4
    • FMT_SMR: 3
    • FMT_SMR.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_FLS: 4
    • FPT_PHP: 4
    • FPT_TST: 4
  • FTP:
    • FTP_ITC: 7
pdf_data/report_keywords/cc_claims
  • T:
    • T.ACCESS: 1
    • T.HDDACCESS: 1
    • T.IMPADMIN: 1
pdf_data/report_keywords/vendor
  • Idemia:
    • Idemia: 2
  • Morpho:
    • Morpho: 2
  • Sagem:
    • Sagem: 4
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
  • Applus:
    • Applus Laboratories: 4
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 6
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
pdf_data/report_metadata
  • /CreationDate: D:20050812114303+09'00'
  • /ModDate: D:20050812114303+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 203262
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename c0019_est.pdf 2018-70_ST-lite.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP- 0071: 1
    • BSI-CC-PP-0055-2009: 1
    • BSI-CC-PP-0056-V2-2012: 2
    • BSI-CC-PP-0059-2009-: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0071: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072: 2
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0086: 2
    • BSI-CC-PP-0087-V2-MA-01: 2
    • BSI-CC-PP-0090-2016: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 9
  • EAL:
    • EAL4: 12
    • EAL4 augmented: 1
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ADV:
    • ADV_ARC.1: 5
    • ADV_FSP.4: 3
    • ADV_IMP.1: 3
    • ADV_TDS.3: 5
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 3
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_COMP: 2
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 8
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 13
    • FAU_SAR.1.1: 1
    • FAU_SAR.2: 11
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 13
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 10
  • FDP:
    • FDP_ACC.1: 26
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 28
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 1
    • FDP_MTD.1: 16
    • FDP_MTD.1.1: 1
    • FDP_SOS: 1
    • FDP_SOS.1: 20
    • FDP_SOS.1.1: 1
    • FDP_UAU.2: 1
    • FDP_UID.2: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS: 2
    • FIA_SOS.1: 32
    • FIA_SOS.1.1: 2
    • FIA_UAU: 2
    • FIA_UAU.1: 9
    • FIA_UAU.2: 20
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 10
    • FIA_UID.2: 23
  • FMT:
    • FMT_MOF.1: 43
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 13
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 56
    • FMT_MTD.1.1: 5
    • FMT_RVM.1: 1
    • FMT_SMF.1: 24
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 39
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 9
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 76
    • FCS_CKM.1: 38
    • FCS_CKM.2: 12
    • FCS_CKM.4: 36
    • FCS_COP: 37
    • FCS_COP.1: 31
    • FCS_RND: 9
    • FCS_RND.1: 8
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC: 28
    • FDP_ACC.1: 18
    • FDP_ACF: 39
    • FDP_ACF.1: 52
    • FDP_DAU: 2
    • FDP_DAU.1: 1
    • FDP_DAU.2: 2
    • FDP_IFC: 2
    • FDP_IFC.1: 10
    • FDP_IFF: 3
    • FDP_IFF.1: 11
    • FDP_ITC.1: 23
    • FDP_ITC.2: 24
    • FDP_MTD: 1
    • FDP_RIP: 19
    • FDP_RIP.1: 4
    • FDP_SDI: 2
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 3
    • FDP_UCT.1: 1
    • FDP_UIT: 4
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 20
    • FIA_AFL.1: 15
    • FIA_API: 15
    • FIA_API.1: 9
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 53
    • FIA_UAU.1: 18
    • FIA_UAU.4: 3
    • FIA_UAU.5: 11
    • FIA_UAU.6: 3
    • FIA_UID: 24
    • FIA_UID.1: 21
  • FMT:
    • FMT_LIM: 25
    • FMT_LIM.1: 14
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 13
    • FMT_LIM.2.1: 1
    • FMT_MOF: 1
    • FMT_MOF.1: 1
    • FMT_MSA: 21
    • FMT_MSA.1: 4
    • FMT_MSA.2: 1
    • FMT_MSA.3: 8
    • FMT_MSA.4: 1
    • FMT_MTD: 53
    • FMT_MTD.1: 26
    • FMT_MTD.3: 3
    • FMT_SMF: 29
    • FMT_SMF.1: 29
    • FMT_SMR: 40
    • FMT_SMR.1: 47
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_EMS: 14
    • FPT_EMS.1: 20
    • FPT_EMS.1.1: 2
    • FPT_EMS.1.2: 2
    • FPT_FLS: 7
    • FPT_FLS.1: 5
    • FPT_ITC: 2
    • FPT_ITC.1: 1
    • FPT_PHP: 7
    • FPT_PHP.1: 2
    • FPT_PHP.3: 3
    • FPT_TST: 11
    • FPT_TST.1: 13
  • FTP:
    • FTP_ITC: 19
    • FTP_ITC.1: 32
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • O:
    • O.AUDIT: 9
    • O.CE: 5
    • O.DATAACCESS: 8
    • O.IA: 11
    • O.MANAGE: 7
  • OE:
    • OE.ADMIN: 4
    • OE.CE: 4
    • OE.HDD: 6
    • OE.NET: 4
    • OE.PLACE: 4
    • OE.USR: 4
  • T:
    • T.ACCESS: 2
    • T.HDDACCESS: 2
    • T.IMPADMIN: 2
  • A:
    • A.CGA: 1
    • A.SCA: 1
  • OE:
    • OE.HID_VAD: 3
    • OE.HI_VAD: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • NXP:
    • NXP Semiconductors: 1
pdf_data/st_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 27
      • AES-192: 1
  • DES:
    • 3DES:
      • 3DES: 4
      • Triple-DES: 3
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 12
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 1
      • SHA-256: 8
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 12
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 162
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 7
    • brainpoolP384r1: 7
    • brainpoolP512r1: 7
  • NIST:
    • NIST P-256: 6
    • NIST P-384: 6
    • NIST P-521: 5
    • P-256: 8
    • P-384: 8
    • P-521: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • Physical Tampering: 2
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 4
    • physical tampering: 11
  • SCA:
    • DPA: 4
    • SPA: 3
    • physical probing: 3
    • timing attacks: 2
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 4
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 1
    • EF.ChipSecurity: 1
    • EF.DG1: 7
    • EF.DG14: 4
    • EF.DG16: 4
    • EF.DG2: 1
    • EF.DG22: 2
    • EF.DG3: 4
    • EF.DG4: 4
    • EF.SOD: 6
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 2
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • ISO:
    • ISO/IEC 15408: 6
  • FIPS:
    • FIPS 140-2: 2
    • FIPS 186-4: 2
  • ICAO:
    • ICAO: 4
    • ICAO-SAC: 3
  • ISO:
    • ISO/IEC 11770-3: 1
    • ISO/IEC 15946-1: 1
    • ISO/IEC 7816: 2
  • NIST:
    • NIST SP 800-186: 5
    • NIST SP 800-90A: 1
  • PKCS:
    • PKCS#1: 3
    • PKCS#3: 1
  • RFC:
    • RFC 2631: 1
    • RFC 3447: 1
    • RFC 3447111: 1
    • RFC 5639: 1
    • RFC5639: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the life-cycle phase operational use by a secure update mechanism. The updated TOE software is out of scope of this ST as it will be a different version of the TOE. Phase 5: End of life Step 8 The TOE: 1
pdf_data/st_metadata
  • /CreationDate: D:20050713110304+09'00'
  • /ModDate: D:20050713110304+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 342087
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 2130329
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 203
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different