| name |
Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit User Interface: 4030-20G0-05-00 Network Module: 4030-A0G0-03-00 |
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Version du patch : 1.4) |
| category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
FR |
| status |
archived |
archived |
| not_valid_after |
28.12.2010 |
22.12.2019 |
| not_valid_before |
03.08.2004 |
22.12.2014 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0011_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_86.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0011_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_86_LITE.pdf |
| manufacturer |
Konica Minolta Business Technologies, Inc |
Gemalto / NXP Semiconductors |
| manufacturer_web |
https://www.konicaminolta.com/ |
https://www.gemalto.com/ |
| security_level |
EAL3 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
f7d41e1f69ac3e28 |
c85d31ec52d309ee |
| heuristics/cert_id |
JISEC-CC-CRP-C0011-01 |
ANSSI-CC-2014/86 |
| heuristics/cert_lab |
[] |
SERMA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1 |
ATE_FUN.1, ATE_DPT.3, AVA_VAN.5, ALC_CMC.4, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ALC_FLR.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ATE_COV.2, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_ARC.1, ALC_TAT.2 |
| heuristics/extracted_versions |
00, 4030, 05, 03 |
3.1, 1.4 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2015/30, ANSSI-CC-2015/02, ANSSI-CC-2015/01, ANSSI-CC-2015/15, ANSSI-CC-2015/04, ANSSI-CC-2015/03, ANSSI-CC-2015/08 |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2014/06, BSI-DSZ-CC-0837-2013 |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2015/30, ANSSI-CC-2016/04, ANSSI-CC-2016/03, ANSSI-CC-2015/02, ANSSI-CC-2015/01, ANSSI-CC-2015/40, ANSSI-CC-2015/38, ANSSI-CC-2015/15, ANSSI-CC-2015/37, ANSSI-CC-2015/04, ANSSI-CC-2015/39, ANSSI-CC-2015/41, ANSSI-CC-2015/03, ANSSI-CC-2015/08 |
| heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2014/06, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0011
- certification_date: 01.08.2004
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0011_eimg.pdf
- description: PRODUCT DESCRIPTION Multi Function Peripheral (MFP) is IT machine for office work which is composed by selecting and combining each function such as copy, print, scan, FAX. This TOE* consists of "User Interface" and "Network Module" which are the software components carrying out the operation control processing, from the operation panel and a client PC in the control software of Di3510 series/Di3510f series MFP. This security function protects the high confidential document data that is spooled in MFP from exposing by using the specific function. That specific function is the Locked Print function which accepts printing only when the set-up password and input password from the panel are matched and the User Box function which controls the access to the user box. * Japan: Di3510 shirizu/ Di3510f shirizu Multi Function Peripheral Security Kit, Aboard:Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit are the same products with different name.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: Japan :Di3510 shirizu / Di3510f shirizu Multi Function Peripheral Security Kit Abroad:Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit
- product_type: IT Product (data protection function in digital MFD)
- protection_profile: Not available
- report_link: https://www.ipa.go.jp/en/security/c0011_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0011_est.pdf
- toe_version: User Interface : 4030-20G0-05-00 Network Module : 4030-A0G0-03-00
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.01.2011
- supplier: Konica Minolta business technologies,inc.
- toe_japan_name: Di3510 shirizu / Di3510f shirizu Multi Function Peripheral Security Kit (User Interface : 4030-20G0-05-00 Network Module : 4030-A0G0-03-00)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0011_it4021.html
- toe_overseas_name: Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit (User Interface : 4030-20G0-05-00 Network Module : 4030-A0G0-03-00)
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
9399bd94f9925b16 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0011_erpt.pdf |
ANSSI-CC-2014_86.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/86
- cert_item: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
- cert_item_version: Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.4
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0011-01: 1
- Certification No. C011: 1
|
- DE:
- FR:
- ANSSI-CC-2014/06: 1
- ANSSI-CC-2014/86: 22
- ANSSI-CC-PP-2010/03-M01: 2
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 2
- BSI:
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 2
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS-CHECK: 1
- A.ADMIN: 1
- A.AUTH: 1
- A.HDD: 1
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.SERVICE: 1
- A.SESSION: 1
- T:
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-USER-BOX: 1
|
|
| pdf_data/report_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 3
- NXP Semiconductors: 2
|
| pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20050823120725+09'00'
- /ModDate: D:20050823120725+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 197148
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /Author: Beatrice Duquesnoy
- /CreationDate: D:20150105175233+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.014
- /ModDate: D:20150105175233+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
- /Title: ANSSI-CC-2014/86
- pdf_file_size_bytes: 725914
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
| pdf_data/st_filename |
c0011_est.pdf |
ANSSI_cible2014_86_LITE.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0837-2013-MA-01: 2
- NL:
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
- BSI-PP-0005: 1
- BSI-PP-0006: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD-KG: 2
- PP-SSCD-KI: 2
- PP-SSCD-T2: 2
- PP-SSCD-T3: 2
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6+: 1
- EAL5: 6
- EAL5 augmented: 2
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 10
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 6
- ADV_IMP: 1
- ADV_IMP.1: 9
- ADV_INT.2: 3
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 9
- AGD_PRE: 1
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.5: 2
- ALC_DEL.1: 3
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 5
- ALC_TAT.1: 2
- ALC_TAT.2: 5
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 2
- ATE_DPT.3: 3
- ATE_FUN.1: 9
- ATE_IND.2: 4
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 26
- FDP_ACC.1.1: 2
- FDP_ACF.1: 22
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 2
- FIA:
- FIA_AFL.1: 47
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_SOS.1: 39
- FIA_SOS.1.1: 4
- FIA_UAU.1: 16
- FIA_UAU.2: 68
- FIA_UAU.2.1: 4
- FIA_UAU.6: 13
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 28
- FIA_UID.2: 57
- FIA_UID.2.1: 4
- FMT:
- FMT_MOF.1: 15
- FMT_MOF.1.1: 1
- FMT_MSA.1: 16
- FMT_MSA.1.1: 1
- FMT_MSA.3: 23
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 52
- FMT_MTD.1.1: 5
- FMT_RVM.1.1: 1
- FMT_SMF.1: 39
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 73
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 4
- FMT_SMT.1: 1
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 23
- FPT_SEP: 1
- FPT_SEP.1: 28
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
|
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 15
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 40
- FDP_ACC.1: 13
- FDP_ACC.2: 6
- FDP_ACF: 33
- FDP_ACF.1: 16
- FDP_IFC: 24
- FDP_IFC.1: 12
- FDP_IFC.2: 2
- FDP_IFF: 17
- FDP_IFF.1: 12
- FDP_ITC: 12
- FDP_ITC.1: 4
- FDP_ITC.2: 9
- FDP_RIP: 85
- FDP_RIP.1: 10
- FDP_ROL: 14
- FDP_ROL.1: 2
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_SOS.2: 1
- FIA_UAI.1: 1
- FIA_UAU: 7
- FIA_UAU.1: 1
- FIA_UID: 14
- FIA_UID.1: 10
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 91
- FMT_MSA.1: 11
- FMT_MSA.2: 1
- FMT_MSA.3: 15
- FMT_MTD: 18
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 33
- FMT_SMF.1: 9
- FMT_SMR: 47
- FMT_SMR.1: 22
- FPR:
- FPR_UNO: 7
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 46
- FPT_FLS.1: 5
- FPT_ITT: 7
- FPT_ITT.1: 1
- FPT_PHP: 7
- FPT_PHP.3: 2
- FPT_RCV: 16
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 7
- FPT_TST.1: 3
- FTP:
- FTP_ITC: 9
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS-CHECK: 3
- A.ADMIN: 2
- A.AUTH: 3
- A.HDD: 2
- A.NETWORK: 3
- A.PHYSICAL: 2
- A.SERVICE: 3
- A.SESSION: 2
- O:
- O.ACCESS-ADMIN: 8
- O.ACCESS-SERVICE: 7
- O.ACCESS-USE-BOX: 1
- O.ACCESS-USER-BOX: 3
- O.ACESS-ADMIN: 2
- OE:
- OE.ACCESS-: 1
- OE.ACCESS-SECURE-PRINT: 5
- OE.SECURE-PRINT-QUALITY: 5
- T:
- T.ACCESS-SECURE-PRINT: 3
- T.ACCESS-USER-BOX: 2
|
- A:
- A.APPLET: 5
- A.DELETION: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 15
- O.APPLET: 28
- O.CARD-MANAGEMENT: 3
- O.CARD_MANAGEMENT: 18
- O.CIPHER: 10
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 8
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CO: 3
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INT: 3
- O.GLOBAL_ARRAYS_INTEG: 5
- O.HW_AES: 2
- O.INSTALL: 11
- O.JAVAOBJECT: 56
- O.KEY-: 1
- O.KEY-MNGT: 5
- O.KEY_MNGT: 4
- O.LOAD: 6
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 13
- O.SCP: 36
- O.SID: 13
- O.TRANSACTION: 6
- OE:
- OE.APPLET: 4
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 10
- OE.CODE_EVIDENCE: 1
- OE.SCP: 6
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP: 1
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 9
- Triple-DES: 2
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 4
- SHA-384: 4
- SHA-512: 3
- SHA224: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- fault induction: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- physical probing: 2
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-032: 2
- CCIMB-99-033: 2
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- ICAO:
- NIST:
- PKCS:
- PKCS#1: 8
- PKCS#3: 1
- PKCS#5: 5
- SCP:
- SCP01: 3
- SCP02: 3
- SCP03: 3
|
| pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- JC2.2.2: 1
- Java Card 2.2.2: 7
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- the MFP is considered temporary data that is stored to maintain security during the printing of a confidential document. In other words, this data is not intended to be stored in the MFP for a long period of time, and: 1
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
| pdf_data/st_metadata |
- /CreationDate: D:20050823121328+09'00'
- /ModDate: D:20050823121328+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 409164
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20141107143457+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC
- /ModDate: D:20141107143457+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 1611052
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |