name |
RICOH IM 460F/370FJ-1.00 |
Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
active |
archived |
not_valid_after |
04.03.2029 |
01.09.2019 |
not_valid_before |
04.03.2024 |
04.04.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0806_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0806_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0806_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926b_pdf.pdf |
manufacturer |
Ricoh Company, Ltd. |
Infineon Technologies AG |
manufacturer_web |
https://www.ricoh.com/ |
https://www.infineon.com/ |
security_level |
EAL2 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
fb9502fe93441f90 |
02c1c81d0bf1270c |
heuristics/cert_id |
JISEC-CC-CRP-C0806-01-2024 |
BSI-DSZ-CC-0926-2014 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2017-15361 |
heuristics/direct_transitive_cves |
{} |
CVE-2017-15361 |
heuristics/indirect_transitive_cves |
{} |
CVE-2017-15361 |
heuristics/extracted_sars |
ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ALC_DEL.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1 |
AVA_VAN.5, ADV_ARC.1, ATE_COV.2, ADV_FSP.5, ASE_TSS.1, AGD_OPE.1, ATE_DPT.3, ALC_FLR.3, ADV_IMP.1, ADV_TDS.4, APE_SPD.1, ASE_REQ.2, ADV_SPM.1, APE_REQ.2, APE_INT.1, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, APE_CCL.1, ASE_OBJ.2, ASE_INT.1, APE_ECD.1, ADV_INT.2, ALC_TAT.2, ASE_SPD.1, ATE_FUN.1, APE_OBJ.2, ALC_CMS.5, ALC_CMC.4, ALC_LCD.1 |
heuristics/extracted_versions |
1.00 |
2.00.002, 1.02.013, 1.02.010 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2015/73, BSI-DSZ-CC-0926-V2-2017 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0907-2013 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2016/23, ANSSI-CC-2016/24, ANSSI-CC-2015/73, ANSSI-CC-2016/06, BSI-DSZ-CC-0926-V2-2017 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0907-2013 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0806
- certification_date: 01.03.2024
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0806
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo000000y1dg-att/c0806_eimg.pdf
- certification_date: 04.03.2024
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions to prevent unauthorized disclosure and alteration of user data and security function setting data. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Network Protection Function: Enables the TOE to protect network communications using encryption. Stored Data Protection Function: Enables the TOE to protect the stored data using encryption. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
- evaluation_facility: ECSEC Laboratory Inc., Evaluation Center
- expiration_date: 04.03.2029
- product: RICOH IM 460F/370F
- product_type: Multifunction Product
- protection_profile: none
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo000000y1dg-att/c0806_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo000000y1dg-att/c0806_est.pdf
- toe_version: J-1.00
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.03.2029
- supplier: RICOH COMPANY, LTD.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0806_it3864.html
- toe_japan_name: RICOH IM 460F / 370F J-1.00
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2016/24, ANSSI-CC-2015/73, ANSSI-CC-2016/23 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2016/24, ANSSI-CC-2015/73, ANSSI-CC-2016/23 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
c0806_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0806-01-2024: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20240502112700+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /Keywords:
- /ModDate: D:20240502155958+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20240502022625
- /Subject:
- /Title:
- pdf_file_size_bytes: 234173
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0806_erpt.pdf |
0926a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0926-2014
- cert_item: Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0806-01-2024: 1
|
- DE:
- BSI-DSZ-CC-0907-2013: 3
- BSI-DSZ-CC-0926-2014: 26
- BSI-DSZ-CC-S-0015-2012: 1
- BSI-DSZ-CC-S-0023-2013: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 5: 7
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.TRUSTED_ADMIN: 1
- A.USER: 1
- T:
- T.CONFIDENTIAL_DATA_ALT: 2
- T.CONFIDENTIAL_DATA_DIS: 2
- T.DOCUMENT_DATA_ALT: 2
- T.DOCUMENT_DATA_DIS: 2
- T.JOB_ALT: 2
- T.PROTECT_DATA_ALT: 2
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 4
- Infineon Technologies: 17
- Infineon Technologies AG: 21
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- TDES: 2
- Triple-DES: 2
- DES:
|
pdf_data/report_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 2
- RSA4096: 2
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IPsec:
- TLS:
- TLS:
- TLS: 6
- TLS 1.2: 3
- TLS 1.3: 3
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 6
- physical tampering: 1
- SCA:
- DPA: 6
- SPA: 5
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 20: 1
- AIS 25: 1
- AIS 26: 1
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- AIS31: 2
- AIS47: 2
- FIPS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- BSI-DSZ-CC-0926-2014, M7793 A12 and G12, Version 2, 2014-03-27, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7793 A12 and G12, Version 2: 1
- 2014-03-27, TÜV Informationstechnik GmbH (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
- optional Software Libraries RSA – EC – Toolbox, Version 1.3, 2013-11-11, Infineon Technologies AG (confidential document) [12] M7793 Security Guidelines User’s Manual, 2013-08-07, Infineon Technologies AG [13] SLx 70: 1
- optional Software Libraries RSA – EC – Toolbox, Version 2.0, 2014-02-12, Infineon Technologies AG (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
|
pdf_data/report_metadata |
- /Author:
- /Company:
- /CreationDate: D:20240513165701+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /Keywords:
- /Manager:
- /ModDate: D:20240513165755+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20240513074138
- /Subject:
- /Title:
- pdf_file_size_bytes: 549081
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20140424155624+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software, Infineon Technologies AG"
- /ModDate: D:20140424160045+02'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0926-2014
- pdf_file_size_bytes: 1231840
- pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
pdf_data/st_filename |
c0806_est.pdf |
0926b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 3
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 4
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 12
- FAU_SAR.2.1: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 16
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_FXS_EXP: 2
- FDP_FXS_EXP.1: 12
- FDP_FXS_EXP.1.1: 2
- FDP_IFC.1: 2
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UID.1: 30
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 22
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 30
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TST_EXP: 2
- FPT_TST_EXP.1: 12
- FPT_TST_EXP.1.1: 2
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 18
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 8
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 18
- FCS_CKM.1: 33
- FCS_CKM.2: 5
- FCS_CKM.4: 23
- FCS_COP: 34
- FCS_COP.1: 32
- FCS_RNG: 14
- FCS_RNG.1: 26
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 6
- FDP_ITC.1: 17
- FDP_ITC.2: 17
- FDP_ITT.1: 4
- FDP_SDI.1: 12
- FDP_SDI.1.1: 1
- FDP_SDI.2: 12
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_SOS.2: 3
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 2
- FMT:
- FMT_LIM: 3
- FMT_LIM.1: 5
- FMT_LIM.2: 5
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.2: 9
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 5
- FPT_ITT.1: 4
- FPT_PHP.3: 4
- FPT_TST: 7
- FPT_TST.1: 11
- FPT_TST.2: 31
- FPT_TST.2.1: 1
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 4
- A.NETWORK_PROTECTION: 4
- A.PHYSICAL_PROTECTION: 4
- A.TRUSTED_ADMIN: 4
- A.USER: 4
- O:
- O.AUDIT: 12
- O.AUTHORIZATION: 28
- O.CONFIDENTIAL_DATA_ALT: 12
- O.CONFIDENTIAL_DATA_DIS: 15
- O.DOCUMENT_DATA_ALT: 13
- O.DOCUMENT_DATA_DIS: 16
- O.EMMC_ENCRYPTION: 12
- O.FAX: 8
- O.JOB_ALT: 16
- O.PROTECT_DATA_ALT: 13
- O.VALIDATION: 10
- OE:
- OE.AUDIT: 4
- OE.AUDIT_MANAGE: 3
- OE.AUTHORIZED_USER: 16
- OE.NETWORK_PROTECTION: 3
- OE.PHYSICAL_PROTECTION: 4
- OE.TRAINED_ADMIN: 4
- OE.TRAINED_USER: 4
- OE.TRUSTED_ADMIN: 3
- T:
- T.CONFIDENTIAL_DATA_ALT: 4
- T.CONFIDENTIAL_DATA_DIS: 4
- T.DOCUMENT_DATA_ALT: 4
- T.DOCUMENT_DATA_DIS: 4
- T.JOB_ALT: 3
- T.PROTECT_DATA_ALT: 4
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 3
- Infineon Technologies: 12
- Infineon Technologies AG: 17
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 9
- TDEA: 1
- TDES: 2
- Triple-DES: 1
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 1
- RSA4096: 1
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- TLS:
- SSL:
- TLS:
- TLS: 9
- TLS1.2: 2
- TLS1.3: 2
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 6
- Malfunction: 12
- malfunction: 1
- SCA:
- DPA: 6
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 4
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- NIST:
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- ISO:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: 株式会社リコー
- /CreationDate: D:20240501141927+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20240501141927+09'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: RICOH IM 460F/370F Security Target
- pdf_file_size_bytes: 1280483
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 89
|
- /Author: Steffen Heinkel
- /CreationDate: D:20140218111402+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: M7793, EAL5+, attack potential high, AVA_VAN.5
- /ModDate: D:20140424162835+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target Lite M7793
- /Title: Public Security Target Lite
- pdf_file_size_bytes: 931877
- pdf_hyperlinks: http://www.infineon.com/, http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |