name |
bizhub C353 PKI Card System Control Software Version:A02E0Y0-0100-GM0-U4 |
Secure Smart Grid Hub (SGH-S), V1.00 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
JP |
DE |
status |
archived |
active |
not_valid_after |
28.08.2014 |
10.09.2031 |
not_valid_before |
17.08.2009 |
11.09.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1000c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0231_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1000a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0231_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1000b_pdf.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
EFR GmbH |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.efr.de |
security_level |
EAL3 |
EAL4+, ALC_FLR.2, AVA_VAN.5 |
dgst |
fd449aad52796b9c |
8624af6c59deae47 |
heuristics/cert_id |
JISEC-CC-CRP-C0231 |
BSI-DSZ-CC-1000-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VLA.2, ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ATE_COV.2, ASE_SPD.1, ASE_INT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, ASE_OBJ.2, AGD_OPE.1, ASE_CCL.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1 |
heuristics/extracted_versions |
0100 |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1000-V2-2025 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1000-V2-2025 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0231
- certification_date: 01.08.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0231_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFD” or through the network and supports the protection from exposure of the highly confidential documents exchanged between MFP and client PC. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD or the encryption function by the encryption board. Besides, TOE has a deletion method compliant with various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator function - Service mode function - Encryption Print Function - S/MIME Encryption Function - Digital Signature Function - All area overwrite deletion function - Encryption key generation function - HDD Verification Function - Authentication Failure Frequency Reset function - Encryption Board Support Function - HDD lock Operation Support Function - PKI Support Function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: bizhub C353 PKI Card System Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0231_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0231_est.pdf
- toe_version: A02E0Y0-0100-GM0-U4
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.08.2014
- revalidations: [frozendict({'date': '2010-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0231_it9242_01.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C353 PKI Card System Control Software A02E0Y0-0100-GM0-U4
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0231_it9242.html
- toe_overseas_name: bizhub C353 PKI Card System Control Software A02E0Y0-0100-GM0-U6
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1003-2018 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1003-2018, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2017/54 |
heuristics/protection_profiles |
{} |
6346b04de6859db3 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073b_pdf.pdf |
pdf_data/cert_filename |
|
1000c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, EFR"
- /Subject: Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, EFR
- /Title: Certification Report BSI-DSZ-CC-1000-2023
- pdf_file_size_bytes: 339208
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0231_erpt.pdf |
1000a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5 and ALC_FLR.2 valid until: 10 September 2031
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1000-2023
- cert_item: Secure Smart Grid Hub (SGH-S) V1.00
- cert_lab: BSI
- developer: EFR GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0231-01: 1
- Certification No. C0231: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0073: 1
- BSI-CC-PP-0073-2014: 3
- BSI-CC-PP-0077-V2-2015: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMS: 1
- ALC_FLR: 3
- ALC_FLR.2: 4
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.IC-CARD: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.BRING-OUT-STORAGE: 3
- T.DISCARD-MFP: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
- SHA256: 5
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- malfunction: 1
- physical tampering: 1
- SCA:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102-1: 1
- BSI TR-03111: 1
- BSI TR-03116: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 46: 2
- AIS 48: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 3
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18033-: 1
- ISO/IEC 18045: 4
- RFC:
- RFC 2104: 2
- RFC 3394: 2
- RFC 4493: 3
- RFC 5084: 3
- RFC 5246: 1
- RFC 5289: 4
- RFC 5652: 3
- RFC-2104: 1
- RFC-3394: 1
- RFC4493: 1
- RFC5246: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document exchanged between MFP and client PC. Moreover, TOE can prevent the unauthorized access to the image: 1
|
- ConfidentialDocument:
- ALC_CMS “Konfigurations-Management-Scope Kon- figurationsliste”, v1.13, 30.08.2023, EFR GmbH (confidential document) [11] Servicetechniker Handbuch für das Smart-Meter-Gateway (SMGW) Secure Smart Grid Hub EFR SGH-S: 1
- ID BSI- DSZ-CC-1000, Version 1.3.2, 06.09.2023, SRC Security Research & Consulting GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- OutOfScope:
- 2. Multiple Communication Modules for LTE exist, however these are non-TOE components and as such out of scope for this certification. 9. Results of the Evaluation 9.1. CC specific results The Evaluation: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20091023095042+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20091023095552+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20091023004917
- /Title:
- pdf_file_size_bytes: 518089
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, EFR"
- /Subject: Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, EFR
- /Title: Certification Report BSI-DSZ-CC-1000-2023
- pdf_file_size_bytes: 492094
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
c0231_est.pdf |
1000b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1003-: 1
- BSI-DSZ-CC-1003-2018: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0073-: 1
- BSI-CC-PP-0073-2014: 5
- BSI-CC-PP-0077-: 1
- BSI-CC-PP-0077-2015: 2
- BSI-CC-PP-0077-V2-2015: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 4
- EAL 4 augmented: 1
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ALC_LCD.1: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_SPD: 3
- ASE_SPD.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 1
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 24
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_EID: 2
- FIA_EID.1: 10
- FIA_EID.1.1: 2
- FIA_EID.1.2: 2
- FIA_SOS.1: 19
- FIA_SOS.1.1: 3
- FIA_SSL.3: 1
- FIA_UAU.1: 9
- FIA_UAU.2: 19
- FIA_UAU.2.1: 2
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UAU.7: 11
- FIA_UAU.7.1: 1
- FIA_UID.1: 11
- FIA_UID.2: 18
- FIA_UID.2.1: 3
- FMT:
- FMT_MOF.1: 23
- FMT_MOF.1.1: 4
- FMT_MTD.1: 37
- FMT_MTD.1.1: 4
- FMT_SMF.1: 49
- FMT_SMF.1.1: 1
- FMT_SMR.1: 64
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
|
- FAU:
- FAU_ARP: 9
- FAU_GEN: 30
- FAU_GEN.1: 22
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAA: 9
- FAU_SAA.1: 5
- FAU_SAR: 21
- FAU_SAR.1: 9
- FAU_STG: 23
- FAU_STG.1: 8
- FAU_STG.2: 10
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 2
- FAU_STG.3: 3
- FAU_STG.4: 3
- FAU_STG.4.1: 1
- FCO:
- FCO_NRO: 3
- FCO_NRO.1: 1
- FCO_NRO.2: 8
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 48
- FCS_CKM.1: 6
- FCS_CKM.2: 5
- FCS_CKM.4: 28
- FCS_CKM.4.1: 2
- FCS_COP: 49
- FCS_COP.1: 10
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 9
- FDP_ACC.2: 8
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 24
- FDP_IFC.1: 12
- FDP_IFC.2: 4
- FDP_IFF: 20
- FDP_IFF.1: 22
- FDP_IFF.1.3: 1
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_RIP: 2
- FDP_RIP.1: 1
- FDP_RIP.2: 7
- FDP_RIP.2.1: 1
- FDP_SDI: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 2
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU: 5
- FIA_UAU.1: 2
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UID: 3
- FIA_UID.1: 8
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FIA_USB: 3
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 44
- FMT_MSA.1: 10
- FMT_MSA.3: 11
- FMT_SMF: 2
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 25
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_CON: 6
- FPR_CON.1: 9
- FPR_CON.1.1: 2
- FPR_CON.1.2: 4
- FPR_PSE: 2
- FPR_PSE.1: 7
- FPR_PSE.1.1: 1
- FPR_PSE.1.2: 1
- FPR_PSE.1.3: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_RPL: 3
- FPT_RPL.1: 6
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 3
- FPT_STM.1: 18
- FPT_STM.1.1: 1
- FPT_TST: 3
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.IC-CARD: 3
- A.NETWORK: 3
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 2
- O:
- O.CHECK-HDD: 4
- O.CRYPTO-CAPABILITY: 5
- O.CRYPTO-KEY: 5
- O.DECRYPT-PRINT: 5
- O.LOCK-HDD-CAPABILITY: 4
- O.MAIL-CRYPTO: 5
- O.MAIL-SIGN: 4
- O.OVERWRITE-ALL: 4
- O.PKI-CAPABILITY: 10
- OE:
- OE.ADMIN: 3
- OE.CARD-USER: 3
- OE.DRIVER: 3
- OE.IC-CARD: 6
- OE.NETWORK: 3
- OE.SECRET: 3
- OE.SERVICE: 3
- OE.SETTING-SECURITY: 3
- OE.SIGN: 3
- T:
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- JH:
- SHA:
- SHA2:
- SHA-2: 3
- SHA-256: 2
- SHA-384: 2
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 3
- physical tampering: 3
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03109-1: 2
- BSI TR-03111: 1
- BSI TR-03116-3: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 5
- FIPS 186-2: 6
- FIPS PUB 197: 3
|
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- RFC:
- RFC 2104: 1
- RFC 3394: 1
- RFC 4493: 1
- RFC 5084: 1
- RFC 5246: 1
- RFC 5289: 1
- RFC 5652: 1
- RFC-2104: 2
- RFC-3394: 2
- RFC-4493: 3
- RFC-5084: 2
- RFC-5246: 3
- RFC-5289: 3
- RFC-5652: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document exchanged between MFP and client PC. Also, it provides the protection function for scan image data: 1
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20091022141845+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20091022143205+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - 【C0231】英文公開用_ASE_Thames1_PKI-107-090805.doc
- /_AdHocReviewCycleID: -693642671
- /_PreviousAdHocReviewCycleID: -688275005
- pdf_file_size_bytes: 465777
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 59
|
- /Author: EFR GmbH
- /Subject: Common Criteria Evaluation
- /Title: Security Target EFR SGH-S
- pdf_file_size_bytes: 1849024
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 94
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |