name |
bizhub C652 / bizhub C552 / bizhub C452 PKI Card System Control Software Version: A0P00Y0-0100-GM0-31 |
STARCOS 3.7 COS GKV C2 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
active |
not_valid_after |
01.10.2015 |
22.08.2029 |
not_valid_before |
28.09.2010 |
22.08.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1243c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0273_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1243a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0273_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1243b_pdf.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Giesecke+Devrient ePayments GmbH |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.gi-de.com/de/ |
security_level |
EAL3 |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
fda8a0ef11918a96 |
7e00946c0c70e2a7 |
heuristics/cert_id |
JISEC-CC-CRP-C0273 |
BSI-DSZ-CC-1243-2024 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_DPT.1, ATE_COV.2, AGD_OPE.1, ASE_INT.1, ALC_DVS.1, AVA_VLA.2, ADV_ARC.1, ASE_ECD.1, ALC_LCD.1, ASE_REQ.2, ASE_OBJ.2, ATE_IND.2, ATE_FUN.1, ALC_CMS.3, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ADV_TDS.2, ADV_FSP.3, ASE_CCL.1, ALC_CMC.3 |
ATE_COV.2, AGD_OPE.1, ALC_DEL.1, ALC_FLR.1, ASE_INT.1, ADV_TDS.3, ADV_ARC.1, ALC_CMS.4, AVA_VAN.5, ASE_ECD.1, ALC_LCD.1, ASE_REQ.2, ADV_IMP.1, ADV_FSP.4, ALC_DVS.2, ASE_OBJ.2, ATE_IND.2, ATE_FUN.1, ALC_CMC.4, ATE_DPT.2, ALC_TAT.1, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1 |
heuristics/extracted_versions |
31, 0100 |
3.7 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V6-2023, BSI-DSZ-CC-0976-V3-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0976-V2-2018, BSI-DSZ-CC-1110-V6-2023, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0916-2015, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0976-2015, BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-0945-V2-2018 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0273
- certification_date: 01.09.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0273_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Encryption Print Function The function that receives the encrypted print data and can print the print data only with a right IC card. - S/MIME Encryption Function The function to encrypt an image file when transmitting it by e-mail. - Digital Signature Function The function to add the digital signature by using the function of IC card when transmitting an image data by e-mail. - HDD Encryption Function The function to encrypt the data written in HDD using ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Fax Unit Control Function The function to prevent the danger using Fax function as a steppingstone to access internal network.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: bizhub C652 / bizhub C552 / bizhub C452 PKI Card System Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0273_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0273_est.pdf
- toe_version: A0P00Y0-0100-GM0-31
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.10.2015
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C652 / bizhub C552 / bizhub C452 PKI Card System Control Software A0P00Y0-0100-GM0-31
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0273_it0284.html
- toe_overseas_name: bizhub C652 / bizhub C552 / bizhub C452 PKI Card System Control Software A0P00Y0-0100-GM0-31
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V6-2023 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V6-2023 |
heuristics/protection_profiles |
{} |
55ed365edb2c317f |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082b_pdf.pdf |
pdf_data/cert_filename |
|
1243c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, PP-0082-V4, G+D, STARCOS 3.7, eHealth"
- /Subject: Common Criteria, Certification, Zertifizierung, PP-0082-V4, G+D, STARCOS 3.7, eHealth
- /Title: Certification Report BSI-DSZ-CC-1243-2024
- pdf_file_size_bytes: 233610
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0273_erpt.pdf |
1243a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 valid until: 21 August 2029
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1243-2024
- cert_item: STARCOS 3.7 COS GKV C2
- cert_lab: BSI
- developer: Giesecke+Devrient ePayments GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 2.1, 10 July 2019, BSI-CC-PP-0082-V4- 2019
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0273-01: 1
- Certification No. C0273: 1
|
- DE:
- BSI-DSZ-CC-0976-V3-: 2
- BSI-DSZ-CC-0976-V3-2019: 3
- BSI-DSZ-CC-0976-V3-2019-MA-01: 2
- BSI-DSZ-CC-1110-V6-2023: 7
- BSI-DSZ-CC-1243: 4
- BSI-DSZ-CC-1243-2024: 21
- BSI-DSZ-CC-S-0260-2023: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0082-V4-: 1
- BSI-CC-PP-0082-V4-2019: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 2
- EAL 6: 2
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 4
- FCS_COP: 25
- FCS_RNG: 3
- FCS_RNG.1: 1
- FIA:
- FPT:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.IC-CARD: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 2
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 12
- Infineon Technologies AG: 6
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-03116-1: 1
- BSI TR-03143: 5
- BSI TR-03144: 11
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 5
- AIS 25: 4
- AIS 26: 4
- AIS 31: 4
- AIS 32: 1
- AIS 34: 4
- AIS 35: 2
- AIS 36: 5
- AIS 37: 3
- AIS 38: 1
- AIS 46: 3
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18031:2005: 1
- ISO/IEC 18045: 4
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document exchanged between MFP and client PC. Also, it provides the protection function for scan image data: 1
|
- ConfidentialDocument:
- H13, Revision 4.4, 30 November 2023, Infineon Technologies AG, BSI-DSZ-CC- 1110-V6-2023 (confidential document) Security Target Lite of the underlying hardware platform, Common Criteria Public Security Target: 1
- July 2024, Giesecke+Devrient ePayments GmbH (confidential document) [11] Guidance Documentation STARCOS 3.7 COS GKV C2 – Main Document, Version 1.5, 5 June 2024: 1
- Target STARCOS 3.7 COS GKV C2, Version 1.6, 10 June 2024, Giesecke+Devrient ePayments GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1243, Security Target Lite STARCOS 3.7 COS GKV C2, Version 1.6: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- for STARCOS 3.7 COS GKV C2, Version 1.1, 1 August 2024, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1243, Configuration List STARCOS 3.7 COS GKV C2, Version 1.2: 1
- procedure BSI-DSZ-CC-1110-V6-2023, Version 3, 01 December 2023, TÜV Informationstechnik GmbH (confidential document) [21] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20110111152921+09'00'
- /ModDate: D:20110111152921+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 244642
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, PP-0082-V4, G+D, STARCOS 3.7, eHealth"
- /Subject: Common Criteria, Certification, Zertifizierung, PP-0082-V4, G+D, STARCOS 3.7, eHealth
- /Title: Certification Report BSI-DSZ-CC-1243-2024
- pdf_file_size_bytes: 428132
- pdf_hyperlinks: https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/AIS
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
c0273_est.pdf |
1243b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-V6-2023: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0082-V4: 1
- BSI-CC-PP- 0084-2014: 8
- BSI-CC-PP- 16: 1
- BSI-CC-PP-0035-2007: 1
- BSI-CC-PP-0082-: 1
- BSI-CC-PP-0082-V4: 24
- BSI-CC-PP-0084-: 4
- BSI-CC-PP-0084-2007: 1
- BSI-CC-PP-0084-2014: 54
- BSI-PP-0082-V4: 147
- BSI-PP-0084-: 2
- BSI-PP-0084-2014: 8
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 6: 2
- EAL4: 14
- EAL4 augmented: 4
- EAL6: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 9
- ADV_FSP: 2
- ADV_FSP.4: 6
- ADV_IMP: 2
- ADV_IMP.1: 6
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 6
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 2
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_DEL: 2
- ALC_DEL.1: 1
- ALC_DVS: 2
- ALC_DVS.2: 12
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 11
- ATE_FUN.1: 6
- ATE_IND.2: 5
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 1
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 23
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_EID.1: 1
- FIA_SOS.1: 17
- FIA_SOS.1.1: 3
- FIA_SSL.3: 1
- FIA_UAU.1: 9
- FIA_UAU.2: 19
- FIA_UAU.2.1: 2
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID.1: 11
- FIA_UID.2: 18
- FIA_UID.2.1: 3
- FMT:
- FMT_MOF.1: 22
- FMT_MOF.1.1: 4
- FMT_MSA: 1
- FMT_MSA.3: 2
- FMT_MTD.1: 33
- FMT_MTD.1.1: 4
- FMT_SMF.1: 46
- FMT_SMF.1.1: 1
- FMT_SMR.1: 60
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
|
- FAU:
- FCS:
- FCS_CKM: 67
- FCS_CKM.1: 31
- FCS_CKM.2: 8
- FCS_CKM.4: 49
- FCS_CKM.4.1: 1
- FCS_COP: 144
- FCS_COP.1: 21
- FCS_COP.1.1: 1
- FCS_RNG: 32
- FCS_RNG.1: 20
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 114
- FDP_ACC.1: 41
- FDP_ACF: 93
- FDP_ACF.1: 35
- FDP_IFC: 7
- FDP_IFC.1: 17
- FDP_ITC.1: 27
- FDP_ITC.2: 27
- FDP_ITT: 7
- FDP_ITT.1: 4
- FDP_RIP: 9
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FDP_SDC: 8
- FDP_SDC.1: 4
- FDP_SDI: 7
- FDP_SDI.1: 1
- FDP_SDI.2: 11
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 7
- FDP_UCT.1: 1
- FDP_UIT: 8
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 22
- FIA_AFL.1: 4
- FIA_API: 1
- FIA_API.1: 14
- FIA_API.1.1: 1
- FIA_ATD: 10
- FIA_ATD.1: 14
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU: 40
- FIA_UAU.1: 20
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 12
- FIA_UAU.4.1: 1
- FIA_UAU.5: 17
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UID: 14
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 13
- FIA_USB.1: 23
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 15
- FMT_LIM.1: 4
- FMT_LIM.2: 2
- FMT_MSA: 60
- FMT_MSA.1: 6
- FMT_MSA.3: 33
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 38
- FMT_MTD.1: 4
- FMT_SMF.1: 51
- FMT_SMF.1.1: 1
- FMT_SMR: 9
- FMT_SMR.1: 38
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SRM: 1
- FPT:
- FPT_EMS: 10
- FPT_EMS.1: 15
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS: 7
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_ITE: 11
- FPT_ITE.1: 11
- FPT_ITE.1.1: 1
- FPT_ITE.1.2: 1
- FPT_ITE.2: 13
- FPT_ITE.2.1: 5
- FPT_ITE.2.2: 1
- FPT_ITT: 7
- FPT_ITT.1: 4
- FPT_PHP: 7
- FPT_PHP.3: 5
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 22
- FTP_ITC.1: 12
- FTP_ITE: 1
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.IC-CARD: 3
- A.NETWORK: 3
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 2
- O:
- O.CRYPTO-CAPABILITY: 5
- O.CRYPTO-KEY: 5
- O.DECRYPT-PRINT: 5
- O.FAX-CONTROL: 5
- O.MAIL-CRYPTO: 5
- O.MAIL-SIGN: 4
- O.OVERWRITE-ALL: 4
- O.PKI-CAPABILITY: 9
- OE:
- OE.ADMIN: 3
- OE.CARD-USER: 3
- OE.DRIVER: 3
- OE.FAX-UNIT: 3
- OE.IC-CARD: 6
- OE.NETWORK: 3
- OE.SECRET: 3
- OE.SERVICE: 3
- OE.SETTING-SECURITY: 3
- OE.SIGN: 3
- T:
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
|
- O:
- O.AES: 6
- O.PACE_CHIP: 2
- O.RND: 7
- T:
|
pdf_data/st_keywords/vendor |
|
- GD:
- G+D: 147
- Giesecke+Devrient: 13
- Infineon:
- Infineon: 2
- Infineon Technologies: 1
- Infineon Technologies AG: 1
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 11
- SHA-384: 6
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 4
- brainpoolP384r1: 4
- brainpoolP512r1: 4
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 16
- malfunction: 1
- physical tampering: 3
- SCA:
- DPA: 1
- Leak-Inherent: 14
- Physical Probing: 2
- SPA: 1
- side channel: 1
- other:
- Bleichenbacher attack: 1
- JIL: 3
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03111: 3
- BSI TR-03143: 2
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 180-2: 4
- FIPS 186-2: 6
- FIPS PUB 197: 3
- FIPS186-2: 1
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- CCMB-2017-05-001: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 3
- FIPS PUB 180-4: 1
- ISO:
- NIST:
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document exchanged between MFP and client PC. Also, it provides the protection function for scan image data: 1
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20110108120955+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20110108121126+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - C0273_ASE.doc
- /_AdHocReviewCycleID: -693642671
- /_PreviousAdHocReviewCycleID: -688275005
- pdf_file_size_bytes: 437519
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 57
|
- /Author: wallhaek
- /Keywords:
- /Subject:
- /Title: ASE_STA37_COSGKV_C2_Lite
- pdf_file_size_bytes: 1178896
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 149
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |