Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software Version: A0R50Y0-0100-G00-11 (System Controller), A0R50Y0-1D00-G00-10 (BIOS Controller)
JISEC-CC-CRP-C0190
Plateforme jTOP INFv#46P31 masquée sur les composants M7820 A11 et M11 avec fonctionnalités MRTD, version 46.31
ANSSI-CC-2015/25
name bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software Version: A0R50Y0-0100-G00-11 (System Controller), A0R50Y0-1D00-G00-10 (BIOS Controller) Plateforme jTOP INFv#46P31 masquée sur les composants M7820 A11 et M11 avec fonctionnalités MRTD, version 46.31
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 09.12.2013 04.08.2020
not_valid_before 30.10.2008 04.08.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0190_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_25.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0190_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CIBLE-LITE_ANSSI-2015_25.pdf
manufacturer Konica Minolta Business Technologies, Inc Trusted Logic / Infineon
manufacturer_web https://www.konicaminolta.com/ https://www.trusted-logic.com/
security_level EAL3 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst fe2f02fb20d5a072 d4e5ceb9dcabedfb
heuristics/cert_id JISEC-CC-CRP-C0190 ANSSI-CC-2015/25
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ALC_CMC.3, ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ALC_DVS.1, ASE_REQ.2, ADV_TDS.2, ALC_CMS.3, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_FSP.3, ASE_OBJ.2, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_LCD.1, AVA_VLA.1 AVA_VAN.5, ALC_DVS.2
heuristics/extracted_versions 10, 361, 501, 11, 421, 0100 46.31
heuristics/report_references/directly_referencing {} ANSSI-CC-2013/42, ANSSI-CC-2013/55, BSI-DSZ-CC-0829-2012
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, ANSSI-CC-2013/55, ANSSI-CC-2013/42, BSI-DSZ-CC-0640-2010
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0190
  • certification_date: 01.10.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0190_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functions TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Zentai Control Software English: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0190_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0190_est.pdf
    • toe_version: A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.12.2013
  • revalidations: [frozendict({'date': '2009-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0190_it8215_01.html'})]
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Zentai Control Software A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0190_it8215.html
  • toe_overseas_name: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
heuristics/protection_profiles {} 9399bd94f9925b16
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf
pdf_data/report_filename c0190_erpt.pdf ANSSI-CC-2015_25.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2015/25
    • cert_item: Plateforme jTOP INFv#46P31 masquée sur les composants M7820 A11 et M11 avec fonctionnalités MRTD
    • cert_item_version: Version 46.31
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: TRUSTED LOGIC 6 rue de la verrerie, 92197 Meudon Cedex, France INFINEON TECHNOLOGIES AIM CC SM PS - Am Campeon 1-12 - 85579 Neubiberg, Allemagne Commanditaire TRUSTED LOGIC 6 rue de la verrerie, 92197 Meudon Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PP_JCS], version 3.0, Java CardTM System Open Configuration Protection Profile
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0190-01: 1
    • Certification No. C0190: 1
  • DE:
    • BSI-DSZ-CC-0829-2012: 1
  • FR:
    • ANSSI-CC-2013/42: 1
    • ANSSI-CC-2013/55: 1
    • ANSSI-CC-2015/25: 19
    • ANSSI-CC-PP-2010/03-M01: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 4
    • AGD_PRE: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-B: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-NET-SET: 1
    • T.ACCESS-PRIVATE: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTOR: 1
    • T.BACKUP-RESTORE: 1
    • T.BRING-OUT-CF: 2
    • T.BRING-OUT-STOR: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTEC-TRANSMISSION: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Infineon:
    • Infineon: 2
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
  • PACE:
    • PACE: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in: 1
pdf_data/report_metadata
  • /CreationDate: D:20081211163158+09'00'
  • /ModDate: D:20081211163158+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 308979
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
  • /Author: renner
  • /CreationDate: D:20150806161120+02'00'
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate: D:20150806161120+02'00'
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title: ANSSI-CC-2015_25
  • pdf_file_size_bytes: 1198813
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename c0190_est.pdf CIBLE-LITE_ANSSI-2015_25.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0017: 1
    • BSI-PP-0035: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VLA.1: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 57
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 41
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ACP.1: 1
    • FDP_IFC.1: 6
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 61
    • FIA_AFL.1.1: 8
    • FIA_AFL.1.2: 8
    • FIA_ATD.1: 26
    • FIA_ATD.1.1: 1
    • FIA_EID: 2
    • FIA_EID.1: 16
    • FIA_EID.1.1: 3
    • FIA_EID.1.2: 1
    • FIA_NEW.1.2: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 47
    • FIA_SOS.1.1: 6
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU.1: 23
    • FIA_UAU.2: 67
    • FIA_UAU.2.1: 6
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 18
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 49
    • FIA_UID.2.1: 7
    • FIA_USB.1: 22
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 31
    • FMT_MOF.1.1: 4
    • FMT_MSA: 3
    • FMT_MSA.1: 32
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 5
    • FMT_MSA.3.2: 5
    • FMT_MTD.1: 101
    • FMT_MTD.1.1: 12
    • FMT_SMF.1: 107
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 164
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SMS.1: 1
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP: 3
    • FAU_ARP.1: 3
    • FAU_SAS: 1
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 8
    • FCO_NRR: 2
    • FCO_NRR.1: 3
  • FCS:
    • FCS_CKM: 19
    • FCS_CKM.1: 3
    • FCS_CKM.2: 2
    • FCS_CKM.3: 1
    • FCS_CKM.4: 2
    • FCS_COP: 30
    • FCS_COP.1: 5
    • FCS_RND: 4
    • FCS_RND.1: 5
    • FCS_RND.1.1: 1
    • FCS_RNG: 1
    • FCS_TST.1: 1
  • FDP:
    • FDP_ACC: 12
    • FDP_ACC.1: 3
    • FDP_ACC.2: 5
    • FDP_ACF: 13
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_IFC: 6
    • FDP_IFC.1: 1
    • FDP_IFC.2: 2
    • FDP_IFF: 5
    • FDP_IFF.1: 16
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.4: 1
    • FDP_ITC: 5
    • FDP_ITC.1: 3
    • FDP_ITC.2: 9
    • FDP_ITT: 1
    • FDP_RIP: 23
    • FDP_RIP.1: 9
    • FDP_ROL: 6
    • FDP_ROL.1: 7
    • FDP_SDI: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT: 2
    • FDP_UCT.1: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 9
    • FIA_AFL.1: 8
    • FIA_ATD: 2
    • FIA_ATD.1: 1
    • FIA_UAU: 14
    • FIA_UAU.1: 4
    • FIA_UAU.4: 2
    • FIA_UAU.5: 2
    • FIA_UAU.6: 1
    • FIA_UID: 9
    • FIA_UID.1: 4
    • FIA_UID.2: 1
    • FIA_USB: 2
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 9
    • FMT_LIM.1: 9
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 8
    • FMT_LIM.2.1: 2
    • FMT_MSA: 40
    • FMT_MSA.1: 10
    • FMT_MSA.2: 3
    • FMT_MSA.3: 14
    • FMT_MTD: 9
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 11
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR: 15
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 4
    • FPR_UNO.1: 2
  • FPT:
    • FPT_FLS: 14
    • FPT_FLS.1: 5
    • FPT_ITT: 1
    • FPT_PHP: 1
    • FPT_RCV: 10
    • FPT_RCV.3: 18
    • FPT_RCV.4: 1
    • FPT_TDC: 2
    • FPT_TDC.1: 4
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 4
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT: 1
    • FRU_RSA: 2
    • FRU_RSA.1: 1
  • FTP:
    • FTP_ITC: 7
    • FTP_ITC.1: 7
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 4
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.AUTH-CAPABILITY: 9
    • O.CHECK-CF: 4
    • O.CHECK-HDD: 6
    • O.CONFIG: 11
    • O.CRYPT-KEY: 5
    • O.CRYPTO-CAPABILITY: 4
    • O.CRYPTO-MAIL: 4
    • O.GROUP-BOX: 5
    • O.LOCK-CF-CAPABILITY: 4
    • O.LOCK-HDD-CAPABILITY: 6
    • O.OVERWRITE-ALL: 6
    • O.PRIVATE-BOX: 5
    • O.PUBLIC-BOX: 7
    • O.REGISTERED-USER: 13
    • O.SECURE-PRINT: 7
    • O.TRUSTED-PASS: 6
  • OE:
    • OE.ADMIN: 2
    • OE.CRYPT: 3
    • OE.CRYPTO: 1
    • OE.FEED-BACK: 10
    • OE.LOCK-CF: 3
    • OE.LOCK-HDD: 3
    • OE.NETWORK: 2
    • OE.SECRET: 2
    • OE.SERVER: 5
    • OE.SERVICE: 2
    • OE.SESSION: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS-GROUP-BOX: 3
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PRIVATE-BOX: 3
    • T.ACCESS-PUBLIC-BOX: 2
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 3
    • T.BRING-OUT-CF: 2
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 3
    • T.UNEXPECTEC-TRANSMISSION: 1
    • T.UNEXPECTED-TRANSMISSION: 1
  • A:
    • A.APPLET: 2
    • A.CARD-MANAGEMENT: 1
    • A.DELETION: 1
    • A.NATIVE: 3
    • A.VERIFICATION: 2
  • D:
    • D.API_DATA: 4
    • D.APP-CODE: 3
    • D.APP-INST: 2
    • D.APP_CODE: 5
    • D.APP_C_DATA: 4
    • D.APP_I_DATA: 6
    • D.COMMAND: 2
    • D.CRYPTO: 5
    • D.CVM: 2
    • D.GP-REGISTRY: 2
    • D.JCS_CODE: 5
    • D.JCS_DATA: 6
    • D.PIN: 5
    • D.SD-PERSO: 2
    • D.SD-SESSION-KEYS: 2
    • D.SEC_DATA: 8
    • D.SOFTWARE: 2
  • O:
    • O.ALARM: 2
    • O.APPLET: 16
    • O.CARD-: 1
    • O.CARD-MANAGEMENT: 2
    • O.CIPHER: 3
    • O.CODE_PKG: 14
    • O.CVM-BLOCK: 2
    • O.DELETION: 2
    • O.ERROR-COUNTERS: 2
    • O.FIREWALL: 2
    • O.GLOBAL-CVM: 2
    • O.GLOBAL_ARRAYS_CONFID: 2
    • O.GLOBAL_ARRAYS_INTEG: 2
    • O.INFO-CONFIDENTIALITY: 2
    • O.INFO-INTEGRITY: 3
    • O.INFO-ORIGIN: 2
    • O.INSTALL: 4
    • O.JAVAOBJECT: 41
    • O.KEY-MNGT: 3
    • O.LIFE-CYCLE: 2
    • O.LOAD: 4
    • O.LOCK: 2
    • O.NATIVE: 2
    • O.NO-KEY-REUSE: 2
    • O.OBJ-DELETION: 2
    • O.OPERATE: 2
    • O.OS-SUPPORT: 2
    • O.PIN-MNGT: 3
    • O.REALLOCATION: 2
    • O.RECEIPT: 2
    • O.RECOVERY: 2
    • O.REQUEST: 2
    • O.RESOURCES: 2
    • O.RND: 1
    • O.SID: 2
    • O.TRANSACTION: 3
    • O.VERIFICATION: 3
  • OE:
    • OE.APPLET: 2
    • OE.BAC_PP: 2
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-EVIDENCE: 2
    • OE.KEY-LENGTH: 2
    • OE.MRTD_: 1
    • OE.NATIVE: 2
    • OE.NO-RMI-APPLETS: 2
    • OE.SCP: 6
    • OE.SECRETS: 2
    • OE.VERIFICATION: 5
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 2
    • OP.DELETE_PKG_APPLET: 1
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP: 1
    • OSP.BAC-PP: 2
    • OSP.FILE-ORIGIN: 2
    • OSP.KEY-LENGTH: 2
    • OSP.NO-RMI-APPLETS: 2
    • OSP.PERSONALIZATION: 2
    • OSP.PROCESS-TOE: 1
    • OSP.SECRETS: 3
    • OSP.VERIFICATION: 2
  • R:
    • R.JAVA: 10
  • T:
    • T.BRUTE-FORCE: 2
    • T.CONFID-APPLI-DATA: 2
    • T.CONFID-JCS-CODE: 2
    • T.CONFID-JCS-DATA: 2
    • T.CRYPTO: 2
    • T.DELETION: 4
    • T.EXE-CODE: 4
    • T.FORCED-RESET: 2
    • T.IMPERSONATE: 2
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 4
    • T.INTEG-APPLI-DATA: 4
    • T.INTEG-JCS-CODE: 2
    • T.INTEG-JCS-DATA: 2
    • T.INVALID-INPUT: 2
    • T.INVALID-ORDER: 2
    • T.LIFE-CYCLE: 2
    • T.MALFUNCTION: 1
    • T.MEM_ACCESS: 1
    • T.NATIVE: 2
    • T.OBJ-DELETION: 2
    • T.PHYSICAL: 2
    • T.PHYS_MANIPULATION: 1
    • T.PHYS_PROBING: 1
    • T.RECEIPT: 2
    • T.REPLAY: 2
    • T.RESOURCES: 2
    • T.RND: 1
    • T.SID: 4
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 7
  • Infineon:
    • Infineon: 1
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • AES_competition:
    • AES:
      • AES: 30
      • AES128: 6
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 3
    • DES:
      • DES: 34
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 9
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 1536: 1
    • RSA-CRT: 3
    • RSA1024: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 5
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
  • PACE:
    • PACE: 104
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 9
  • CCM:
    • CCM: 1
  • ECB:
    • ECB: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • Malfunction: 3
    • Physical Tampering: 1
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 2
  • SCA:
    • DPA: 4
    • Leak-Inherent: 1
    • SPA: 2
    • physical probing: 3
  • other:
    • reverse engineering: 2
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 2
    • EF.DG1: 2
    • EF.DG14: 1
    • EF.DG16: 2
    • EF.DG2: 2
    • EF.DG3: 2
    • EF.DG4: 2
    • EF.DG5: 2
    • EF.SOD: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 186: 1
    • FIPS 186-1: 1
    • FIPS 186-2: 4
    • FIPS PUB 197: 3
  • X509:
    • X.509: 1
  • BSI:
    • AIS34: 2
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 197: 2
    • FIPS 46-2: 1
    • FIPS 46-3: 2
    • FIPS PUB 197: 3
    • FIPS PUB 46-3: 6
    • FIPS PUB 81: 1
  • ICAO:
    • ICAO: 14
  • ISO:
    • ISO/IEC 15408:2005: 3
    • ISO/IEC 15946-: 2
    • ISO/IEC 15946-3: 3
  • NIST:
    • NIST SP 800-108: 1
    • NIST SP 800-38A: 2
    • NIST SP 800-38B: 8
  • PKCS:
    • PKCS#1: 5
    • PKCS#3: 3
  • SCP:
    • SCP02: 24
    • SCP03: 24
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.2.1: 1
  • JavaCard:
    • Java Card 3.0.4: 4
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
    • javacard.internalservices: 1
    • javacard.lds.filesystem: 1
    • javacard.pace: 1
    • javacard.security: 5
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • the main body of MFP or through the network. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in: 1
pdf_data/st_metadata
  • /Author: e02518
  • /CreationDate: D:20081205143523+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20081205143523+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: Microsoft Word - 【C0190】英文ST掲載用081205.doc
  • pdf_file_size_bytes: 735960
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 108
  • /Author: GUILLAUME PHAN
  • /CreationDate: D:20150715173054+02'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20150715173054+02'00'
  • /Producer: Microsoft® Word 2013
  • /Title: Security Target LITE
  • pdf_file_size_bytes: 2175803
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 164
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different