bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software Version: A1UD0Y0-0100-GM0-04

CSV information ?

Status archived
Valid from 31.08.2011
Valid until 01.09.2016
Scheme 🇯🇵 JP
Manufacturer Konica Minolta Business Technologies, Inc
Category Other Devices and Systems
Security level EAL3

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0314

Certificate ?

Certification report ?

Extracted keywords

Protocols
SSL

Security level
EAL3
Claims
T.DISCARD-MFP, T.BRING-OUT-STORA, T.ACCESS-PRIVATE-B, T.ACCESS-PUBLIC-B, T.ACCESS-GROUP-, T.ACCESS-SECURE-P, T.UNEXPECTED-TRA, T.ACCESS-SETTING, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.UNEXPECTED-TRANSMISSION, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTING
Certificates
CRP-C0314-01, Certification No. C0314

Certification process
or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD that is a medium to

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title CRP-e
Author IPA/JISEC
Creation date D:20111005175043+09'00'
Modification date D:20111013102302+09'00'
Pages 40
Creator Word 用 Acrobat PDFMaker 8.1
Producer Acrobat Distiller 8.2.0 (Windows)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES
Protocols
SSL

Security level
EAL3
Claims
O.REGISTERED, O.PRIVATE, O.PUBLIC, O.GROUP, O.SECURE, O.CONFIG, O.OVERWRITE, O.CRYPT, O.TRUSTED, O.CRYPTO, O.FAX, O.AUTH, O.REGISTERED-USER, O.PRIVATE-BOX, O.PUBLIC-BOX, O.GROUP-BOX, O.SECURE-PRINT, O.OVERWRITE-ALL, O.CRYPTO-KEY, O.TRUSTED-PASS, O.CRYPTO-MAIL, O.FAX-CONTROL, O.CRYPTO-CAPABILITY, O.AUTH-CAPABILITY, T.D, T.BRING, T.ACCESS, T.UNEXPECTED, T.BACKUP, T.DISCARD-MFP, T.ACCESS-PRIVATE-BOX, T.ACCESS-GROUP-BOX, T.UNEXPECTED-TRANSMISSION, T.BACKUP-RESTORE, T.DISCARD, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTING, OE.FEED, OE.S, OE.SESSION, OE.ADMIN, OE.SERVICE, OE.NETWORK, OE.FAX, OE.SECRET, OE.SETTING, OE.FEED-BACK, OE.SERVER, OE.FAX-UNIT, OE.SETTING-SECURITY
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_COP, FCS_CKM, FCS_CAP.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC, FDP_ACP.1, FDP_UAU.7, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1, FIA_UAU.2.1, FIA_UID.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS, FIA_SSL.3, FIA_UAU, FIA_MSA.3, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MAS.1, FMT_MSA, FMT_SOS.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3

Certification process
or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in

Standards
FIPS 186, FIPS 186-2, FIPS PUB 197, X.509, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Creation date D:20111004150943+09'00'
Modification date D:20111004150947+09'00'
Pages 111
Creator CubePDF
Producer GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0314

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Similar certificates

Name Certificate ID
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00 JISEC-CC-CRP-C0265 Compare
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 PKI Card System Control Software, Version A1UD0Y0-0100-G00-20 JISEC-CC-CRP-C0264 Compare
bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software Version: A2WU0Y0-0100-GM0-00 JISEC-CC-CRP-C0290 Compare
bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version:A0P00Y0-0100-GM0-22 JISEC-CC-CRP-C0260 Compare
bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version: A0P00Y0-0100-GM0-24 JISEC-CC-CRP-C0312 Compare
bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c Control Software Version:A0ED0Y0-0100-GM0-22 JISEC-CC-CRP-C0259 Compare
bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c / D407 / D406 / D405 Control Software Version: A0ED0Y0-0100-GM0-24 JISEC-CC-CRP-C0313 Compare
bizhub C652 / bizhub C552 / bizhub C452 / ineo+ 652 / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version:A0P00Y0-0100-GM0-12 JISEC-CC-CRP-C0241 Compare
bizhub C360 / bizhub C280 / bizhub C220 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c Control Software Version:A0ED0Y0-0100-GM0-12 JISEC-CC-CRP-C0240 Compare
bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software Version: A0R50Y0-0100-G00-11 (System Controller), A0R50Y0-1D00-G00-10 (BIOS Controller) JISEC-CC-CRP-C0190 Compare
bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software Version:A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller) JISEC-CC-CRP-C0223 Compare
bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software Version: A2XK0Y0-0100-G00-56 JISEC-CC-CRP-C0378 Compare
bizhub C652 / bizhub C552 / ineo+ 652 / ineo+ 552 / VarioLink 6522c / VarioLink 5522c Control Software Version:A0P00Y0-0100-GM0-02 JISEC-CC-CRP-C0217 Compare
bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software Version:A11U-0100-G10-06 JISEC-CC-CRP-C0233 Compare
Showing 5 out of 14.

Scheme data ?

Cert Id JISEC-CC-CRP-C0314
Supplier Konica Minolta Business Technologies, Inc.
Toe Overseas Name bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software A1UD0Y0-0100-GM0-04
Expiration Date 01.09.2016
Claim EAL3
Certification Date 01.08.2011
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0314_it1347.html
Toe Japan Name bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Zentai Seigyo Software A1UD0Y0-0100-GM0-04
Enhanced
Product Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software
Toe Version A1UD0Y0-0100-GM0-04
Product Type Control Software for digital MFP
Cc Version 3.1
Assurance Level EAL3
Vendor Konica Minolta Business Technologies, Inc.
Evaluation Facility Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
Report Link https://www.ipa.go.jp/en/security/c0314_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/c0314_eimg.pdf
Target Link https://www.ipa.go.jp/en/security/c0314_est.pdf
Description PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification and Authentication, and Access Control Function The function to identify and authenticate user, and to control access to highly confidential image data stored in MFP - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Safety transmitting and receiving function of image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.

References ?

No references are available for this certificate.

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'JISEC-CC-CRP-C0314', 'supplier': 'Konica Minolta Business Technologies, Inc.', 'toe_overseas_name': 'bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software A1UD0Y0-0100-GM0-04', 'expiration_date': '2016-09-01', 'claim': 'EAL3', 'certification_date': '2011-08-01', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0314_it1347.html', 'toe_japan_name': 'bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Zentai Seigyo Software A1UD0Y0-0100-GM0-04', 'enhanced': {'product': 'Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software', 'toe_version': 'A1UD0Y0-0100-GM0-04', 'product_type': 'Control Software for digital MFP', 'cc_version': '3.1', 'assurance_level': 'EAL3', 'vendor': 'Konica Minolta Business Technologies, Inc.', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'report_link': 'https://www.ipa.go.jp/en/security/c0314_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0314_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0314_est.pdf', 'description': 'PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification and Authentication, and Access Control Function The function to identify and authenticate user, and to control access to highly confidential image data stored in MFP - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Safety transmitting and receiving function of image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.'}}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f84376895a7e7c5880e855b1dc5e169272069b0cef170840c48f909954b8dd62', 'txt_hash': '43baea4ee0375b044eef855a593360ca4314910c6d40dfdc95e0e0d886003ddb'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '85f8a19d7dabc2857df8176f0222253786a4f10f07b182d053a3256588255369', 'txt_hash': '81caccf598c2c4c355c3940fd6bc21a779a78353ab36269065f71b9e5027250b'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 637447, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 40, '/Author': 'IPA/JISEC', '/Company': 'IPA', '/CreationDate': "D:20111005175043+09'00'", '/Creator': 'Word 用 Acrobat PDFMaker 8.1', '/Manager': 'IPA', '/ModDate': "D:20111013102302+09'00'", '/Producer': 'Acrobat Distiller 8.2.0 (Windows)', '/SourceModified': 'D:20111005085003', '/Title': 'CRP-e', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1144816, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 111, '/Producer': 'GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA', '/CreationDate': "D:20111004150943+09'00'", '/ModDate': "D:20111004150947+09'00'", '/Title': '', '/Creator': 'CubePDF', '/Author': '', '/Subject': '', '/Keywords': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0314-01': 1, 'Certification No. C0314': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DISCARD-MFP': 2, 'T.BRING-OUT-STORA': 1, 'T.ACCESS-PRIVATE-B': 1, 'T.ACCESS-PUBLIC-B': 1, 'T.ACCESS-GROUP-': 1, 'T.ACCESS-SECURE-P': 1, 'T.UNEXPECTED-TRA': 1, 'T.ACCESS-SETTING': 2, 'T.BRING-OUT-STORAGE': 1, 'T.ACCESS-PRIVATE-BOX': 1, 'T.ACCESS-PUBLIC-BOX': 1, 'T.ACCESS-GROUP-BOX': 1, 'T.ACCESS-SECURE-PRINT': 1, 'T.UNEXPECTED-TRANSMISSION': 1}, 'A': {'A.ADMIN': 1, 'A.SERVICE': 1, 'A.NETWORK': 1, 'A.SECRET': 1, 'A.SETTING': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD that is a medium to': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 10, 'FCS_CKM.4': 4, 'FCS_COP.1.1': 1, 'FCS_COP': 1, 'FCS_CKM': 2, 'FCS_CAP.1': 2}, 'FDP': {'FDP_RIP.1': 1, 'FDP_ITC.1': 4, 'FDP_ITC.2': 2, 'FDP_ACC.1': 72, 'FDP_ACC.1.1': 4, 'FDP_ACF.1': 55, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 4, 'FDP_ACF.1.3': 4, 'FDP_ACF.1.4': 4, 'FDP_IFC.1': 14, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 6, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC': 1, 'FDP_ACP.1': 1, 'FDP_UAU.7': 1}, 'FIA': {'FIA_AFL.1': 71, 'FIA_AFL.1.1': 9, 'FIA_AFL.1.2': 9, 'FIA_UAU.1': 43, 'FIA_UAU.2': 44, 'FIA_ATD.1': 29, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 44, 'FIA_SOS.1.1': 5, 'FIA_SOS.2': 9, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UID.1': 31, 'FIA_UAU.2.1': 4, 'FIA_UID.2': 48, 'FIA_UAU.6': 11, 'FIA_UAU.6.1': 1, 'FIA_UAU.7': 19, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 7, 'FIA_USB.1': 26, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS': 1, 'FIA_SSL.3': 1, 'FIA_UAU': 2, 'FIA_MSA.3': 1}, 'FMT': {'FMT_MSA.3': 42, 'FMT_MOF.1': 31, 'FMT_MOF.1.1': 3, 'FMT_SMF.1': 112, 'FMT_SMR.1': 171, 'FMT_MSA.1': 34, 'FMT_MSA.1.1': 3, 'FMT_MSA.3.1': 8, 'FMT_MSA.3.2': 7, 'FMT_MTD.1': 119, 'FMT_MTD.1.1': 13, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 6, 'FMT_SMR.1.2': 6, 'FMT_MAS.1': 1, 'FMT_MSA': 5, 'FMT_SOS.1': 1}, 'FTA': {'FTA_SSL.3': 6, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.REGISTERED': 3, 'O.PRIVATE': 3, 'O.PUBLIC': 3, 'O.GROUP': 3, 'O.SECURE': 4, 'O.CONFIG': 12, 'O.OVERWRITE': 3, 'O.CRYPT': 4, 'O.TRUSTED': 3, 'O.CRYPTO': 4, 'O.FAX': 2, 'O.AUTH': 2, 'O.REGISTERED-USER': 12, 'O.PRIVATE-BOX': 3, 'O.PUBLIC-BOX': 6, 'O.GROUP-BOX': 3, 'O.SECURE-PRINT': 6, 'O.OVERWRITE-ALL': 5, 'O.CRYPTO-KEY': 2, 'O.TRUSTED-PASS': 5, 'O.CRYPTO-MAIL': 2, 'O.FAX-CONTROL': 6, 'O.CRYPTO-CAPABILITY': 5, 'O.AUTH-CAPABILITY': 5}, 'T': {'T.D': 1, 'T.BRING': 3, 'T.ACCESS': 19, 'T.UNEXPECTED': 2, 'T.BACKUP': 3, 'T.DISCARD-MFP': 1, 'T.ACCESS-PRIVATE-BOX': 1, 'T.ACCESS-GROUP-BOX': 1, 'T.UNEXPECTED-TRANSMISSION': 1, 'T.BACKUP-RESTORE': 1, 'T.DISCARD': 2}, 'A': {'A.ADMIN': 5, 'A.SERVICE': 4, 'A.NETWORK': 6, 'A.SECRET': 3, 'A.SETTING': 5}, 'OE': {'OE.FEED': 2, 'OE.S': 1, 'OE.SESSION': 10, 'OE.ADMIN': 3, 'OE.SERVICE': 3, 'OE.NETWORK': 4, 'OE.FAX': 2, 'OE.SECRET': 3, 'OE.SETTING': 2, 'OE.FEED-BACK': 9, 'OE.SERVER': 5, 'OE.FAX-UNIT': 2, 'OE.SETTING-SECURITY': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 2}, '3DES': {'3DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186': 2, 'FIPS 186-2': 4, 'FIPS PUB 197': 2}, 'X509': {'X.509': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in': 1}}}.
    • The report_filename property was set to c0314_erpt.pdf.
    • The st_filename property was set to c0314_est.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0314.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0314_erpt.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0314_est.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software Version: A1UD0Y0-0100-GM0-04 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "0d9377a538b9186d",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0314",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "363",
        "283",
        "223",
        "04",
        "7828",
        "0100",
        "423"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "JISEC-CC-CRP-C0314",
      "certification_date": "2011-08-01",
      "claim": "EAL3",
      "enhanced": {
        "assurance_level": "EAL3",
        "cc_version": "3.1",
        "cert_link": "https://www.ipa.go.jp/en/security/c0314_eimg.pdf",
        "description": "PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as \u201cMFP\u201d), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification and Authentication, and Access Control Function The function to identify and authenticate user, and to control access to highly confidential image data stored in MFP - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Safety transmitting and receiving function of image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.",
        "evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
        "product": "Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software",
        "product_type": "Control Software for digital MFP",
        "report_link": "https://www.ipa.go.jp/en/security/c0314_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0314_est.pdf",
        "toe_version": "A1UD0Y0-0100-GM0-04",
        "vendor": "Konica Minolta Business Technologies, Inc."
      },
      "expiration_date": "2016-09-01",
      "supplier": "Konica Minolta Business Technologies, Inc.",
      "toe_japan_name": "bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Zentai Seigyo Software A1UD0Y0-0100-GM0-04",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0314_it1347.html",
      "toe_overseas_name": "bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software A1UD0Y0-0100-GM0-04"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Konica Minolta Business Technologies, Inc",
  "manufacturer_web": "https://www.konicaminolta.com/",
  "name": "bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software Version: A1UD0Y0-0100-GM0-04",
  "not_valid_after": "2016-09-01",
  "not_valid_before": "2011-08-31",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0314_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0314-01": 1,
          "Certification No. C0314": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 1,
          "A.NETWORK": 1,
          "A.SECRET": 1,
          "A.SERVICE": 1,
          "A.SETTING": 1
        },
        "T": {
          "T.ACCESS-GROUP-": 1,
          "T.ACCESS-GROUP-BOX": 1,
          "T.ACCESS-PRIVATE-B": 1,
          "T.ACCESS-PRIVATE-BOX": 1,
          "T.ACCESS-PUBLIC-B": 1,
          "T.ACCESS-PUBLIC-BOX": 1,
          "T.ACCESS-SECURE-P": 1,
          "T.ACCESS-SECURE-PRINT": 1,
          "T.ACCESS-SETTING": 2,
          "T.BRING-OUT-STORA": 1,
          "T.BRING-OUT-STORAGE": 1,
          "T.DISCARD-MFP": 2,
          "T.UNEXPECTED-TRA": 1,
          "T.UNEXPECTED-TRANSMISSION": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL3": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD that is a medium to": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 7
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 2,
          "CCMB-2009-07-002": 2,
          "CCMB-2009-07-003": 2,
          "CCMB-2009-07-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "IPA/JISEC",
      "/Company": "IPA",
      "/CreationDate": "D:20111005175043+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 8.1",
      "/Manager": "IPA",
      "/ModDate": "D:20111013102302+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.2.0 (Windows)",
      "/SourceModified": "D:20111005085003",
      "/Title": "CRP-e",
      "pdf_file_size_bytes": 637447,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 40
    },
    "st_filename": "c0314_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 5,
          "A.NETWORK": 6,
          "A.SECRET": 3,
          "A.SERVICE": 4,
          "A.SETTING": 5
        },
        "O": {
          "O.AUTH": 2,
          "O.AUTH-CAPABILITY": 5,
          "O.CONFIG": 12,
          "O.CRYPT": 4,
          "O.CRYPTO": 4,
          "O.CRYPTO-CAPABILITY": 5,
          "O.CRYPTO-KEY": 2,
          "O.CRYPTO-MAIL": 2,
          "O.FAX": 2,
          "O.FAX-CONTROL": 6,
          "O.GROUP": 3,
          "O.GROUP-BOX": 3,
          "O.OVERWRITE": 3,
          "O.OVERWRITE-ALL": 5,
          "O.PRIVATE": 3,
          "O.PRIVATE-BOX": 3,
          "O.PUBLIC": 3,
          "O.PUBLIC-BOX": 6,
          "O.REGISTERED": 3,
          "O.REGISTERED-USER": 12,
          "O.SECURE": 4,
          "O.SECURE-PRINT": 6,
          "O.TRUSTED": 3,
          "O.TRUSTED-PASS": 5
        },
        "OE": {
          "OE.ADMIN": 3,
          "OE.FAX": 2,
          "OE.FAX-UNIT": 2,
          "OE.FEED": 2,
          "OE.FEED-BACK": 9,
          "OE.NETWORK": 4,
          "OE.S": 1,
          "OE.SECRET": 3,
          "OE.SERVER": 5,
          "OE.SERVICE": 3,
          "OE.SESSION": 10,
          "OE.SETTING": 2,
          "OE.SETTING-SECURITY": 2
        },
        "T": {
          "T.ACCESS": 19,
          "T.ACCESS-GROUP-BOX": 1,
          "T.ACCESS-PRIVATE-BOX": 1,
          "T.BACKUP": 3,
          "T.BACKUP-RESTORE": 1,
          "T.BRING": 3,
          "T.D": 1,
          "T.DISCARD": 2,
          "T.DISCARD-MFP": 1,
          "T.UNEXPECTED": 2,
          "T.UNEXPECTED-TRANSMISSION": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CAP.1": 2,
          "FCS_CKM": 2,
          "FCS_CKM.1": 10,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 4,
          "FCS_COP": 1,
          "FCS_COP.1": 10,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 72,
          "FDP_ACC.1.1": 4,
          "FDP_ACF.1": 55,
          "FDP_ACF.1.1": 4,
          "FDP_ACF.1.2": 4,
          "FDP_ACF.1.3": 4,
          "FDP_ACF.1.4": 4,
          "FDP_ACP.1": 1,
          "FDP_IFC.1": 14,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 6,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ITC": 1,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 2,
          "FDP_RIP.1": 1,
          "FDP_UAU.7": 1
        },
        "FIA": {
          "FIA_AFL.1": 71,
          "FIA_AFL.1.1": 9,
          "FIA_AFL.1.2": 9,
          "FIA_ATD.1": 29,
          "FIA_ATD.1.1": 1,
          "FIA_MSA.3": 1,
          "FIA_SOS": 1,
          "FIA_SOS.1": 44,
          "FIA_SOS.1.1": 5,
          "FIA_SOS.2": 9,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_SSL.3": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 43,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.2": 44,
          "FIA_UAU.2.1": 4,
          "FIA_UAU.6": 11,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 19,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 31,
          "FIA_UID.2": 48,
          "FIA_UID.2.1": 7,
          "FIA_USB.1": 26,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MAS.1": 1,
          "FMT_MOF.1": 31,
          "FMT_MOF.1.1": 3,
          "FMT_MSA": 5,
          "FMT_MSA.1": 34,
          "FMT_MSA.1.1": 3,
          "FMT_MSA.3": 42,
          "FMT_MSA.3.1": 8,
          "FMT_MSA.3.2": 7,
          "FMT_MTD.1": 119,
          "FMT_MTD.1.1": 13,
          "FMT_SMF.1": 112,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 171,
          "FMT_SMR.1.1": 6,
          "FMT_SMR.1.2": 6,
          "FMT_SOS.1": 1
        },
        "FTA": {
          "FTA_SSL.3": 6,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 7
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        },
        "FIPS": {
          "FIPS 186": 2,
          "FIPS 186-2": 4,
          "FIPS PUB 197": 2
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/CreationDate": "D:20111004150943+09\u002700\u0027",
      "/Creator": "CubePDF",
      "/Keywords": "",
      "/ModDate": "D:20111004150947+09\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 1144816,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 111
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0314_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0314_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f84376895a7e7c5880e855b1dc5e169272069b0cef170840c48f909954b8dd62",
      "txt_hash": "43baea4ee0375b044eef855a593360ca4314910c6d40dfdc95e0e0d886003ddb"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "85f8a19d7dabc2857df8176f0222253786a4f10f07b182d053a3256588255369",
      "txt_hash": "81caccf598c2c4c355c3940fd6bc21a779a78353ab36269065f71b9e5027250b"
    }
  },
  "status": "archived"
}