This page was not yet optimized for use on mobile
devices.
bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software
CSV information
| Status | archived |
|---|---|
| Valid from | 13.03.2009 |
| Valid until | 08.04.2014 |
| Scheme | 🇯🇵 JP |
| Manufacturer | Konica Minolta Business Technologies, Inc |
| Category | Other Devices and Systems |
| Security level | EAL3 |
Heuristics summary
Certificate ID: JISEC-CC-CRP-C0205
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Protocols
SSLVendor
MicrosoftSecurity level
EAL3Claims
T.DISCARD-MFP, T.BRING-OUT-STOR, T.ACCESS-PRIVATE, T.ACCESS-PUBLIC-, T.ACCESS-GROUP-B, T.ACCESS-SECURE-, T.ACCESS-NET-SET, T.ACCESS-SETTING, T.BACKUP-RESTOR, T.BRING-OUT-CF, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.UNEXPECTEC-TRANSMISSION, T.BACKUP-RESTORE, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTINGCertificates
CRP-C0205-01, Certification No. C0205Certification process
body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored inStandards
X.509, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004File metadata
| Title | untitled |
|---|---|
| Creation date | D:20090409174039+09'00' |
| Modification date | D:20090409174039+09'00' |
| Pages | 36 |
| Producer | Acrobat Distiller 6.0 (Windows) |
Security target
Extracted keywords
Symmetric Algorithms
AESHash functions
SHA-256, SHA256Protocols
SSLSecurity level
EAL3Claims
O.REGISTERED-USER, O.PRIVATE-BOX, O.PUBLIC-BOX, O.GROUP-BOX, O.SECURE-PRINT, O.CONFIG, O.OVERWRITE-ALL, O.CRYPT-KEY, O.CHECK-HDD, O.CHECK-CF, O.TRUSTED-PASS, O.CRYPTO-MAIL, O.AUTH-CAPABILITY, O.CRYPTO-CAPABILITY, O.LOCK-HDD-CAPABILITY, O.LOCK-CF-CAPABILITY, T.DISCARD-MFP, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.UNEXPECTED-TRANSMISSION, T.ACCESS-SETTING, T.BACKUP-RESTORE, T.BRING-OUT-CF, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTING, OE.CRYPT, OE.FEED-BACK, OE.LOCK-HDD, OE.LOCK-CF, OE.SERVER, OE.SESSION, OE.ADMIN, OE.SERVICE, OE.NETWORK, OE.SECRET, OE.SETTING-SECURITY, OE.CRYPTOSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_COP, FCS_CKM, FCS_CAP.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_ITC, FDP_ACP.1, FDP_UAU.7, FIA_EID.1, FIA_EID, FIA_EID.1.1, FIA_EID.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_NEW.1.2, FIA_SOS, FIA_SSL.3, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MAS.1, FMT_MSA, FMT_SMS.1, FMT_SOS.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Certification process
INC., All Rights Reserved. 7 / 110 TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written inStandards
FIPS 186, FIPS PUB 197, FIPS 186-1, FIPS 186-2, FIPS 180-2, X.509, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004File metadata
| Title | Microsoft Word - C0205_ST_en.doc |
|---|---|
| Author | m-izumi |
| Creation date | D:20090410164324+09'00' |
| Modification date | D:20090410164324+09'00' |
| Pages | 110 |
| Creator | PScript5.dll Version 5.2 |
| Producer | Acrobat Distiller 8.1.0 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
JISEC-CC-CRP-C0205Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.1Similar certificates
Showing 5 out of 6.
Scheme data
| Cert Id | JISEC-CC-CRP-C0205 | |
|---|---|---|
| Supplier | Konica Minolta Business Technologies, Inc. | |
| Toe Overseas Name | bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller) | |
| Expiration Date | 01.04.2014 | |
| Claim | EAL3 | |
| Certification Date | 01.03.2009 | |
| Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0205_it8216.html | |
| Toe Japan Name | bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller) | |
| Enhanced | ||
| Product | Japanese: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software English: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software | |
| Toe Version | A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller) | |
| Product Type | Control Software for digital MFP | |
| Cc Version | 3.1 | |
| Assurance Level | EAL3 | |
| Vendor | Konica Minolta Business Technologies, Inc. | |
| Evaluation Facility | Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security | |
| Report Link | https://www.ipa.go.jp/en/security/c0205_erpt.pdf | |
| Cert Link | https://www.ipa.go.jp/en/security/c0205_eimg.pdf | |
| Target Link | https://www.ipa.go.jp/en/security/c0205_st.pdf | |
| Description | PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "2269d5f12e90117d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0205",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"601",
"751",
"7522",
"6022"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0205",
"certification_date": "2009-03-01",
"claim": "EAL3",
"enhanced": {
"assurance_level": "EAL3",
"cc_version": "3.1",
"cert_link": "https://www.ipa.go.jp/en/security/c0205_eimg.pdf",
"description": "PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as \"MFP\") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
"product": "Japanese: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software English: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software",
"product_type": "Control Software for digital MFP",
"report_link": "https://www.ipa.go.jp/en/security/c0205_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0205_st.pdf",
"toe_version": "A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)",
"vendor": "Konica Minolta Business Technologies, Inc."
},
"expiration_date": "2014-04-01",
"supplier": "Konica Minolta Business Technologies, Inc.",
"toe_japan_name": "bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0205_it8216.html",
"toe_overseas_name": "bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Konica Minolta Business Technologies, Inc",
"manufacturer_web": "https://www.konicaminolta.com/",
"name": "bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software",
"not_valid_after": "2014-04-08",
"not_valid_before": "2009-03-13",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0205_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0205-01": 1,
"Certification No. C0205": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN": 1,
"A.NETWORK": 1,
"A.SECRET": 1,
"A.SERVICE": 1,
"A.SETTING": 1
},
"T": {
"T.ACCESS-GROUP-B": 1,
"T.ACCESS-GROUP-BOX": 1,
"T.ACCESS-NET-SET": 1,
"T.ACCESS-PRIVATE": 1,
"T.ACCESS-PRIVATE-BOX": 1,
"T.ACCESS-PUBLIC-": 1,
"T.ACCESS-PUBLIC-BOX": 1,
"T.ACCESS-SECURE-": 1,
"T.ACCESS-SECURE-PRINT": 1,
"T.ACCESS-SETTING": 2,
"T.BACKUP-RESTOR": 1,
"T.BACKUP-RESTORE": 1,
"T.BRING-OUT-CF": 2,
"T.BRING-OUT-STOR": 1,
"T.BRING-OUT-STORAGE": 1,
"T.DISCARD-MFP": 2,
"T.UNEXPECTEC-TRANSMISSION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 7
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2007-09-002": 2,
"CCMB-2007-09-003": 2,
"CCMB-2007-09-004": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20090409174039+09\u002700\u0027",
"/ModDate": "D:20090409174039+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "untitled",
"pdf_file_size_bytes": 406178,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "c0205_st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 3,
"A.NETWORK": 4,
"A.SECRET": 2,
"A.SERVICE": 2,
"A.SETTING": 3
},
"O": {
"O.AUTH-CAPABILITY": 10,
"O.CHECK-CF": 4,
"O.CHECK-HDD": 7,
"O.CONFIG": 11,
"O.CRYPT-KEY": 5,
"O.CRYPTO-CAPABILITY": 4,
"O.CRYPTO-MAIL": 4,
"O.GROUP-BOX": 5,
"O.LOCK-CF-CAPABILITY": 4,
"O.LOCK-HDD-CAPABILITY": 7,
"O.OVERWRITE-ALL": 7,
"O.PRIVATE-BOX": 5,
"O.PUBLIC-BOX": 8,
"O.REGISTERED-USER": 14,
"O.SECURE-PRINT": 8,
"O.TRUSTED-PASS": 7
},
"OE": {
"OE.ADMIN": 2,
"OE.CRYPT": 3,
"OE.CRYPTO": 1,
"OE.FEED-BACK": 10,
"OE.LOCK-CF": 3,
"OE.LOCK-HDD": 3,
"OE.NETWORK": 2,
"OE.SECRET": 2,
"OE.SERVER": 5,
"OE.SERVICE": 2,
"OE.SESSION": 2,
"OE.SETTING-SECURITY": 2
},
"T": {
"T.ACCESS-GROUP-BOX": 3,
"T.ACCESS-PRIVATE-BOX": 3,
"T.ACCESS-PUBLIC-BOX": 2,
"T.ACCESS-SECURE-PRINT": 2,
"T.ACCESS-SETTING": 2,
"T.BACKUP-RESTORE": 3,
"T.BRING-OUT-CF": 2,
"T.BRING-OUT-STORAGE": 2,
"T.DISCARD-MFP": 3,
"T.UNEXPECTED-TRANSMISSION": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VLA.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2
},
"FCS": {
"FCS_CAP.1": 2,
"FCS_CKM": 2,
"FCS_CKM.1": 10,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 4,
"FCS_COP": 1,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 58,
"FDP_ACC.1.1": 3,
"FDP_ACF.1": 42,
"FDP_ACF.1.1": 3,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 3,
"FDP_ACF.1.4": 3,
"FDP_ACP.1": 1,
"FDP_IFC.1": 6,
"FDP_ITC": 1,
"FDP_ITC.1": 4,
"FDP_ITC.2": 2,
"FDP_RIP.1": 1,
"FDP_UAU.7": 1
},
"FIA": {
"FIA_AFL.1": 62,
"FIA_AFL.1.1": 8,
"FIA_AFL.1.2": 8,
"FIA_ATD.1": 25,
"FIA_ATD.1.1": 1,
"FIA_EID": 2,
"FIA_EID.1": 16,
"FIA_EID.1.1": 3,
"FIA_EID.1.2": 1,
"FIA_NEW.1.2": 2,
"FIA_SOS": 1,
"FIA_SOS.1": 48,
"FIA_SOS.1.1": 6,
"FIA_SOS.2": 9,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_SSL.3": 1,
"FIA_UAU.1": 23,
"FIA_UAU.2": 63,
"FIA_UAU.2.1": 6,
"FIA_UAU.6": 11,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 19,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 31,
"FIA_UID.2": 50,
"FIA_UID.2.1": 7,
"FIA_USB.1": 22,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MAS.1": 1,
"FMT_MOF.1": 33,
"FMT_MOF.1.1": 4,
"FMT_MSA": 3,
"FMT_MSA.1": 32,
"FMT_MSA.1.1": 3,
"FMT_MSA.3": 31,
"FMT_MSA.3.1": 5,
"FMT_MSA.3.2": 5,
"FMT_MTD.1": 105,
"FMT_MTD.1.1": 12,
"FMT_SMF.1": 109,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 167,
"FMT_SMR.1.1": 6,
"FMT_SMR.1.2": 6,
"FMT_SMS.1": 1,
"FMT_SOS.1": 1
},
"FTA": {
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"INC., All Rights Reserved. 7 / 110 TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 5,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 1,
"CCMB-2007-09-002": 1,
"CCMB-2007-09-003": 1,
"CCMB-2007-09-004": 1
},
"FIPS": {
"FIPS 180-2": 1,
"FIPS 186": 1,
"FIPS 186-1": 1,
"FIPS 186-2": 4,
"FIPS PUB 197": 3
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "m-izumi",
"/CreationDate": "D:20090410164324+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20090410164324+09\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "Microsoft Word - C0205_ST_en.doc",
"pdf_file_size_bytes": 683223,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 110
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "2198ac4c82ed811b2edd9e83bbaa8becadcb6dff62d90c56c10340d8964d1481",
"txt_hash": "1519f98e099ce080ee561be920fbcd3fed845baec870e255417801723af52f0d"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "34fa7d81958924c4a0c89876649867b9547ffc0cad820155f4099093e019a72d",
"txt_hash": "dd1f48708e1c4f982222e652bdb588c1919067a1d47658f20b332ea2ee4da57e"
}
},
"status": "archived"
}