This page was not yet optimized for use on mobile
devices.
bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software Version: A2WU0Y0-0100-GM0-00
CSV information
| Status | archived |
|---|---|
| Valid from | 30.05.2011 |
| Valid until | 06.06.2016 |
| Scheme | 🇯🇵 JP |
| Manufacturer | Konica Minolta Business Technologies, Inc |
| Category | Other Devices and Systems |
| Security level | EAL3 |
Heuristics summary
Certificate ID: JISEC-CC-CRP-C0290
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Protocols
SSLSecurity level
EAL3Claims
T.DISCARD-MFP, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRIN, T.UNEXPECTED-TRANSM, T.ACCESS-SETTING, T.BACKUP-RESTORE, T.ACCESS-SECURE-PRINT, T.UNEXPECTED-TRANSMISSION, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTINGCertificates
CRP-C0290-01, Certification No. C0290Certification process
of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD that is the medium toStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
| Title | CRP-e |
|---|---|
| Author | IPA/JISEC |
| Creation date | D:20110802102725+09'00' |
| Modification date | D:20110802103212+09'00' |
| Pages | 39 |
| Creator | Word 用 Acrobat PDFMaker 8.1 |
| Producer | Acrobat Distiller 8.3.0 (Windows) |
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, 3DESProtocols
SSLSecurity level
EAL3Claims
O.REGISTERED, O.PRIVATE, O.PUBLIC, O.GROUP, O.SECURE, O.CONFIG, O.OVERWRITE, O.CRYPT, O.TRUSTED, O.CRYPTO, O.FAX, O.AUTH, O.REGISTERED-USER, O.PRIVATE-BOX, O.PUBLIC-BOX, O.GROUP-BOX, O.SECURE-PRINT, O.OVERWRITE-ALL, O.CRYPTO-KEY, O.TRUSTED-PASS, O.CRYPTO-MAIL, O.FAX-CONTROL, O.CRYPTO-CAPABILITY, O.AUTH-CAPABILITY, T.DISCARD, T.BRING, T.ACCESS, T.UNEXPECTED, T.BACKUP, T.DISCARD-MFP, T.ACCESS-PRIVATE-BOX, T.ACCESS-GROUP-BOX, T.UNEXPECTED-TRANSMISSION, T.BACKUP-RESTORE, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTING, OE.FEED, OE.S, OE.SESSION, OE.ADMIN, OE.SERVICE, OE.NETWORK, OE.FAX, OE.SECRET, OE.SETTING, OE.FEED-BACK, OE.SERVER, OE.FAX-UNIT, OE.SETTING-SECURITYSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_COP, FCS_CKM, FCS_CAP.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC, FDP_ACP.1, FDP_UAU.7, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1, FIA_UAU.2.1, FIA_UID.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS, FIA_SSL.3, FIA_UAU, FIA_MSA.3, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MAS.1, FMT_MSA, FMT_SOS.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Certification process
main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data inStandards
FIPS 186, FIPS 186-2, FIPS PUB 197, X.509, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
| Creation date | D:20110720085904+09'00' |
|---|---|
| Modification date | D:20110720085911+09'00' |
| Pages | 112 |
| Creator | CubePDF |
| Producer | GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
JISEC-CC-CRP-C0290Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Similar certificates
Showing 5 out of 15.
Scheme data
| Cert Id | JISEC-CC-CRP-C0290 | |
|---|---|---|
| Supplier | Konica Minolta Business Technologies, Inc. | |
| Toe Overseas Name | bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software A2WU0Y0-0100-GM0-00 | |
| Expiration Date | 01.06.2016 | |
| Claim | EAL3 | |
| Certification Date | 01.05.2011 | |
| Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0290_it0309.html | |
| Toe Japan Name | bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Zentai Seigyo Software A2WU0Y0-0100-GM0-00 | |
| Enhanced | ||
| Product | Japanese : bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Zentai Seigyo Software English : bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software | |
| Toe Version | A2WU0Y0-0100-GM0-00 | |
| Product Type | Control Software for digital MFP | |
| Cc Version | 3.1 | |
| Assurance Level | EAL3 | |
| Vendor | Konica Minolta Business Technologies, Inc. | |
| Evaluation Facility | Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security | |
| Report Link | https://www.ipa.go.jp/en/security/c0290_erpt.pdf | |
| Cert Link | https://www.ipa.go.jp/en/security/c0290_eimg.pdf | |
| Target Link | https://www.ipa.go.jp/en/security/c0290_est.pdf | |
| Description | PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as“MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification and Authentication, and Access Control Function The function to identify and authenticate user, and to control access to highly confidential image data stored in MFP. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Safety transmitting and receiving function of image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone. | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "389366efa076a48a",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0290",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"0100",
"552",
"502",
"00",
"652",
"602"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0290",
"certification_date": "2011-05-01",
"claim": "EAL3",
"enhanced": {
"assurance_level": "EAL3",
"cc_version": "3.1",
"cert_link": "https://www.ipa.go.jp/en/security/c0290_eimg.pdf",
"description": "PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as\u201cMFP\u201d), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification and Authentication, and Access Control Function The function to identify and authenticate user, and to control access to highly confidential image data stored in MFP. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Safety transmitting and receiving function of image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
"product": "Japanese : bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Zentai Seigyo Software English : bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software",
"product_type": "Control Software for digital MFP",
"report_link": "https://www.ipa.go.jp/en/security/c0290_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0290_est.pdf",
"toe_version": "A2WU0Y0-0100-GM0-00",
"vendor": "Konica Minolta Business Technologies, Inc."
},
"expiration_date": "2016-06-01",
"supplier": "Konica Minolta Business Technologies, Inc.",
"toe_japan_name": "bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Zentai Seigyo Software A2WU0Y0-0100-GM0-00",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0290_it0309.html",
"toe_overseas_name": "bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software A2WU0Y0-0100-GM0-00"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Konica Minolta Business Technologies, Inc",
"manufacturer_web": "https://www.konicaminolta.com/",
"name": "bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software Version: A2WU0Y0-0100-GM0-00",
"not_valid_after": "2016-06-06",
"not_valid_before": "2011-05-30",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0290_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0290-01": 1,
"Certification No. C0290": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN": 1,
"A.NETWORK": 1,
"A.SECRET": 1,
"A.SERVICE": 1,
"A.SETTING": 1
},
"T": {
"T.ACCESS-GROUP-BOX": 2,
"T.ACCESS-PRIVATE-BOX": 2,
"T.ACCESS-PUBLIC-BOX": 2,
"T.ACCESS-SECURE-PRIN": 1,
"T.ACCESS-SECURE-PRINT": 1,
"T.ACCESS-SETTING": 2,
"T.BACKUP-RESTORE": 2,
"T.BRING-OUT-STORAGE": 2,
"T.DISCARD-MFP": 2,
"T.UNEXPECTED-TRANSM": 1,
"T.UNEXPECTED-TRANSMISSION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL3": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD that is the medium to": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 7
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "IPA/JISEC",
"/Company": "IPA",
"/CreationDate": "D:20110802102725+09\u002700\u0027",
"/Creator": "Word \u7528 Acrobat PDFMaker 8.1",
"/Manager": "IPA",
"/ModDate": "D:20110802103212+09\u002700\u0027",
"/Producer": "Acrobat Distiller 8.3.0 (Windows)",
"/Title": "CRP-e",
"pdf_file_size_bytes": 3264295,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 39
},
"st_filename": "c0290_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 5,
"A.NETWORK": 6,
"A.SECRET": 3,
"A.SERVICE": 4,
"A.SETTING": 5
},
"O": {
"O.AUTH": 2,
"O.AUTH-CAPABILITY": 5,
"O.CONFIG": 12,
"O.CRYPT": 4,
"O.CRYPTO": 4,
"O.CRYPTO-CAPABILITY": 5,
"O.CRYPTO-KEY": 2,
"O.CRYPTO-MAIL": 2,
"O.FAX": 2,
"O.FAX-CONTROL": 6,
"O.GROUP": 3,
"O.GROUP-BOX": 3,
"O.OVERWRITE": 3,
"O.OVERWRITE-ALL": 5,
"O.PRIVATE": 3,
"O.PRIVATE-BOX": 3,
"O.PUBLIC": 3,
"O.PUBLIC-BOX": 6,
"O.REGISTERED": 3,
"O.REGISTERED-USER": 12,
"O.SECURE": 4,
"O.SECURE-PRINT": 6,
"O.TRUSTED": 3,
"O.TRUSTED-PASS": 5
},
"OE": {
"OE.ADMIN": 3,
"OE.FAX": 2,
"OE.FAX-UNIT": 2,
"OE.FEED": 2,
"OE.FEED-BACK": 9,
"OE.NETWORK": 4,
"OE.S": 1,
"OE.SECRET": 3,
"OE.SERVER": 5,
"OE.SERVICE": 3,
"OE.SESSION": 10,
"OE.SETTING": 2,
"OE.SETTING-SECURITY": 2
},
"T": {
"T.ACCESS": 19,
"T.ACCESS-GROUP-BOX": 1,
"T.ACCESS-PRIVATE-BOX": 1,
"T.BACKUP": 3,
"T.BACKUP-RESTORE": 1,
"T.BRING": 3,
"T.DISCARD": 3,
"T.DISCARD-MFP": 1,
"T.UNEXPECTED": 2,
"T.UNEXPECTED-TRANSMISSION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CAP.1": 2,
"FCS_CKM": 2,
"FCS_CKM.1": 10,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 4,
"FCS_COP": 1,
"FCS_COP.1": 10,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 72,
"FDP_ACC.1.1": 4,
"FDP_ACF.1": 55,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.3": 4,
"FDP_ACF.1.4": 4,
"FDP_ACP.1": 1,
"FDP_IFC.1": 14,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 6,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC": 1,
"FDP_ITC.1": 4,
"FDP_ITC.2": 2,
"FDP_RIP.1": 1,
"FDP_UAU.7": 1
},
"FIA": {
"FIA_AFL.1": 71,
"FIA_AFL.1.1": 9,
"FIA_AFL.1.2": 9,
"FIA_ATD.1": 29,
"FIA_ATD.1.1": 1,
"FIA_MSA.3": 1,
"FIA_SOS": 1,
"FIA_SOS.1": 44,
"FIA_SOS.1.1": 5,
"FIA_SOS.2": 9,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_SSL.3": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 43,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UAU.2": 44,
"FIA_UAU.2.1": 4,
"FIA_UAU.6": 11,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 19,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 31,
"FIA_UID.2": 48,
"FIA_UID.2.1": 7,
"FIA_USB.1": 26,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MAS.1": 1,
"FMT_MOF.1": 31,
"FMT_MOF.1.1": 3,
"FMT_MSA": 5,
"FMT_MSA.1": 34,
"FMT_MSA.1.1": 3,
"FMT_MSA.3": 42,
"FMT_MSA.3.1": 8,
"FMT_MSA.3.2": 7,
"FMT_MTD.1": 119,
"FMT_MTD.1.1": 13,
"FMT_SMF.1": 112,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 171,
"FMT_SMR.1.1": 6,
"FMT_SMR.1.2": 6,
"FMT_SOS.1": 1
},
"FTA": {
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 7
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
},
"FIPS": {
"FIPS 186": 2,
"FIPS 186-2": 4,
"FIPS PUB 197": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"3DES": 1
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20110720085904+09\u002700\u0027",
"/Creator": "CubePDF",
"/Keywords": "",
"/ModDate": "D:20110720085911+09\u002700\u0027",
"/Producer": "GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 1134986,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 112
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0290_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0290_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c6dd133542b708843cbf6d967b9e1e79db5beb04270463e3dff8b874d7023e77",
"txt_hash": "f1ef51739b45ef9af7f6ccd770b5bdb46d31ed46ff780f089d4d8f90a3642100"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e536532a761df2b233174cdbf39347ba7a9456addbb1585c1f0daec5370955db",
"txt_hash": "d7b2d15b32df36108b46cf4e8b950b1420b23546b888bbb3541807c55e5594a9"
}
},
"status": "archived"
}