This page was not yet optimized for use on mobile devices.
KONICA MINOLTA bizhub C750i/AccurioPrint C750i with FK-514, DEVELOP ineo+ 750i with FK-514G00-33
CSV information ?
Status | active |
---|---|
Valid from | 24.11.2020 |
Valid until | 24.11.2025 |
Scheme | 🇯🇵 JP |
Manufacturer | KONICA MINOLTA, INC. |
Category | Multi-Function Devices |
Security level | |
Protection profiles |
Heuristics summary ?
Certificate ID: JISEC-CC-CRP-C0692-01-2020
Certificate ?
Extracted keywords
Certificates
JISEC-CC-CRP-C0692-01-2020Evaluation facilities
ECSEC LaboratoryFile metadata
Creation date | D:20201221173023+09'00' |
---|---|
Modification date | D:20201221173233+09'00' |
Pages | 2 |
Creator | Microsoft® Word 2019 |
Producer | Microsoft® Word 2019 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Hash functions
SHA-1, SHA-256, SHA-384, SHA-512Protocols
IPsecRandomness
DRBGBlock cipher modes
CBC, CTRVendor
MicrosoftClaims
D.USER, D.TSF, T.UNAUTHORIZED_ACCESS, T.TSF_COMPROMISE, T.TSF_FAILURE, T.UNAUTHORIZED_UPDATE, T.NET_COMPROMISE, A.PHYSICAL, A.NETWORK, A.TRUSTED_ADMIN, A.TRAINED_USERSSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_RBG_EXT.1Certificates
JISEC-CC-CRP-C0692-01-2020Evaluation facilities
ECSEC LaboratorySide-channel analysis
malfunctionStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Creation date | D:20210113133158+09'00' |
---|---|
Modification date | D:20210113133310+09'00' |
Pages | 32 |
Creator | Microsoft® Word 2019 |
Producer | Microsoft® Word 2019 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES-256, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
RSA-2048, RSA-3072, ECDSA, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA-512, SHA-384Protocols
SSH, TLS, IKEv1, IKEv2, IKE, IPsecRandomness
DRBG, RBGBlock cipher modes
CBC, CTRVendor
MicrosoftClaims
D.USER, D.TSF, O.AUDIT, O.COMMS_PROTECTION, O.STORAGE_ENCRYPTION, O.PURGE_DATA, O.UPDATE_VERIFICATION, O.ACCESS_CONTROL, O.USER_AUTHORIZATION, O.ADMIN_ROLES, O.ACCESS, O.TSF_SELF_TEST, O.FAX_NET_SEPARATION, T.UNAUTHORIZED_ACCESS, T.TSF_COMPROMISE, T.TSF_FAILURE, T.UNAUTHORIZED_UPDATE, T.NET_COMPROMISE, A.PHYSICAL, A.NETWORK, A.TRUSTED_ADMIN, A.TRAINED_USERS, OE.PHYSICAL_PROTECTION, OE.NETWORK_PROTECTION, OE.ADMIN_TRUST, OE.USER_TRAINING, OE.ADMIN_TRAININGSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_CKM_EXT, FAU_STG_EXT.1, FAU_GEN, FAU_GEN.1, FAU_STG_EXT.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FCS_RBG_EXT, FCS_CKM_EXT, FCS_CKM_EXT.4, FCS_CKM.1, FCS_CKM.4, FCS_CKM_EXT.4.1, FCS_COP.1, FCS_RBG_EXT.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM.2, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_TLS_EXT.1, FCS_SSH_EXT.1, FCS_SNI_EXT.1.1, FDP_FXS_EXT, FDP_FXS_EXT.1, FDP_FXS_EXT.1.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_PMG_EXT, FIA_PSK_EXT, FIA_PSK_EXT.1, FIA_PMG_EXT.1, FIA_PMG_EXT.1.1, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.1.3, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_SKP_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_SKP_EXT.1, FPT_SKP_EXT.1.1, FPT_TST_EXT.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM.1, FPT_STM.1.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Side-channel analysis
malfunctionStandards
FIPS PUB 197, FIPS PUB 186-4, FIPS PUB 198-1, FIPS PUB 180-3, NIST SP 800-90A, NIST SP 800-38A, PKCS #1, RFC 4301, RFC 4303, RFC 3602, RFC 4106, RFC 4109, RFC 4304, RFC 4868, RFC 5282, RFC3602, RFC 2407, ISO/IEC 18031:2011, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Title | Microsoft Word - 公開用【C0692】[英] ASE_EagleZ+-2.00-201102_修正2.docx |
---|---|
Author | e08884 |
Creation date | D:20210108123203+09'00' |
Modification date | D:20210108123203+09'00' |
Pages | 71 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 15.0 (Windows) |
Heuristics ?
Certificate ID: JISEC-CC-CRP-C0692-01-2020
Extracted SARs
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1, ATE_IND.1, AVA_VAN.1CPE matches
Similar certificates
Showing 5 out of 19.
Scheme data ?
Cert Id | JISEC-CC-CRP-C0835 | |
---|---|---|
Supplier | KONICA MINOLTA, INC. | |
Toe Overseas Name | KONICA MINOLTA bizhub C751i / AccurioPrint C751i with FK-514, DEVELOP ineo+ 751i with FK-514 G00-RB | |
Expiration Date | 01.11.2029 | |
Claim | PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015) | |
Certification Date | 01.11.2024 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0835_it4885.html | |
Toe Japan Name | KONICA MINOLTA bizhub C751i / AccurioPrint C751i with FK-514, DEVELOP ineo+ 751i with FK-514 G00-RB | |
Enhanced | ||
Product | KONICA MINOLTA bizhub C751i / AccurioPrint C751i with FK-514, DEVELOP ineo+ 751i with FK-514 | |
Toe Version | G00-RB | |
Product Type | Multi-Function Printer | |
Cert Id | JISEC-CC-CRP-C0835 | |
Certification Date | 19.11.2024 | |
Expiration Date | 19.11.2029 | |
Cc Version | 3.1 Release5 | |
Assurance Level | ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1 | |
Protection Profile | Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553) | |
Vendor | KONICA MINOLTA, INC. | |
Evaluation Facility | ECSEC Laboratory Inc., Evaluation Center | |
Description | PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE security functionality The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function |
References ?
No references are available for this certificate.
Updates ?
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'JISEC-CC-CRP-C0835', 'toe_overseas_name': 'KONICA MINOLTA bizhub C751i / AccurioPrint C751i with FK-514, DEVELOP ineo+ 751i with FK-514 G00-RB', 'expiration_date': '2029-11-01', 'certification_date': '2024-11-01', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0835_it4885.html', 'toe_japan_name': 'KONICA MINOLTA bizhub C751i / AccurioPrint C751i with FK-514, DEVELOP ineo+ 751i with FK-514 G00-RB', 'enhanced': {'__update__': {'product': 'KONICA MINOLTA bizhub C751i / AccurioPrint C751i with FK-514, DEVELOP ineo+ 751i with FK-514', 'toe_version': 'G00-RB', 'cert_id': 'JISEC-CC-CRP-C0835', 'certification_date': '2024-11-19', 'expiration_date': '2029-11-19'}}}
data.
- The scheme_data property was updated, with the
-
02.12.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name KONICA MINOLTA bizhub C750i/AccurioPrint C750i with FK-514, DEVELOP ineo+ 750i with FK-514G00-33 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Multi-Function Devices",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0692_eimg.pdf",
"dgst": "3cbf8ae938176613",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0692-01-2020",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:konicaminolta:bizhub_c750i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_750i:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"33",
"514"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0835",
"certification_date": "2024-11-01",
"claim": "PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)",
"enhanced": {
"assurance_level": "ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1",
"cc_version": "3.1 Release5",
"cert_id": "JISEC-CC-CRP-C0835",
"certification_date": "2024-11-19",
"description": "PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE security functionality The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function",
"evaluation_facility": "ECSEC Laboratory Inc., Evaluation Center",
"expiration_date": "2029-11-19",
"product": "KONICA MINOLTA bizhub C751i / AccurioPrint C751i with FK-514, DEVELOP ineo+ 751i with FK-514",
"product_type": "Multi-Function Printer",
"protection_profile": "Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)",
"toe_version": "G00-RB",
"vendor": "KONICA MINOLTA, INC."
},
"expiration_date": "2029-11-01",
"supplier": "KONICA MINOLTA, INC.",
"toe_japan_name": "KONICA MINOLTA bizhub C751i / AccurioPrint C751i with FK-514, DEVELOP ineo+ 751i with FK-514 G00-RB",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0835_it4885.html",
"toe_overseas_name": "KONICA MINOLTA bizhub C751i / AccurioPrint C751i with FK-514, DEVELOP ineo+ 751i with FK-514 G00-RB"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "KONICA MINOLTA, INC.",
"manufacturer_web": "https://www.konicaminolta.com/index.html",
"name": "KONICA MINOLTA bizhub C750i/AccurioPrint C750i with FK-514, DEVELOP ineo+ 750i with FK-514G00-33",
"not_valid_after": "2025-11-24",
"not_valid_before": "2020-11-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "c0692_eimg.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"JISEC-CC-CRP-C0692-01-2020": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ECSEC": {
"ECSEC Laboratory": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20201221173023+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/ModDate": "D:20201221173233+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"pdf_file_size_bytes": 81421,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 2
},
"report_filename": "c0692_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"JISEC-CC-CRP-C0692-01-2020": 1
}
},
"cc_claims": {
"A": {
"A.NETWORK": 1,
"A.PHYSICAL": 1,
"A.TRAINED_USERS": 1,
"A.TRUSTED_ADMIN": 1
},
"D": {
"D.TSF": 3,
"D.USER": 3
},
"T": {
"T.NET_COMPROMISE": 1,
"T.TSF_COMPROMISE": 1,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNAUTHORIZED_UPDATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FCS": {
"FCS_RBG_EXT.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CTR": {
"CTR": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ECSEC": {
"ECSEC Laboratory": 4
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"constructions": {
"MAC": {
"HMAC": 1,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20210113133158+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/ModDate": "D:20210113133310+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"pdf_file_size_bytes": 394164,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 32
},
"st_filename": "c0692_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 5,
"Diffie-Hellman": 4
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA-2048": 1,
"RSA-3072": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NETWORK": 1,
"A.PHYSICAL": 1,
"A.TRAINED_USERS": 1,
"A.TRUSTED_ADMIN": 1
},
"D": {
"D.TSF": 3,
"D.USER": 31
},
"O": {
"O.ACCESS": 1,
"O.ACCESS_CONTROL": 6,
"O.ADMIN_ROLES": 4,
"O.AUDIT": 5,
"O.COMMS_PROTECTION": 11,
"O.FAX_NET_SEPARATION": 1,
"O.PURGE_DATA": 2,
"O.STORAGE_ENCRYPTION": 4,
"O.TSF_SELF_TEST": 1,
"O.UPDATE_VERIFICATION": 2,
"O.USER_AUTHORIZATION": 7
},
"OE": {
"OE.ADMIN_TRAINING": 1,
"OE.ADMIN_TRUST": 1,
"OE.NETWORK_PROTECTION": 1,
"OE.PHYSICAL_PROTECTION": 1,
"OE.USER_TRAINING": 1
},
"T": {
"T.NET_COMPROMISE": 1,
"T.TSF_COMPROMISE": 1,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNAUTHORIZED_UPDATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_CKM_EXT": 2,
"FAU_GEN": 10,
"FAU_GEN.1": 8,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 3,
"FAU_GEN.2.1": 1,
"FAU_STG_EXT": 3,
"FAU_STG_EXT.1": 5,
"FAU_STG_EXT.1.1": 2
},
"FCS": {
"FCS_CKM.1": 33,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 2,
"FCS_CKM.4": 6,
"FCS_CKM.4.1": 1,
"FCS_CKM_EXT": 1,
"FCS_CKM_EXT.4": 16,
"FCS_CKM_EXT.4.1": 2,
"FCS_COP.1": 55,
"FCS_COP.1.1": 4,
"FCS_RBG_EXT": 2,
"FCS_RBG_EXT.1": 17,
"FCS_RBG_EXT.1.1": 2,
"FCS_RBG_EXT.1.2": 2,
"FCS_SNI_EXT.1.1": 1,
"FCS_SSH_EXT.1": 6,
"FCS_TLS_EXT.1": 6
},
"FDP": {
"FDP_ACC.1": 7,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_FXS_EXT": 2,
"FDP_FXS_EXT.1": 6,
"FDP_FXS_EXT.1.1": 2,
"FDP_IFC.1": 1,
"FDP_ITC.1": 3,
"FDP_ITC.2": 3
},
"FIA": {
"FIA_AFL.1": 3,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_PMG_EXT": 2,
"FIA_PMG_EXT.1": 6,
"FIA_PMG_EXT.1.1": 2,
"FIA_PSK_EXT": 2,
"FIA_PSK_EXT.1": 9,
"FIA_PSK_EXT.1.1": 2,
"FIA_PSK_EXT.1.2": 2,
"FIA_PSK_EXT.1.3": 2,
"FIA_UAU.1": 8,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.7": 3,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 10,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 3,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 3,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 5,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 5,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 3,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_SKP_EXT": 2,
"FPT_SKP_EXT.1": 6,
"FPT_SKP_EXT.1.1": 2,
"FPT_STM.1": 6,
"FPT_STM.1.1": 1,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.1": 6,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD_EXT": 2,
"FPT_TUD_EXT.1": 7,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.1.3": 3
},
"FTA": {
"FTA_SSL.3": 3,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 9,
"FTP_ITC.1.1": 2,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 8,
"FTP_TRP.1.1": 3,
"FTP_TRP.1.2": 2,
"FTP_TRP.1.3": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CTR": {
"CTR": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 5,
"IKEv1": 14,
"IKEv2": 3
},
"IPsec": {
"IPsec": 74
},
"SSH": {
"SSH": 3
},
"TLS": {
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-256": 15,
"SHA-384": 6,
"SHA-512": 9
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 7
},
"RNG": {
"RBG": 6
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS PUB 180-3": 2,
"FIPS PUB 186-4": 5,
"FIPS PUB 197": 2,
"FIPS PUB 198-1": 2
},
"ISO": {
"ISO/IEC 18031:2011": 3
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-90A": 3
},
"PKCS": {
"PKCS #1": 2
},
"RFC": {
"RFC 2407": 1,
"RFC 3602": 7,
"RFC 4106": 2,
"RFC 4109": 2,
"RFC 4301": 3,
"RFC 4303": 3,
"RFC 4304": 3,
"RFC 4868": 5,
"RFC 5282": 1,
"RFC3602": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7,
"AES-256": 2
}
},
"constructions": {
"MAC": {
"HMAC": 6,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "e08884",
"/CreationDate": "D:20210108123203+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20210108123203+09\u002700\u0027",
"/Producer": "Acrobat Distiller 15.0 (Windows)",
"/Title": "Microsoft Word - \u516c\u958b\u7528\u3010C0692\u3011[\u82f1] ASE_EagleZ+-2.00-201102_\u4fee\u6b632.docx",
"pdf_file_size_bytes": 912731,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 71
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": {
"_type": "Set",
"elements": [
"PP_HCD_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/c0553_pp.pdf",
"pp_name": "Protection Profile for Hardcopy Devices"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0692_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0692_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "70f87ebbee9cdb79ddf6def01b544ee62869f0c7a727a176ade86e8fc490cd58",
"txt_hash": "120ceee78d9698fcba1294ff8a3e5565964aebe7974c9a4b3e4c1c89f4112338"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "48375607e9fea09d36ce40d65b1ed9b7f573e3a020c20b9a373a33a5ab63ac15",
"txt_hash": "77d83e170b865a425627dd10dccacab70010d56189de10a15231c7857148ef0b"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2a97aeea6d472fb43e07d3fda2b6141a54b834e1d104a07953b409a9d63f422d",
"txt_hash": "869804456639cd53f45379f801ab9dfe08c1b516554a5fefb77d4ffc06c260af"
}
},
"status": "active"
}