TASKalfa MZ4000i, TASKalfa MZ3200i, TASKalfa M30040i, TASKalfa M30032i (KYOCERA), CS MZ4000i, CS MZ3200i (Copystar), 4063i, 3263i (TA Triumph Adler/UTAX) with Hard Disk and FAX System

CSV information ?

Status active
Valid from 16.03.2023
Valid until 16.03.2028
Scheme 🇸🇪 SE
Manufacturer KYOCERA Document Solutions Inc.
Category Multi-Function Devices
Security level EAL2+, ALC_FLR.2

Heuristics summary ?

Certificate ID: CSEC2022005

Certificate ?

Extracted keywords

Trusted Execution Environments
SE

Security level
EAL 2
Security Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2
Certificates
CSEC2022005
Evaluation facilities
Combitech AB

File metadata

Creation date D:20230320142725+01'00'
Modification date D:20230323121907+01'00'
Pages 1
Creator RICOH MP C4504ex
Producer RICOH MP C4504ex

Certification report ?

Extracted keywords

Protocols
TLS, IKE

Security level
EAL 2, EAL 2 augmented
Claims
T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMIN
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, AGD_OPE.1, ALC_FLR.2, ALC_CMC.2, ALC_DEL.1, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_SPD.1, ASE_ECD.1, ASE_TSS.1
Certificates
CSEC2022005
Evaluation facilities
Combitech AB

Standards
ISO/IEC 17025, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Certification Report - Kyocera TASKalfa MZ4000i, MZ3200i 2600PP
Subject 22FMV4136-23
Author Jerry Johansson
Creation date D:20230316160943+01'00'
Modification date D:20230323121814+01'00'
Pages 20
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Security target ?

Extracted keywords

Symmetric Algorithms
AES, 3DES, HMAC, HMAC-SHA-256, HMAC-SHA-384
Asymmetric Algorithms
RSA 2048, ECDHE, DHE, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512
Protocols
SSL, SSLv1.0, SSLv2.0, SSLv3.0, TLS, TLSv1.2, TLSv1.3, TLS 1.2, TLSv1.0, TLSv1.1, IKEv1, IPsec
Randomness
DRBG
Libraries
OpenSSL
Block cipher modes
CBC, GCM, XTS
TLS cipher suites
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_CHACHA20_POLY1305, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA

Vendor
Microsoft

Security level
EAL2, EAL 2
Claims
D.DOC, D.FUNC, D.PROT, D.CONF, O.HDD, O.AUDIT_STORAGE, O.AUDIT_ACCESS, O.DOC, O.FUNC, O.PROT, O.CONF, O.USER, O.INTERFACE, O.SOFTWARE, O.AUDIT, T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMIN, OE.AUDIT_STORAGE, OE.AUDIT_ACCESS, OE.PHYSICAL, OE.USER, OE.ADMIN, OE.AUDIT, OE.INTERFACE, OE.PHYISCAL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_STG.1, FAU_SAR.2, FAU_STG.4, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.4.1, FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACF.1.3, FDP_IFF, FDP_IFC, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_RIP.1.1, FDP_IFC.1, FDP_ACF, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.7, FIA_USB.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FDI_EXP, FPT_STM.1, FPT_TST.1, FPT_FDI_EXP.1, FPT_FDI_EXP.1.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3

Side-channel analysis
malfunction

Standards
FIPS 186-4, FIPS 197, FIPS PUB 197, FIPS 180-4, FIPS 46-3, FIPS PUB 180-4, SP 800-135, SP 800-67, PKCS #1, RFC8439, RFC 2409, RFC 5114, RFC2104, RFC5246, RFC8446, RFC5289, RFC7905, RFC5288, RFC2409

File metadata

Title Security Target
Subject ISO15408認証対応資料
Author KDC
Creation date D:20230309175721+01'00'
Modification date D:20230323121719+01'00'
Pages 107
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics ?

Certificate ID: CSEC2022005

Extracted SARs

ALC_DEL.1, ALC_CMS.2, ASE_ECD.1, ATE_COV.1, ASE_SPD.1, ASE_CCL.1, ATE_IND.2, ASE_TSS.1, ALC_CMC.2, ASE_INT.1, AGD_OPE.1, ALC_FLR.2, ADV_ARC.1, ATE_FUN.1, AGD_PRE.1, ADV_FSP.2, ASE_OBJ.2, ADV_TDS.1, AVA_VAN.2, ASE_REQ.2

Similar certificates

Name Certificate ID
TASKalfa MZ4000i, TASKalfa MZ3200i, TASKalfa M30040i, TASKalfa M30032i (KYOCERA), 4063i , 3263i (TA Triumph Adler/UTAX) with FAX System CSEC2022003 Compare
TASKalfa 6052ci, TASKalfa 5052ci, TASKalfa 4052ci, TASKalfa 3552ci, TASKalfa 6052ciG, TASKalfa 5052ciG, TASKalfa 4052ciG(KYOCERA), CS 6052ci, CS 5052ci, CS 4052ci, CS 3552ci(Copystar), 6006ci, 5006ci, 4006ci(TA Triumph-Adler/UTAX) all of the above with Data Security Kit (E), FAX System 12 System: 2ND_20IS.C01.010HS Panel: 2ND_70IS.CI1.010 FAX: 3R2_5100.002.005 JISEC-CC-CRP-C0549 Compare
TASKalfa 6002i, TASKalfa 5002i, TASKalfa 4002i, TASKalfa 6002iG, TASKalfa 5002iG, TASKalfa 4002iG(KYOCERA), CS 6002i, CS 5002i, CS 4002i(Copystar), 6056i, 5056i, 4056i(TA Triumph-Adler/UTAX) all of the above with Data Security Kit (E), FAX System 12 System: 2NK_20IS.C01.010HS Panel: 2ND_70IS.CI1.010 FAX: 3R2_5100.002.005 JISEC-CC-CRP-C0548 Compare
KYOCERA TASKalfa 7054ci/6054ci/5054ci/4054ci/7054ciG/6054ciG/5054ciG/4054ciG, Copystar CS 7054ci/6054ci/CS 5054ci/CS 4054ci, TA Triumph-Adler 7008ci/6008ci/5008ci/4008ci UTAX 7008ci/6008ci/5008ci/4008ci with Hard Disk and FAX System CSEC2020010 Compare
KYOCERA TASKalfa 508ci, TASKalfa 408ci, TASKalfa 408ciG (KYOCERA), CS 508ci , CS 408ci ( Copystar), 502ci , 402ci (TA Triumph Adler/UTAX) UTAX), with FAX System CSEC2019010 Compare
KYOCERA TASKalfa 9003i, TASKalfa 8003i, TASKalfa 7003i, TASKalfa 9003iG, TASKalfa 7003iG(KYOCERA), CS 9003i, CS 8003i, CS 7003i(Copystar), 8057i, 7057i(TA Triumph-Adler/UTAX), with FAX System CSEC2019012 Compare
TASKalfa 8052ci, TASKalfa 7052ci, TASKalfa 8052ciG, TASKalfa 7052ciG(KYOCERA), CS 8052ci, CS 7052ci(Copystar), 8006ci, 7006ci(TA Triumph-Adler/UTAX) all of the above with Data Security Kit (E), FAX System 12 System: 2NH_20IS.C01.010HS Panel: 2ND_70IS.CM1.010 FAX: 3R2_5100.002.005 JISEC-CC-CRP-C0555 Compare
TASKalfa 8002i, TASKalfa 7002i, TASKalfa 8002iG, TASKalfa 7002iG(KYOCERA), CS 8002i, CS 7002i(Copystar), 8056i, 7056i(TA Triumph-Adler/UTAX) all of the above with Data Security Kit (E), FAX System 12 System: 2NJ_20IS.C01.010HS Panel: 2ND_70IS.CM1.010 FAX: 3R2_5100.002.005 JISEC-CC-CRP-C0554 Compare
TASKalfa 356ci, TASKalfa 406ci, TASKalfa 356ciG, TASKalfa 406ciG(KYOCERA), CS 356ci, CS 406ci(Copystar), 350ci, 400ci(TA Triumph-Adler/UTAX) all of the above with HD11, Data Security Kit (E) and FAX System 10 System:2R6_20IS.C01.011H Panel:2R6_70IS.C01.010 FAX:3R2_5100.001.009 JISEC-CC-CRP-C0531 Compare
TASKalfa 3252ci, TASKalfa 2552ci, TASKalfa 3252ciG, TASKalfa 2552ciG(KYOCERA), CS 3252ci, CS 2552ci(Copystar), 3206ci, 2506ci(TA Triumph-Adler/UTAX) all of the above with HD-12, Data Security Kit (E), FAX System 12 System: 2RL_20IS.C01.010HS Panel: 2ND_70IS.C01.010 FAX: 3R2_5100.002.005 JISEC-CC-CRP-C0540 Compare
TASKalfa 3511i, TASKalfa 3011i, TASKalfa 3511iG, TASKalfa 3011iG(KYOCERA), CS 3511i, CS 3011i(Copystar), 3561i, 3061i (TA Triumph-Adler/UTAX) all of the above with HD-12, Data Security Kit (E), FAX System 12 System: 2RH_20IS.C01.010HS Panel: 2ND_70IS. CT1.010 FAX: 3R2_5100.002.005 JISEC-CC-CRP-C0542 Compare
KYOCERA TASKalfa 8353ci, TASKalfa 7353ci, TASKalfa 8353ciG(KYOCERA), CS 8353ci, CS 7353ci(Copystar), 8307ci, 7307ci(TA Triumph-Adler/UTAX), with FAX System CSEC2019011 Compare
KYOCERA TASKalfa 3554ci/2554ci/3554ciG/2554ciG, Copystar CS 3554ci/2554ci, TA Triumph-Adler 3508ci/2508ci, UTAX 3508ci/2508ci with Hard Disk and FAX System CSEC2020008 Compare
KYOCERA TASKalfa 7004i/6004i/5004i/4004 i/7004iG/6004iG/5004iG, Copystar CS 7004i/6004i/5004i/4004i, TA Triumph-Adler 7058i/6058i/5058i, UTAX 7058i/6058i/5058i with Hard Disk and FAX System CSEC2020012 Compare
KYOCERA TASKalfa 358ci (KYOCERA), CS 358ci (352ci (TA Triumph Adler/UTAX), with Hard Disk and FAX System CSEC2019009 Compare
Kyocera TASKalfa 7004i, 6004i, 5004i, 4004i, 7004iG, 6004iG, and 5004iG. Copystar CS 7004i, CS 6004i, CS 5004i, and CS 4004i. Triumph Adler/UTAX 7058i, 6058i, and 5058i with Hard Disk, FAX, and Data Security Kit and with the following firmware:System firmware 2XF_S000.002.333FAX firmware 3R2_5100.003.012 CSEC2021005 Compare
Kyocera TASKalfa 7054ci, 6054ci, 5054ci, 4054ci, 7054ciG, 6054ciG, 5054ciG,and 4054ciG, Copystar: CS 7054ci, CS 6054ci, CS 5054ci, and CS 4054ci. Triumph Adler/UTAX 7008ci, 6008ci, 5008ci, and 4008ci with Hard Disk, FAX, and Data Security Kit and with the following firmware:System firmware 2XC_S000.002.333FAX firmware 3R2_5100.003.012 CSEC2021006 Compare
Kyocera TASKalfa 3554ci, 2554ci, 3554ciG, 2554ciG,Copystar CS 3554ci, CS 2554ci, Triumph Adler/UTAX 3508ci, and 2508ci with Hard Disk, FAX, and Data Security Kit with the following firmware:System firmware 2XD_S000.002.266FAX firmware 3R2_5100.003.012 CSEC2021004 Compare
KYOCERA TASKalfa 3253ci/2553ci/3253ciG/2553ciG Copystar CS 3253ci/2553ci TA Triumph-Adler 3207ci/2507ci UTAX 3207ci/2507ci with HDD and FAX System CSEC2018011 Compare
KYOCERA TASKalfa 6003i/5003i/4003i/6003iG/5003iG Copystar CS 6003i/5003i/4003i TA Triumph-Adler 6057i/5057i UTAX 6057i/5057i with FAX System CSEC2018010 Compare
KYOCERA TASKalfa 6053ci/5053ci/4053ci/3553ci/6053ciG/5053ciG/4053ciG Copystar CS 6053ci/5053ci/4053ci/3553ci TA Triumph-Adler 6007ci/5007ci/4007ci UTAX 6007ci/5007ci/4007ci with FAX System CSEC2018009 Compare
Kyocera ECOSYS MA4000cifx/MA4000cifxG/ MA3500cifx/MA3500cifxG, Kyocera TASKalfa MA4500ci/MA3500ci, Copystar CS MA4500ci, TA Triumph Adler P-C4067i MFP/P3567i MFP/458ci/358ci, UTAX P-C4067i MFP/P3567i MFP/458ci/358ci with SSD and with system firmware: 2Z7_S0IS.C03.002: CSEC2021010 Compare
Kyocera TASKalfa PA4500ci, Copystar CS PA4500ci, TA Triumph-Adler P458ci, UTAX P458ci with SSD and with system firmware: 2Z2_S0IS.C03.002 CSEC2021011 Compare
KYOCERA TASKalfa 3554ci/2554ci/3554ciG/2554ciG, TA Triumph-Adler 3508ci/2508ci, UTAX 3508ci/2508ci with FAX System CSEC2020009 Compare
KYOCERA TASKalfa 3253ci/2553ci/3253ciG/2553ciG TA Triumph-Adler 3207ci/2507ci UTAX 3207ci/2507ci with FAX System CSEC2018012 Compare
KYOCERA TASKalfa 7004i/6004i/5004i/7004iG/6004iG/5004iG,TA Triumph-Adler 7058i/6058i/5058i, UTAX 7058i/6058i/5058i with FAX System CSEC2020013 Compare
KYOCERA TASKalfa 7054ci/6054ci/5054ci/4054ci/7054ciG/6054ciG/5054ciG/4054ciG, TA Triumph-Adler 7008ci/6008ci/5008ci/4008ci UTAX 7008ci/6008ci/5008ci/4008ci with FAX System CSEC2020011 Compare
TASKalfa MZ4000i, TASKalfa MZ3200i Series with Hard Disk, FAX System and Data Security Kit CSEC2022004 Compare
Showing 5 out of 28.

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b740486236794310faa6e52c42f7220c6226f4cec47e43cb967633f86917879d', 'txt_hash': '0ba938dbb8ca0f5eaba4af662ae5760c42b06e3e33321c317bf78413f19184b5'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7b940da8fa53d97046cf06a949537a729c2584d63221fc0b43fc6e1dd2c27355', 'txt_hash': 'c0dcaf56dce79fdda0bd13bba727cd7ee51834dd528cef41c9e2b33f716a5e49'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2018164, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 107, '/Author': 'KDC', '/CreationDate': "D:20230309175721+01'00'", '/Creator': 'Microsoft® Word 2016', '/ModDate': "D:20230323121719+01'00'", '/Producer': 'Microsoft® Word 2016', '/Subject': 'ISO15408認証対応資料', '/Title': 'Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://sd-portal.km.local/technical/SDSecurity/DocLib3/014製åfi†éŒ‰çŽº/Iris2/錉玺/01.ASE_Security_Target/20190716_v100/ST_E_TASKalfa3253ci_2553ci_HDD.doc#_Toc15487575', 'http://sd-portal.km.local/technical/SDSecurity/DocLib3/014製åfi†éŒ‰çŽº/Iris2/錉玺/01.ASE_Security_Target/20190716_v100/ST_E_TASKalfa3253ci_2553ci_HDD.doc#_Toc15487576', 'http://sd-portal.km.local/technical/SDSecurity/DocLib3/014製åfi†éŒ‰çŽº/Iris2/錉玺/01.ASE_Security_Target/20190716_v100/ST_E_TASKalfa3253ci_2553ci_HDD.doc#_Toc15487577']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 1004687, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20230320142725+01'00'", '/Creator': 'RICOH MP C4504ex', '/ModDate': "D:20230323121907+01'00'", '/Producer': 'RICOH MP C4504ex', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL 2': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 12, 'FAU_GEN.2': 9, 'FAU_SAR.1': 12, 'FAU_STG.1': 12, 'FAU_SAR.2': 10, 'FAU_STG.4': 10, 'FAU_GEN': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_CKM.1': 45, 'FCS_COP.1': 44, 'FCS_CKM.2': 3, 'FCS_CKM.4': 13, 'FCS_CKM.1.1': 3, 'FCS_COP.1.1': 3}, 'FDP': {'FDP_ACC.1': 28, 'FDP_ACF.1': 23, 'FDP_RIP.1': 9, 'FDP_ACF.1.3': 1, 'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_ITC.1': 3, 'FDP_ITC.2': 3, 'FDP_ACC.1.1': 2, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 2, 'FDP_ACF': 1}, 'FIA': {'FIA_AFL.1': 11, 'FIA_ATD.1': 10, 'FIA_SOS.1': 11, 'FIA_UAU.7': 11, 'FIA_USB.1': 9, 'FIA_UAU.1': 11, 'FIA_UID.1': 21, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA.1': 26, 'FMT_MSA.3': 24, 'FMT_MTD.1': 19, 'FMT_SMF.1': 24, 'FMT_SMR.1': 24, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FDI_EXP': 3, 'FPT_STM.1': 11, 'FPT_TST.1': 9, 'FPT_FDI_EXP.1': 14, 'FPT_FDI_EXP.1.1': 2, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3': 10, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 14, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.DOC': 41, 'D.FUNC': 20, 'D.PROT': 14, 'D.CONF': 16}, 'O': {'O.HDD': 11, 'O.AUDIT_STORAGE': 11, 'O.AUDIT_ACCESS': 11, 'O.DOC': 18, 'O.FUNC': 9, 'O.PROT': 9, 'O.CONF': 18, 'O.USER': 15, 'O.INTERFACE': 9, 'O.SOFTWARE': 9, 'O.AUDIT': 9}, 'T': {'T.DOC': 6, 'T.FUNC': 3, 'T.PROT': 3, 'T.CONF': 6}, 'A': {'A.ACCESS': 3, 'A.USER': 3, 'A.ADMIN': 6}, 'OE': {'OE.AUDIT_STORAGE': 3, 'OE.AUDIT_ACCESS': 3, 'OE.PHYSICAL': 3, 'OE.USER': 14, 'OE.ADMIN': 8, 'OE.AUDIT': 4, 'OE.INTERFACE': 4, 'OE.PHYISCAL': 2}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'3DES': {'3DES': 5}}, 'constructions': {'MAC': {'HMAC': 1, 'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1}, 'ECC': {'ECDH': {'ECDHE': 2}}, 'FF': {'DH': {'DHE': 2, 'Diffie-Hellman': 4, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1, 'SSLv1.0': 1, 'SSLv2.0': 1, 'SSLv3.0': 1}, 'TLS': {'TLS': 16, 'TLSv1.2': 2, 'TLSv1.3': 3, 'TLS 1.2': 1, 'TLSv1.0': 1, 'TLSv1.1': 1}}, 'IKE': {'IKEv1': 7}, 'IPsec': {'IPsec': 6}}, 'randomness': {'PRNG': {'DRBG': 2}}, 'cipher_mode': {'CBC': {'CBC': 3}, 'GCM': {'GCM': 1}, 'XTS': {'XTS': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384': 1, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305': 1, 'TLS_DHE_RSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_DHE_RSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_DHE_RSA_WITH_CHACHA20_POLY1305': 1, 'TLS_RSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_RSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA256': 1, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA': 1}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-4': 2, 'FIPS 197': 3, 'FIPS PUB 197': 3, 'FIPS 180-4': 3, 'FIPS 46-3': 1, 'FIPS PUB 180-4': 1}, 'NIST': {'SP 800-135': 3, 'SP 800-67': 1}, 'PKCS': {'PKCS #1': 1}, 'RFC': {'RFC8439': 3, 'RFC 2409': 2, 'RFC 5114': 1, 'RFC2104': 2, 'RFC5246': 11, 'RFC8446': 2, 'RFC5289': 4, 'RFC7905': 2, 'RFC5288': 4, 'RFC2409': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'SE': {'CSEC2022005': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 2}}, 'cc_sar': {'ALC': {'ALC_FLR': 1, 'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Combitech': {'Combitech AB': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to ST_TASKalfaMZ4000i_HDD_100.pdf.
    • The cert_filename property was set to CCRA cert TASKalfa4 2600PP.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '82fc07cbb2f37c7a86e4389b3bef7bcdbfaeb61de52549ed40938ccb7f39ba35', 'txt_hash': '9258cd6007dd3316d5aa61e8b13273fa4a2f622151bb481393910cb81004fbb2'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 460207, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 20, '/Author': 'Jerry Johansson', '/CreationDate': "D:20230316160943+01'00'", '/Creator': 'Microsoft® Word 2016', '/ModDate': "D:20230323121814+01'00'", '/Producer': 'Microsoft® Word 2016', '/Subject': '22FMV4136-23', '/Title': 'Certification Report - Kyocera TASKalfa MZ4000i, MZ3200i 2600PP', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'SE': {'CSEC2022005': 21}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 2, 'EAL 2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1}, 'ALC': {'ALC_FLR.2': 2, 'ALC_CMC.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_SPD.1': 1, 'ASE_ECD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DOC': 2, 'T.FUNC': 1, 'T.PROT': 1, 'T.CONF': 2}, 'A': {'A.ACCESS': 1, 'A.USER': 1, 'A.ADMIN': 2}}, 'vendor': {}, 'eval_facility': {'Combitech': {'Combitech AB': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}, 'IKE': {'IKE': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to Certification Report TASKalfa4_2600.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CSEC2022005.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20TASKalfa4_2600.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_TASKalfaMZ4000i_HDD_100.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name TASKalfa MZ4000i, TASKalfa MZ3200i, TASKalfa M30040i, TASKalfa M30032i (KYOCERA), CS MZ4000i, CS MZ3200i (Copystar), 4063i, 3263i (TA Triumph Adler/UTAX) with Hard Disk and FAX System was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Multi-Function Devices",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20cert%20TASKalfa4%202600PP.pdf",
  "dgst": "4a5e3aea8e2e5945",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CSEC2022005",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "KYOCERA Document Solutions Inc.",
  "manufacturer_web": "https://www.kyoceradocumentsolutions.com/",
  "name": "TASKalfa MZ4000i, TASKalfa MZ3200i, TASKalfa M30040i, TASKalfa M30032i (KYOCERA), CS MZ4000i, CS MZ3200i (Copystar), 4063i, 3263i (TA Triumph Adler/UTAX) with Hard Disk and FAX System",
  "not_valid_after": "2028-03-16",
  "not_valid_before": "2023-03-16",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "CCRA cert TASKalfa4 2600PP.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "SE": {
          "CSEC2022005": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Combitech": {
          "Combitech AB": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20230320142725+01\u002700\u0027",
      "/Creator": "RICOH MP C4504ex",
      "/ModDate": "D:20230323121907+01\u002700\u0027",
      "/Producer": "RICOH MP C4504ex",
      "pdf_file_size_bytes": 1004687,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "Certification Report TASKalfa4_2600.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "SE": {
          "CSEC2022005": 21
        }
      },
      "cc_claims": {
        "A": {
          "A.ACCESS": 1,
          "A.ADMIN": 2,
          "A.USER": 1
        },
        "T": {
          "T.CONF": 2,
          "T.DOC": 2,
          "T.FUNC": 1,
          "T.PROT": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 2
        },
        "ASE": {
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 2,
          "EAL 2 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Combitech": {
          "Combitech AB": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Jerry Johansson",
      "/CreationDate": "D:20230316160943+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20230323121814+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "22FMV4136-23",
      "/Title": "Certification Report - Kyocera TASKalfa MZ4000i, MZ3200i 2600PP",
      "pdf_file_size_bytes": 460207,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 20
    },
    "st_filename": "ST_TASKalfaMZ4000i_HDD_100.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDHE": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "DHE": 2,
            "Diffie-Hellman": 4
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS": 3,
          "A.ADMIN": 6,
          "A.USER": 3
        },
        "D": {
          "D.CONF": 16,
          "D.DOC": 41,
          "D.FUNC": 20,
          "D.PROT": 14
        },
        "O": {
          "O.AUDIT": 9,
          "O.AUDIT_ACCESS": 11,
          "O.AUDIT_STORAGE": 11,
          "O.CONF": 18,
          "O.DOC": 18,
          "O.FUNC": 9,
          "O.HDD": 11,
          "O.INTERFACE": 9,
          "O.PROT": 9,
          "O.SOFTWARE": 9,
          "O.USER": 15
        },
        "OE": {
          "OE.ADMIN": 8,
          "OE.AUDIT": 4,
          "OE.AUDIT_ACCESS": 3,
          "OE.AUDIT_STORAGE": 3,
          "OE.INTERFACE": 4,
          "OE.PHYISCAL": 2,
          "OE.PHYSICAL": 3,
          "OE.USER": 14
        },
        "T": {
          "T.CONF": 6,
          "T.DOC": 6,
          "T.FUNC": 3,
          "T.PROT": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 5
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL2": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 12,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 9,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 12,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 10,
          "FAU_SAR.2.1": 1,
          "FAU_STG.1": 12,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 1,
          "FAU_STG.4": 10,
          "FAU_STG.4.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 45,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 3,
          "FCS_CKM.4": 13,
          "FCS_COP.1": 44,
          "FCS_COP.1.1": 3
        },
        "FDP": {
          "FDP_ACC.1": 28,
          "FDP_ACC.1.1": 2,
          "FDP_ACF": 1,
          "FDP_ACF.1": 23,
          "FDP_ACF.1.3": 1,
          "FDP_IFC": 1,
          "FDP_IFC.1": 2,
          "FDP_IFF": 1,
          "FDP_ITC.1": 3,
          "FDP_ITC.2": 3,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 11,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 11,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 11,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.7": 11,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 21,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 9,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA.1": 26,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 24,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MTD.1": 19,
          "FMT_MTD.1.1": 2,
          "FMT_SMF.1": 24,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 24,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FDI_EXP": 3,
          "FPT_FDI_EXP.1": 14,
          "FPT_FDI_EXP.1.1": 2,
          "FPT_STM.1": 11,
          "FPT_STM.1.1": 1,
          "FPT_TST.1": 9,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_SSL.3": 10,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 14,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "GCM": {
          "GCM": 1
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 2
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKEv1": 7
        },
        "IPsec": {
          "IPsec": 6
        },
        "TLS": {
          "SSL": {
            "SSL": 1,
            "SSLv1.0": 1,
            "SSLv2.0": 1,
            "SSLv3.0": 1
          },
          "TLS": {
            "TLS": 16,
            "TLS 1.2": 1,
            "TLSv1.0": 1,
            "TLSv1.1": 1,
            "TLSv1.2": 2,
            "TLSv1.3": 3
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-256": 3,
            "SHA-384": 3,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 180-4": 3,
          "FIPS 186-4": 2,
          "FIPS 197": 3,
          "FIPS 46-3": 1,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 197": 3
        },
        "NIST": {
          "SP 800-135": 3,
          "SP 800-67": 1
        },
        "PKCS": {
          "PKCS #1": 1
        },
        "RFC": {
          "RFC 2409": 2,
          "RFC 5114": 1,
          "RFC2104": 2,
          "RFC2409": 2,
          "RFC5246": 11,
          "RFC5288": 4,
          "RFC5289": 4,
          "RFC7905": 2,
          "RFC8439": 3,
          "RFC8446": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 14
          }
        },
        "DES": {
          "3DES": {
            "3DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_DHE_RSA_WITH_CHACHA20_POLY1305": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305": 1,
          "TLS_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA256": 1,
          "TLS_RSA_WITH_AES_256_GCM_SHA384": 1
        }
      },
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "KDC",
      "/CreationDate": "D:20230309175721+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20230323121719+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "ISO15408\u8a8d\u8a3c\u5bfe\u5fdc\u8cc7\u6599",
      "/Title": "Security Target",
      "pdf_file_size_bytes": 2018164,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://sd-portal.km.local/technical/SDSecurity/DocLib3/01\u00ef\u00bc\u201d\u00e8\u00a3\u00bd\u00e5\ufb01\u2020\u00e9\u0152\u2030\u00e7\u017d\u00ba/Iris2/\u00e9\u0152\u2030\u00e7\u017d\u00ba/01.ASE_Security_Target/20190716_v100/ST_E_TASKalfa3253ci_2553ci_HDD.doc#_Toc15487575",
          "http://sd-portal.km.local/technical/SDSecurity/DocLib3/01\u00ef\u00bc\u201d\u00e8\u00a3\u00bd\u00e5\ufb01\u2020\u00e9\u0152\u2030\u00e7\u017d\u00ba/Iris2/\u00e9\u0152\u2030\u00e7\u017d\u00ba/01.ASE_Security_Target/20190716_v100/ST_E_TASKalfa3253ci_2553ci_HDD.doc#_Toc15487576",
          "http://sd-portal.km.local/technical/SDSecurity/DocLib3/01\u00ef\u00bc\u201d\u00e8\u00a3\u00bd\u00e5\ufb01\u2020\u00e9\u0152\u2030\u00e7\u017d\u00ba/Iris2/\u00e9\u0152\u2030\u00e7\u017d\u00ba/01.ASE_Security_Target/20190716_v100/ST_E_TASKalfa3253ci_2553ci_HDD.doc#_Toc15487577"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 107
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0058b.pdf.pdf",
        "pp_name": "IEEE Standard Protection Profile for Hardcopy Devices in IEEE Std 2600-2008, Operational Environment ..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20TASKalfa4_2600.pdf",
  "scheme": "SE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_TASKalfaMZ4000i_HDD_100.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7b940da8fa53d97046cf06a949537a729c2584d63221fc0b43fc6e1dd2c27355",
      "txt_hash": "c0dcaf56dce79fdda0bd13bba727cd7ee51834dd528cef41c9e2b33f716a5e49"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "82fc07cbb2f37c7a86e4389b3bef7bcdbfaeb61de52549ed40938ccb7f39ba35",
      "txt_hash": "9258cd6007dd3316d5aa61e8b13273fa4a2f622151bb481393910cb81004fbb2"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b740486236794310faa6e52c42f7220c6226f4cec47e43cb967633f86917879d",
      "txt_hash": "0ba938dbb8ca0f5eaba4af662ae5760c42b06e3e33321c317bf78413f19184b5"
    }
  },
  "status": "active"
}