AR-FR22 VERSION S.10
CSV information ?
Status | archived |
---|---|
Valid from | 20.10.2005 |
Valid until | 07.10.2013 |
Scheme | 🇯🇵 JP |
Manufacturer | Sharp Corporation |
Category | Other Devices and Systems |
Security level | ADV_SPM.1, EAL3+ |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, RijndaelSecurity level
EAL3, EAL3 augmentedClaims
T.RECOVER, A.OPERATORSecurity Assurance Requirements (SAR)
ADV_SPM.1Certificates
CRP-C0033-01, Certification No. C0033Evaluation facilities
Information Technology Security CenterStandards
ISO/IEC 15408:1999, CCIMB-99-032, CCIMB-99-033, CCIMB-99-031File metadata
Title | Microsoft Word - IT認証5046-Certification Report-e.doc |
---|---|
Author | Administrator |
Creation date | D:20051124110544+09'00' |
Modification date | D:20051124110544+09'00' |
Pages | 23 |
Creator | PScript5.dll Version 5.2 |
Producer | Acrobat Distiller 6.0 (Windows) |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, RijndaelSecurity level
EAL3Claims
O.RESIDUAL, O.REMOVE, T.RECOVER, A.OPERATOR, OE.OPERATE, OE.ERASEALLSecurity Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_SPM.1, ADV_FSP.1, ADV_RCR.1, ADV_HLD.1, ADV_HLD.2, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1, AVA_MCU.1Security Functional Requirements (SFR)
FCS_CKM.4, FCS_CKM.1, FCS_COP.1, FCS_CKM.1.1, FCS_COP.1.1, FDP_ACC.1, FDP_RIP.1, FDP_RIP.1.1, FDP_IFC.1, FIA_AFL.1, FIA_UAU.2, FIA_UAU.7, FIA_UID.2, FIA_SOS.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_SOS.1.1, FMT_MSA.1, FMT_MOF.1, FMT_MSA.2, FMT_MTD.1, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA.2.1, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_RVM.1, FPT_RVM.1, FPT_RVM.1.1Standards
FIPS PUB 197, ISO/IEC 15408:1999, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
Creation date | D:20051124131743+09'00' |
---|---|
Modification date | D:20051124131743+09'00' |
Pages | 34 |
Producer | AntennaHouse PDF Driver 2.0.0-sn |
Heuristics ?
Extracted SARs
ATE_COV.2, ATE_DPT.1, AGD_ADM.1, AVA_SOF.1, ADV_FSP.1, ADV_HLD.2, AVA_VLA.1, ADV_SPM.1, AGD_USR.1, ATE_FUN.1, ATE_IND.2, ALC_DVS.1, AVA_MSU.1, ADV_RCR.1, AVA_MCU.1Scheme data ?
Cert Id | C0033 | |
---|---|---|
Supplier | Sharp Corporation | |
Toe Overseas Name | AR-FR22 VERSION S.10 | |
Expiration Date | 2013-10 | |
Claim | EAL3+ ADV_SPM.1 | |
Certification Date | 2005-10 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0033_it5046.html | |
Toe Japan Name | AR-FR22 VERSION S.10 | |
Enhanced | ||
Product | AR-FR22 | |
Toe Version | VERSION S.10 | |
Product Type | IT Product ( Data protection function inside digital MFD ) | |
Certification Date | 2005-10-20 | |
Assurance Level | EAL3 +ADV_SPM.1 | |
Vendor | Sharp Corporation | |
Evaluation Facility | Japan Electronics and Information Technology Industries Association, Information Technology security center (JEITA ITSC) | |
Target Link | https://www.ipa.go.jp/en/security/c0033_est.pdf | |
Report Link | https://www.ipa.go.jp/en/security/c0033_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0033_eimg.pdf | |
Description | PRODUCT DESCRIPTION TOE is a firmware that aims to prevent leakage of real image data stored temporarily in Mass Storage Device (hereafter referred to as MSD), which are specified for every functional unit configuration of Multi Function Device (hereafter referred to as MFD). TOE is provided as a kit of upgrading firmware of MFD. TOE executes encryption before the real image data are spooled in MSD, when the MFD functions like PCFAX, FAX transmission or FAX receiving are performed. It also clears spool data area in MSD after the jobs like copying, printing, SCAN transmission, PCFAX, FAX transmission or FAX receiving are completed. These encryption function and data erasing function ensure the secrecy of real image data that are stored temporarily in MSD and counter fraudulent readout of them. |
References ?
No references are available for this certificate.
Updates ?
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0033', 'supplier': 'Sharp Corporation', 'toe_overseas_name': 'AR-FR22\n VERSION S.10', 'expiration_date': '2013-10', 'claim': 'EAL3+\n ADV_SPM.1', 'certification_date': '2005-10', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0033_it5046.html', 'toe_japan_name': 'AR-FR22\n VERSION S.10', 'enhanced': {'product': 'AR-FR22', 'toe_version': 'VERSION S.10', 'product_type': 'IT Product ( Data protection function inside digital MFD )', 'certification_date': '2005-10-20', 'assurance_level': 'EAL3 +ADV_SPM.1', 'vendor': 'Sharp Corporation', 'evaluation_facility': 'Japan Electronics and Information Technology Industries \n Association, Information Technology security center (JEITA ITSC)', 'target_link': 'https://www.ipa.go.jp/en/security/c0033_est.pdf', 'report_link': 'https://www.ipa.go.jp/en/security/c0033_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0033_eimg.pdf', 'description': 'PRODUCT DESCRIPTION \n TOE is a firmware that aims to prevent leakage of real image data stored temporarily in Mass Storage Device (hereafter referred to as MSD), which are specified for every functional unit configuration of Multi Function Device (hereafter referred to as MFD). TOE is provided as a kit of upgrading firmware of MFD. \n TOE executes encryption before the real image data are spooled in MSD, when the MFD functions like PCFAX, FAX transmission or FAX receiving are performed. It also clears spool data area in MSD after the jobs like copying, printing, SCAN transmission, PCFAX, FAX transmission or FAX receiving are completed. These encryption function and data erasing function ensure the secrecy of real image data that are stored temporarily in MSD and counter fraudulent readout of them.'}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ffd324ffb9707ff29670dfdf71a31e019507a59570300e723f184e8e3f773a04', 'txt_hash': '6092dfe90de194e062325def47ed22d47f533580ac493527badbb98e8bdf04ac'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9b4caae01946a890057d6f26fb51081278fe117a73f153489025de16c0cb2665', 'txt_hash': 'bb1dd36cb27ed2a2f8af21d262e0177f954a2d6fb9cdde5cc3dfe615e4e862b3'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 200185, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 23, '/ModDate': "D:20051124110544+09'00'", '/CreationDate': "D:20051124110544+09'00'", '/Title': 'Microsoft Word - IT認証5046-Certification Report-e.doc', '/Creator': 'PScript5.dll Version 5.2', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'Administrator', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 415847, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 34, '/CreationDate': "D:20051124131743+09'00'", '/ModDate': "D:20051124131743+09'00'", '/Producer': 'AntennaHouse PDF Driver 2.0.0-sn', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0033-01': 1, 'Certification No. C0033': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 3}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.RECOVER': 1}, 'A': {'A.OPERATOR': 1}}, 'vendor': {}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}, 'Rijndael': {'Rijndael': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:1999': 1}, 'CC': {'CCIMB-99-032': 2, 'CCIMB-99-033': 2, 'CCIMB-99-031': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 4, 'ACM_SCP.1': 4}, 'ADO': {'ADO_DEL.1': 3, 'ADO_IGS.1': 4}, 'ADV': {'ADV_SPM.1': 14, 'ADV_FSP.1': 12, 'ADV_RCR.1': 4, 'ADV_HLD.1': 3, 'ADV_HLD.2': 1}, 'AGD': {'AGD_ADM.1': 7, 'AGD_USR.1': 6}, 'ALC': {'ALC_DVS.1': 4}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 4, 'ATE_IND.2': 3, 'ATE_DPT.1': 2}, 'AVA': {'AVA_MSU.1': 2, 'AVA_SOF.1': 3, 'AVA_VLA.1': 3, 'AVA_MCU.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.4': 6, 'FCS_CKM.1': 16, 'FCS_COP.1': 16, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 5, 'FDP_RIP.1': 13, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_AFL.1': 17, 'FIA_UAU.2': 21, 'FIA_UAU.7': 15, 'FIA_UID.2': 15, 'FIA_SOS.1': 16, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 4, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 5, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA.1': 5, 'FMT_MOF.1': 16, 'FMT_MSA.2': 18, 'FMT_MTD.1': 14, 'FMT_SMR.1': 16, 'FMT_SMF.1': 15, 'FMT_MOF.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_RVM.1': 1}, 'FPT': {'FPT_RVM.1': 19, 'FPT_RVM.1.1': 1}}, 'cc_claims': {'O': {'O.RESIDUAL': 9, 'O.REMOVE': 7}, 'T': {'T.RECOVER': 5}, 'A': {'A.OPERATOR': 5}, 'OE': {'OE.OPERATE': 3, 'OE.ERASEALL': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}, 'Rijndael': {'Rijndael': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 2}, 'ISO': {'ISO/IEC 15408:1999': 1}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
c0033_erpt.pdf
. - The st_filename property was set to
c0033_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0033
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MCU', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0033_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0033_est.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MCU', 'level': 1}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name AR-FR22 VERSION S.10 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "5220fc7591518222",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0033",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MCU",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"10"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "C0033",
"certification_date": "2005-10",
"claim": "EAL3+\n ADV_SPM.1",
"enhanced": {
"assurance_level": "EAL3 +ADV_SPM.1",
"cert_link": "https://www.ipa.go.jp/en/security/c0033_eimg.pdf",
"certification_date": "2005-10-20",
"description": "PRODUCT DESCRIPTION \n TOE is a firmware that aims to prevent leakage of real image data stored temporarily in Mass Storage Device (hereafter referred to as MSD), which are specified for every functional unit configuration of Multi Function Device (hereafter referred to as MFD). TOE is provided as a kit of upgrading firmware of MFD. \n TOE executes encryption before the real image data are spooled in MSD, when the MFD functions like PCFAX, FAX transmission or FAX receiving are performed. It also clears spool data area in MSD after the jobs like copying, printing, SCAN transmission, PCFAX, FAX transmission or FAX receiving are completed. These encryption function and data erasing function ensure the secrecy of real image data that are stored temporarily in MSD and counter fraudulent readout of them.",
"evaluation_facility": "Japan Electronics and Information Technology Industries \n Association, Information Technology security center (JEITA ITSC)",
"product": "AR-FR22",
"product_type": "IT Product ( Data protection function inside digital MFD )",
"report_link": "https://www.ipa.go.jp/en/security/c0033_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0033_est.pdf",
"toe_version": "VERSION S.10",
"vendor": "Sharp Corporation"
},
"expiration_date": "2013-10",
"supplier": "Sharp Corporation",
"toe_japan_name": "AR-FR22\n VERSION S.10",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0033_it5046.html",
"toe_overseas_name": "AR-FR22\n VERSION S.10"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Sharp Corporation",
"manufacturer_web": "https://sharp-world.com/",
"name": "AR-FR22 VERSION S.10",
"not_valid_after": "2013-10-07",
"not_valid_before": "2005-10-20",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0033_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0033-01": 1,
"Certification No. C0033": 1
}
},
"cc_claims": {
"A": {
"A.OPERATOR": 1
},
"T": {
"T.RECOVER": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_SPM.1": 3
}
},
"cc_security_level": {
"EAL": {
"EAL3": 3,
"EAL3 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ITSC": {
"Information Technology Security Center": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 2,
"CCIMB-99-033": 2
},
"ISO": {
"ISO/IEC 15408:1999": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
},
"Rijndael": {
"Rijndael": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Administrator",
"/CreationDate": "D:20051124110544+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20051124110544+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "Microsoft Word - IT\u8a8d\u8a3c5046-Certification Report-e.doc",
"pdf_file_size_bytes": 200185,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 23
},
"st_filename": "c0033_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.OPERATOR": 5
},
"O": {
"O.REMOVE": 7,
"O.RESIDUAL": 9
},
"OE": {
"OE.ERASEALL": 3,
"OE.OPERATE": 3
},
"T": {
"T.RECOVER": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.3": 4,
"ACM_SCP.1": 4
},
"ADO": {
"ADO_DEL.1": 3,
"ADO_IGS.1": 4
},
"ADV": {
"ADV_FSP.1": 12,
"ADV_HLD.1": 3,
"ADV_HLD.2": 1,
"ADV_RCR.1": 4,
"ADV_SPM.1": 14
},
"AGD": {
"AGD_ADM.1": 7,
"AGD_USR.1": 6
},
"ALC": {
"ALC_DVS.1": 4
},
"ATE": {
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 4,
"ATE_IND.2": 3
},
"AVA": {
"AVA_MCU.1": 1,
"AVA_MSU.1": 2,
"AVA_SOF.1": 3,
"AVA_VLA.1": 3
}
},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 16,
"FCS_CKM.1.1": 1,
"FCS_CKM.4": 6,
"FCS_COP.1": 16,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 5,
"FDP_IFC.1": 1,
"FDP_RIP.1": 13,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 17,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_SOS.1": 16,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 4,
"FIA_UAU.2": 21,
"FIA_UAU.2.1": 1,
"FIA_UAU.7": 15,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 5,
"FIA_UID.2": 15,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 16,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 5,
"FMT_MSA.2": 18,
"FMT_MSA.2.1": 1,
"FMT_MTD.1": 14,
"FMT_MTD.1.1": 1,
"FMT_RVM.1": 1,
"FMT_SMF.1": 15,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 16,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_RVM.1": 19,
"FPT_RVM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
},
"FIPS": {
"FIPS PUB 197": 2
},
"ISO": {
"ISO/IEC 15408:1999": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
},
"Rijndael": {
"Rijndael": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20051124131743+09\u002700\u0027",
"/ModDate": "D:20051124131743+09\u002700\u0027",
"/Producer": "AntennaHouse PDF Driver 2.0.0-sn",
"pdf_file_size_bytes": 415847,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 34
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0033_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ADV_SPM.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0033_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ffd324ffb9707ff29670dfdf71a31e019507a59570300e723f184e8e3f773a04",
"txt_hash": "6092dfe90de194e062325def47ed22d47f533580ac493527badbb98e8bdf04ac"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9b4caae01946a890057d6f26fb51081278fe117a73f153489025de16c0cb2665",
"txt_hash": "bb1dd36cb27ed2a2f8af21d262e0177f954a2d6fb9cdde5cc3dfe615e4e862b3"
}
},
"status": "archived"
}