TOSHIBA e-STUDIO2040C/2540C/3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0
CSV information ?
Status | archived |
---|---|
Valid from | 28.10.2011 |
Valid until | 02.11.2016 |
Scheme | 🇯🇵 JP |
Manufacturer | Toshiba TEC Corporation |
Category | Multi-Function Devices |
Security level | ALC_FLR.2, EAL3+ |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AESProtocols
SSLVendor
MicrosoftSecurity level
EAL3, EAL3 augmentedClaims
T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMINSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
CRP-C0328-01, Certification No. C0328Evaluation facilities
Information Technology Security CenterSide-channel analysis
malfunctionCertification process
a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. e-Filing Box Storage area that allows a user to save document CRP-C0328-01 35 data. This areaStandards
FIPS PUB 197, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Creation date | D:20120427102328+09'00' |
---|---|
Modification date | D:20120427102410+09'00' |
Pages | 36 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Security target ?
Extracted keywords
Symmetric Algorithms
AESProtocols
SSLVendor
Microsoft, Microsoft CorporationSecurity level
EAL3, EAL 3, EAL3 augmented, EAL 3 augmentedClaims
D.DOC, D.FUNC, D.PROT, D.CONF, O.AUDIT_STORAGE_PROTECTED, O.AUDIT_ACCESS_AUTHORIZED, O.CRYPTOGRAPHY, O.AUDIT_STORAGE, O.AUDIT_ACCESS, O.DOC, O.FUNC, O.PROT, O.CONF, O.USER, O.INTERFACE, O.SOFTWARE, O.AUDIT, T.DOC, T.FUNC, T.PROT, T.CONF, A, A.ACCESS, A.USER, A.ADMIN, OE.AUDIT_STRAGE, OE.AUDIT_ACCESS, OE.PHYSICAL, OE.INTERFACE, OE.USER, OE.ADMIN, OE.AUDIT, OE.PHYISCALSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, APE_REQ, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_STG.1, FAU_STG.4, FAU_SAR.1, FAU_SAR.2, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.4.1, FCS_COP.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_IFF, FDP_IFC, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FIA_AFL.1, FIA_UAU.7, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FIA_ATD.1, FIA_USB.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FPT_FDI_EXP.1, FPT_FDI_EXP, FPT_FDI_EXP.1.1, FPT_STM.1, FPT_TST.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Certificates
CCEVS-VR-VID10340-2009Side-channel analysis
malfunctionCertification process
e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5Standards
FIPS PUB 197File metadata
Creation date | D:20111013103741+09'00' |
---|---|
Modification date | D:20111013103741+09'00' |
Pages | 66 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 9.0.0 (Windows) |
Heuristics ?
Extracted SARs
ALC_LCD.1, ATE_DPT.1, ATE_COV.2, ATE_IND.2, ALC_FLR.2, ADV_TDS.2, ADV_FSP.3, ASE_SPD.1, ADV_ARC.1, ASE_TSS.1, ASE_ECD.1, ALC_CMS.3, AVA_VAN.2, ALC_CMC.3, ALC_DEL.1, ATE_FUN.1, ALC_DVS.1, AGD_OPE.1, ASE_REQ.2, AGD_PRE.1, ASE_OBJ.2, ASE_INT.1, ASE_CCL.1Similar certificates
Name | Certificate ID | |
---|---|---|
TOSHIBA e-STUDIO2050C/2550C MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0 | JISEC-CC-CRP-C0376 | Compare |
TOSHIBA e-STUDIO5540C/6540C/6550C MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0 | JISEC-CC-CRP-C0327 | Compare |
TOSHIBA e-STUDIO2555C/3055C/3555C/4555C/5055C/2555CSE/3055CSE/3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0 | JISEC-CC-CRP-C0388 | Compare |
Scheme data ?
Cert Id | C0328 | |
---|---|---|
Supplier | Toshiba Tec Corporation | |
Toe Overseas Name | TOSHIBA e-STUDIO2040C/2540C/ 3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS SYS V1.0 | |
Expiration Date | 2016-11 | |
Claim | EAL3+ ALC_FLR.2 PP | |
Certification Date | 2011-10 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0328_it0296.html | |
Toe Japan Name | ----- | |
Enhanced | ||
Product | TOSHIBA e-STUDIO2040C/2540C/3040C/ 3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS | |
Toe Version | SYS V1.0 | |
Product Type | Multifunction Peripheral | |
Certification Date | 2011-10-28 | |
Cc Version | 3.1 | |
Assurance Level | EAL3 Augmented with ALC_FLR.2 | |
Protection Profile | IEEE Std 2600.1-2009 | |
Vendor | Toshiba Tec Corporation | |
Evaluation Facility | Information Technology Security Center Evaluation Department | |
Report Link | https://www.ipa.go.jp/en/security/c0328_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0328_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0328_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE The TOE applies to complete Multifunction Peripheral (MFP) that includes the entire hardware and software components that provide the functionality for printing and scanning documents over the network, through email and on the MFP; and document storage and retrieval. It is assumed that MFP is utilized from a control panel of TOE or as for a user terminal connected to LAN or USB in TOE. TOE Security functions The TOE provides the following security features: - User Authentication The TOE prompts the user to enter the User ID and password from the control panel or client PC to execute identity authentication - User Access Control The TOE controls access to user's document data which is saved in the internal HDD - Secure Erase The TOE removes residual data with DoD secure-erase mechanism before releasing resources from HDD of TOE - Secure Channel The TOE provides support for SSL and is allowed to secure different protocols such as https. The SSL/TLS functionality also permits the TOE to be securely administered from the Web UI, as well as, being used to secure the connection between the TOE and any other external server. - Data Encryption The TOE encrypts the user's document data which is saved in the internal HDD. - Audit Data Generation and Review The TOE generates audit logs for tracking the state of the TOE at any given instance of time. All logs are available for viewing only to TOE U.AUDITOR and U.ADMINISTRATOR role. - TSF Data Protection Only an administrator role user has the capability to manage the configuration and enable/disable available services and protocols. U. ADMINISTRATOR can modify the TSF data. - TSF Self Protection The TOE performs integrity tests on its static executable and configuration files using verification of their digital signature against the known TOSHIBA signatures. This allows the TOE to detect any tampering of its trusted state. |
References ?
No references are available for this certificate.
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['IEEE 2600.1™-2009', 'IEEE 2600.1â„¢-2009']}}]}
.
- The new value is
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0328', 'supplier': 'Toshiba Tec Corporation', 'toe_overseas_name': 'TOSHIBA e-STUDIO2040C/2540C/\n 3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS\n SYS V1.0', 'expiration_date': '2016-11', 'claim': 'EAL3+\n ALC_FLR.2\n PP', 'certification_date': '2011-10', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0328_it0296.html', 'toe_japan_name': '-----', 'enhanced': {'product': 'TOSHIBA e-STUDIO2040C/2540C/3040C/\n 3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS', 'toe_version': 'SYS V1.0', 'product_type': 'Multifunction Peripheral', 'certification_date': '2011-10-28', 'cc_version': '3.1', 'assurance_level': 'EAL3 Augmented with ALC_FLR.2', 'protection_profile': 'IEEE Std 2600.1-2009', 'vendor': 'Toshiba Tec Corporation', 'evaluation_facility': 'Information Technology Security Center Evaluation Department', 'report_link': 'https://www.ipa.go.jp/en/security/c0328_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0328_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0328_est.pdf', 'description': "PRODUCT DESCRIPTION \n Description of TOE \n The TOE applies to complete Multifunction Peripheral (MFP) that includes the entire hardware and software components that provide the functionality for printing and scanning documents over the network, through email and on the MFP; and document storage and retrieval. It is assumed that MFP is utilized from a control panel of TOE or as for a user terminal connected to LAN or USB in TOE. \n \n TOE Security functions \n The TOE provides the following security features: \n \n \n \n - \n User Authentication \n \n \n \n The TOE prompts the user to enter the User ID and password from the control panel or client PC to execute identity authentication \n \n \n - \n User Access Control \n \n \n \n The TOE controls access to user's document data which is saved in the internal HDD \n \n \n - \n Secure Erase \n \n \n \n The TOE removes residual data with DoD secure-erase mechanism before releasing resources from HDD of TOE \n \n \n - \n Secure Channel \n \n \n \n The TOE provides support for SSL and is allowed to secure different protocols such as https. The SSL/TLS functionality also permits the TOE to be securely administered from the Web UI, as well as, being used to secure the connection between the TOE and any other external server. \n \n \n - \n Data Encryption \n \n \n \n The TOE encrypts the user's document data which is saved in the internal HDD. \n \n \n - \n Audit Data Generation and Review \n \n \n \n The TOE generates audit logs for tracking the state of the TOE at any given instance of time. All logs are available for viewing only to TOE U.AUDITOR and U.ADMINISTRATOR role. \n \n \n - \n TSF Data Protection \n \n \n \n Only an administrator role user has the capability to manage the configuration and enable/disable available services and protocols. U. ADMINISTRATOR can modify the TSF data. \n \n \n - \n TSF Self Protection \n \n \n \n The TOE performs integrity tests on its static executable and configuration files using verification of their digital signature against the known TOSHIBA signatures. This allows the TOE to detect any tampering of its trusted state."}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '03e7a03ca58efabf5efb8e609ffc94771617ca08db81631a3809d628704f6751', 'txt_hash': '66cabe7357990672d8d4434fb4839d67f94f8d16052cc7a57585c6c65f21d540'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1cf434e1557e0717154432b7f3eaefadd0c9b7b38c6bd9e8def40909f06798ad', 'txt_hash': '762ee08b9ec711e2368a56ecb1b750753e231a691d972ea6a99fee63052b54e7'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 738739, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 36, '/CreationDate': "D:20120427102328+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20120427102410+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 887125, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 66, '/Author': '', '/CreationDate': "D:20111013103741+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20111013103741+09'00'", '/Producer': 'Acrobat Distiller 9.0.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0328-01': 1, 'Certification No. C0328': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4, 'EAL3 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 4}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DOC': 4, 'T.FUNC': 2, 'T.PROT': 2, 'T.CONF': 4}, 'A': {'A.ACCESS': 1, 'A.USER': 1, 'A.ADMIN': 2}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 8}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}, 'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. e-Filing Box Storage area that allows a user to save document CRP-C0328-01 35 data. This area': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-VID10340-2009': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 2, 'EAL 3': 1, 'EAL3 augmented': 1, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'APE': {'APE_REQ': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 17, 'FAU_STG.1': 11, 'FAU_STG.4': 9, 'FAU_SAR.1': 11, 'FAU_SAR.2': 9, 'FAU_GEN': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 8, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_COP.1': 9, 'FCS_CKM.1': 2, 'FCS_CKM.4': 2, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 37, 'FDP_ACF.1': 29, 'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_RIP.1': 8, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 2, 'FDP_ITC.1': 2, 'FDP_ITC.2': 2}, 'FIA': {'FIA_AFL.1': 9, 'FIA_UAU.7': 10, 'FIA_SOS.1': 10, 'FIA_UAU.1': 13, 'FIA_UID.1': 19, 'FIA_ATD.1': 10, 'FIA_USB.1': 8, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MOF.1': 12, 'FMT_SMF.1': 22, 'FMT_SMR.1': 26, 'FMT_MTD.1': 8, 'FMT_MSA.1': 22, 'FMT_MSA.3': 22, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1.1': 1}, 'FPT': {'FPT_FDI_EXP.1': 14, 'FPT_FDI_EXP': 2, 'FPT_FDI_EXP.1.1': 2, 'FPT_STM.1': 10, 'FPT_TST.1': 8, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3': 9, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.DOC': 43, 'D.FUNC': 13, 'D.PROT': 6, 'D.CONF': 7}, 'O': {'O.AUDIT_STORAGE_PROTECTED': 1, 'O.AUDIT_ACCESS_AUTHORIZED': 1, 'O.CRYPTOGRAPHY': 8, 'O.AUDIT_STORAGE': 7, 'O.AUDIT_ACCESS': 5, 'O.DOC': 25, 'O.FUNC': 8, 'O.PROT': 8, 'O.CONF': 16, 'O.USER': 12, 'O.INTERFACE': 8, 'O.SOFTWARE': 6, 'O.AUDIT': 8}, 'T': {'T.DOC': 6, 'T.FUNC': 3, 'T.PROT': 3, 'T.CONF': 6}, 'A': {'A': 2, 'A.ACCESS': 3, 'A.USER': 3, 'A.ADMIN': 6}, 'OE': {'OE.AUDIT_STRAGE': 1, 'OE.AUDIT_ACCESS': 1, 'OE.PHYSICAL': 2, 'OE.INTERFACE': 3, 'OE.USER': 12, 'OE.ADMIN': 6, 'OE.AUDIT': 3, 'OE.PHYISCAL': 1}}, 'vendor': {'Microsoft': {'Microsoft': 4, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 13}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5': 1}}}
. - The report_filename property was set to
c0328_erpt.pdf
. - The st_filename property was set to
c0328_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0328
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0328_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0328_est.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name TOSHIBA e-STUDIO2040C/2540C/3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Multi-Function Devices",
"cert_link": null,
"dgst": "59f4a79c9d094937",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0328",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "C0328",
"certification_date": "2011-10",
"claim": "EAL3+\n ALC_FLR.2\n PP",
"enhanced": {
"assurance_level": "EAL3 Augmented with ALC_FLR.2",
"cc_version": "3.1",
"cert_link": "https://www.ipa.go.jp/en/security/c0328_eimg.pdf",
"certification_date": "2011-10-28",
"description": "PRODUCT DESCRIPTION \n Description of TOE \n The TOE applies to complete Multifunction Peripheral (MFP) that includes the entire hardware and software components that provide the functionality for printing and scanning documents over the network, through email and on the MFP; and document storage and retrieval. It is assumed that MFP is utilized from a control panel of TOE or as for a user terminal connected to LAN or USB in TOE. \n \n TOE Security functions \n The TOE provides the following security features: \n \n \n \n - \n User Authentication \n \n \n \n The TOE prompts the user to enter the User ID and password from the control panel or client PC to execute identity authentication \n \n \n - \n User Access Control \n \n \n \n The TOE controls access to user\u0027s document data which is saved in the internal HDD \n \n \n - \n Secure Erase \n \n \n \n The TOE removes residual data with DoD secure-erase mechanism before releasing resources from HDD of TOE \n \n \n - \n Secure Channel \n \n \n \n The TOE provides support for SSL and is allowed to secure different protocols such as https. The SSL/TLS functionality also permits the TOE to be securely administered from the Web UI, as well as, being used to secure the connection between the TOE and any other external server. \n \n \n - \n Data Encryption \n \n \n \n The TOE encrypts the user\u0027s document data which is saved in the internal HDD. \n \n \n - \n Audit Data Generation and Review \n \n \n \n The TOE generates audit logs for tracking the state of the TOE at any given instance of time. All logs are available for viewing only to TOE U.AUDITOR and U.ADMINISTRATOR role. \n \n \n - \n TSF Data Protection \n \n \n \n Only an administrator role user has the capability to manage the configuration and enable/disable available services and protocols. U. ADMINISTRATOR can modify the TSF data. \n \n \n - \n TSF Self Protection \n \n \n \n The TOE performs integrity tests on its static executable and configuration files using verification of their digital signature against the known TOSHIBA signatures. This allows the TOE to detect any tampering of its trusted state.",
"evaluation_facility": "Information Technology Security Center Evaluation Department",
"product": "TOSHIBA e-STUDIO2040C/2540C/3040C/\n 3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS",
"product_type": "Multifunction Peripheral",
"protection_profile": "IEEE Std 2600.1-2009",
"report_link": "https://www.ipa.go.jp/en/security/c0328_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0328_est.pdf",
"toe_version": "SYS V1.0",
"vendor": "Toshiba Tec Corporation"
},
"expiration_date": "2016-11",
"supplier": "Toshiba Tec Corporation",
"toe_japan_name": "-----",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0328_it0296.html",
"toe_overseas_name": "TOSHIBA e-STUDIO2040C/2540C/\n 3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS\n SYS V1.0"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Toshiba TEC Corporation",
"manufacturer_web": "https://www.toshibatec.co.jp/en/",
"name": "TOSHIBA e-STUDIO2040C/2540C/3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0",
"not_valid_after": "2016-11-02",
"not_valid_before": "2011-10-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0328_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0328-01": 1,
"Certification No. C0328": 1
}
},
"cc_claims": {
"A": {
"A.ACCESS": 1,
"A.ADMIN": 2,
"A.USER": 1
},
"T": {
"T.CONF": 4,
"T.DOC": 4,
"T.FUNC": 2,
"T.PROT": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 4
}
},
"cc_security_level": {
"EAL": {
"EAL3": 4,
"EAL3 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. e-Filing Box Storage area that allows a user to save document CRP-C0328-01 35 data. This area": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 8
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ITSC": {
"Information Technology Security Center": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
},
"FIPS": {
"FIPS PUB 197": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20120427102328+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20120427102410+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 738739,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 36
},
"st_filename": "c0328_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10340-2009": 1
}
},
"cc_claims": {
"A": {
"A": 2,
"A.ACCESS": 3,
"A.ADMIN": 6,
"A.USER": 3
},
"D": {
"D.CONF": 7,
"D.DOC": 43,
"D.FUNC": 13,
"D.PROT": 6
},
"O": {
"O.AUDIT": 8,
"O.AUDIT_ACCESS": 5,
"O.AUDIT_ACCESS_AUTHORIZED": 1,
"O.AUDIT_STORAGE": 7,
"O.AUDIT_STORAGE_PROTECTED": 1,
"O.CONF": 16,
"O.CRYPTOGRAPHY": 8,
"O.DOC": 25,
"O.FUNC": 8,
"O.INTERFACE": 8,
"O.PROT": 8,
"O.SOFTWARE": 6,
"O.USER": 12
},
"OE": {
"OE.ADMIN": 6,
"OE.AUDIT": 3,
"OE.AUDIT_ACCESS": 1,
"OE.AUDIT_STRAGE": 1,
"OE.INTERFACE": 3,
"OE.PHYISCAL": 1,
"OE.PHYSICAL": 2,
"OE.USER": 12
},
"T": {
"T.CONF": 6,
"T.DOC": 6,
"T.FUNC": 3,
"T.PROT": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.2": 4,
"ALC_LCD.1": 1
},
"APE": {
"APE_REQ": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 1,
"EAL 3 augmented": 1,
"EAL3": 2,
"EAL3 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 17,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 8,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 11,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 9,
"FAU_SAR.2.1": 1,
"FAU_STG.1": 11,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 9,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM.4": 2,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 37,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 29,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC": 1,
"FDP_IFC.1": 2,
"FDP_IFF": 1,
"FDP_ITC.1": 2,
"FDP_ITC.2": 2,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 9,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 10,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 13,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.7": 10,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 19,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 8,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 12,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 22,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 22,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 2,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 26,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FDI_EXP": 2,
"FPT_FDI_EXP.1": 14,
"FPT_FDI_EXP.1.1": 2,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1,
"FPT_TST.1": 8,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL.3": 9,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 9,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 13
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {
"FIPS": {
"FIPS PUB 197": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 4,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20111013103741+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20111013103741+09\u002700\u0027",
"/Producer": "Acrobat Distiller 9.0.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 887125,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 66
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL3+",
"pp_ids": {
"_type": "Set",
"elements": [
"IEEE 2600.1\u0026trade;-2009",
"IEEE 2600.1\u00e2\u201e\u00a2-2009"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf",
"pp_name": "IEEE Standard for a Protection Profile in Operational Environment A"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0328_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0328_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "03e7a03ca58efabf5efb8e609ffc94771617ca08db81631a3809d628704f6751",
"txt_hash": "66cabe7357990672d8d4434fb4839d67f94f8d16052cc7a57585c6c65f21d540"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1cf434e1557e0717154432b7f3eaefadd0c9b7b38c6bd9e8def40909f06798ad",
"txt_hash": "762ee08b9ec711e2368a56ecb1b750753e231a691d972ea6a99fee63052b54e7"
}
},
"status": "archived"
}