MX-FR15 Version C.10
CSV information ?
Status | archived |
---|---|
Valid from | 26.05.2010 |
Valid until | 02.06.2015 |
Scheme | 🇯🇵 JP |
Manufacturer | Sharp Corporation |
Category | Other Devices and Systems |
Security level | EAL3 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, RijndaelSecurity level
EAL3Claims
T.RECOVER, A.OPERATORCertificates
CRP-C0255-01, Certification No. C0255Evaluation facilities
Information Technology Security CenterStandards
CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004File metadata
Title | CRP-e |
---|---|
Author | IPA/JISEC |
Creation date | D:20110530111145+09'00' |
Modification date | D:20110530111242+09'00' |
Pages | 21 |
Creator | Word 用 Acrobat PDFMaker 8.1 |
Producer | Acrobat Distiller 8.2.3 (Windows) |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, RijndaelVendor
MicrosoftSecurity level
EAL3Claims
O.REMOVE, O.MANAGE, O.RESIDUAL, T.RECOVER, A.OPERATOR, OE.ERASEALL, OE.OPERATESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_RIP.1.1, FIA_AFL.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2, FIA_UID.1, FIA_UAU.2.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2, FIA_UID.2.1, FMT_MOF.1, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2Standards
FIPS PUB 197, ISO/IEC 646File metadata
Title | Security Target |
---|---|
Subject | MX-FR15 |
Author | K.Nakagawa |
Creation date | D:20110525112546+09'00' |
Modification date | D:20110526173154+09'00' |
Pages | 24 |
Creator | Word 用 Acrobat PDFMaker 8.1 |
Producer | Acrobat Distiller 8.2.6 (Windows) |
Heuristics ?
Extracted SARs
ATE_FUN.1, ASE_ECD.1, AGD_PRE.1, ADV_ARC.1, ASE_TSS.1, ATE_DPT.1, ALC_DEL.1, ASE_OBJ.2, ASE_CCL.1, ALC_CMS.3, ASE_INT.1, ALC_CMC.3, AGD_OPE.1, ATE_IND.2, ALC_LCD.1, ASE_SPD.1, AVA_VAN.2, ASE_REQ.2, ALC_DVS.1, ADV_TDS.2, ATE_COV.2, ADV_FSP.3Scheme data ?
Cert Id | C0255 | |
---|---|---|
Supplier | Sharp Corporation | |
Toe Overseas Name | MX-FR15 C.10 | |
Expiration Date | 2015-06 | |
Claim | EAL3 | |
Certification Date | 2010-05 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0255_it9273.html | |
Toe Japan Name | MX-FR15 C.10 | |
Enhanced | ||
Product | MX-FR15 | |
Toe Version | C.10 | |
Product Type | Data protection function in Multi Function Device | |
Certification Date | 2010-05-26 | |
Cc Version | 3.1 | |
Assurance Level | EAL3 | |
Vendor | Sharp Corporation | |
Evaluation Facility | Information Technology Security Center Evaluation Department | |
Report Link | https://www.ipa.go.jp/en/security/c0255_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0255_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0255_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as "MFD"). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. TOE security functionality To counter attempts to steal image data in an MFD, the TOE provides such security functions as: - The cryptographic operation function: Encrypts the image data that the MFD manages before storing to the Flash memory in the MFD, - The data clear function: Overwrites random or fixed values over the storage area that the spooled image data occupy in the volatile memory and Flash memory in the MFD. |
References ?
No references are available for this certificate.
Updates ?
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0255', 'supplier': 'Sharp Corporation', 'toe_overseas_name': 'MX-FR15\n C.10', 'expiration_date': '2015-06', 'claim': 'EAL3', 'certification_date': '2010-05', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0255_it9273.html', 'toe_japan_name': 'MX-FR15\n C.10', 'enhanced': {'product': 'MX-FR15', 'toe_version': 'C.10', 'product_type': 'Data protection function in Multi Function Device', 'certification_date': '2010-05-26', 'cc_version': '3.1', 'assurance_level': 'EAL3', 'vendor': 'Sharp Corporation', 'evaluation_facility': 'Information Technology Security Center Evaluation Department', 'report_link': 'https://www.ipa.go.jp/en/security/c0255_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0255_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0255_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as "MFD"). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. \n \n TOE security functionality \n To counter attempts to steal image data in an MFD, the TOE provides such security functions as: \n \n \n \n \n - \n The cryptographic operation function: Encrypts the image data that the MFD manages before storing to the Flash memory in the MFD, \n \n \n - \n The data clear function: Overwrites random or fixed values over the storage area that the spooled image data occupy in the volatile memory and Flash memory in the MFD.'}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd515ab48589b1314f1981eab2b2d03c665beaac75bee47760d695c5e1eb381ee', 'txt_hash': 'c6d852f96ea2e447e073cd591b0d3c97bb33dec19e8d5798af64847ecde162f9'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7a211ea230b026f9a2483e0a88bec4b934e8c3a1678c9a5855d6eecc8e996e62', 'txt_hash': 'ccb42e8a65434c905095f24d8405f2d3d9b238e1296970dbb090e825bed39610'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 441982, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 21, '/Author': 'IPA/JISEC', '/Company': 'IPA', '/CreationDate': "D:20110530111145+09'00'", '/Creator': 'Word 用 Acrobat PDFMaker 8.1', '/Manager': 'IPA', '/ModDate': "D:20110530111242+09'00'", '/Producer': 'Acrobat Distiller 8.2.3 (Windows)', '/Title': 'CRP-e', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 797003, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 24, '/Author': 'K.Nakagawa', '/Company': 'Sharp Corporation', '/CreationDate': "D:20110525112546+09'00'", '/Creator': 'Word 用 Acrobat PDFMaker 8.1', '/GTS_PDFXConformance': 'PDF/X-1a:2001', '/GTS_PDFXVersion': 'PDF/X-1:2001', '/ModDate': "D:20110526173154+09'00'", '/Producer': 'Acrobat Distiller 8.2.6 (Windows)', '/Subject': 'MX-FR15', '/Title': 'Security Target', '/Trapped': '/False', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0255-01': 1, 'Certification No. C0255': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.RECOVER': 4}, 'A': {'A.OPERATOR': 1}}, 'vendor': {}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}, 'Rijndael': {'Rijndael': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2007-09-002': 2, 'CCMB-2007-09-003': 2, 'CCMB-2007-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 10, 'FCS_CKM.2': 2, 'FCS_COP.1': 11, 'FCS_CKM.4': 8, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ITC.1': 2, 'FDP_ITC.2': 1, 'FDP_RIP.1': 10, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_AFL.1': 11, 'FIA_UAU.1': 3, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1': 7, 'FIA_SOS.1.1': 1, 'FIA_UAU.2': 13, 'FIA_UID.1': 4, 'FIA_UAU.2.1': 1, 'FIA_UAU.7': 11, 'FIA_UAU.7.1': 1, 'FIA_UID.2': 13, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MOF.1': 9, 'FMT_SMR.1': 13, 'FMT_SMF.1': 14, 'FMT_MOF.1.1': 1, 'FMT_MTD.1': 7, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}}, 'cc_claims': {'O': {'O.REMOVE': 7, 'O.MANAGE': 7, 'O.RESIDUAL': 8}, 'T': {'T.RECOVER': 6}, 'A': {'A.OPERATOR': 6}, 'OE': {'OE.ERASEALL': 3, 'OE.OPERATE': 3}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}, 'Rijndael': {'Rijndael': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}, 'ISO': {'ISO/IEC 646': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
c0255_erpt.pdf
. - The st_filename property was set to
c0255_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0255
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_est.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name MX-FR15 Version C.10 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "630ebe8ce3aab74e",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0255",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"10"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "C0255",
"certification_date": "2010-05",
"claim": "EAL3",
"enhanced": {
"assurance_level": "EAL3",
"cc_version": "3.1",
"cert_link": "https://www.ipa.go.jp/en/security/c0255_eimg.pdf",
"certification_date": "2010-05-26",
"description": "PRODUCT DESCRIPTION \n Description of TOE \n The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as \"MFD\"). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. \n \n TOE security functionality \n To counter attempts to steal image data in an MFD, the TOE provides such security functions as: \n \n \n \n \n - \n The cryptographic operation function: Encrypts the image data that the MFD manages before storing to the Flash memory in the MFD, \n \n \n - \n The data clear function: Overwrites random or fixed values over the storage area that the spooled image data occupy in the volatile memory and Flash memory in the MFD.",
"evaluation_facility": "Information Technology Security Center Evaluation Department",
"product": "MX-FR15",
"product_type": "Data protection function in Multi Function Device",
"report_link": "https://www.ipa.go.jp/en/security/c0255_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0255_est.pdf",
"toe_version": "C.10",
"vendor": "Sharp Corporation"
},
"expiration_date": "2015-06",
"supplier": "Sharp Corporation",
"toe_japan_name": "MX-FR15\n C.10",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0255_it9273.html",
"toe_overseas_name": "MX-FR15\n C.10"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Sharp Corporation",
"manufacturer_web": "https://sharp-world.com/",
"name": "MX-FR15 Version C.10",
"not_valid_after": "2015-06-02",
"not_valid_before": "2010-05-26",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0255_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0255-01": 1,
"Certification No. C0255": 1
}
},
"cc_claims": {
"A": {
"A.OPERATOR": 1
},
"T": {
"T.RECOVER": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ITSC": {
"Information Technology Security Center": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2007-09-002": 2,
"CCMB-2007-09-003": 2,
"CCMB-2007-09-004": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
},
"Rijndael": {
"Rijndael": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "IPA/JISEC",
"/Company": "IPA",
"/CreationDate": "D:20110530111145+09\u002700\u0027",
"/Creator": "Word \u7528 Acrobat PDFMaker 8.1",
"/Manager": "IPA",
"/ModDate": "D:20110530111242+09\u002700\u0027",
"/Producer": "Acrobat Distiller 8.2.3 (Windows)",
"/Title": "CRP-e",
"pdf_file_size_bytes": 441982,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 21
},
"st_filename": "c0255_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.OPERATOR": 6
},
"O": {
"O.MANAGE": 7,
"O.REMOVE": 7,
"O.RESIDUAL": 8
},
"OE": {
"OE.ERASEALL": 3,
"OE.OPERATE": 3
},
"T": {
"T.RECOVER": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 4
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 10,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 8,
"FCS_COP.1": 11,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ITC.1": 2,
"FDP_ITC.2": 1,
"FDP_RIP.1": 10,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 11,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 3,
"FIA_UAU.2": 13,
"FIA_UAU.2.1": 1,
"FIA_UAU.7": 11,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 4,
"FIA_UID.2": 13,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 9,
"FMT_MOF.1.1": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS PUB 197": 1
},
"ISO": {
"ISO/IEC 646": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
},
"Rijndael": {
"Rijndael": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "K.Nakagawa",
"/Company": "Sharp Corporation",
"/CreationDate": "D:20110525112546+09\u002700\u0027",
"/Creator": "Word \u7528 Acrobat PDFMaker 8.1",
"/GTS_PDFXConformance": "PDF/X-1a:2001",
"/GTS_PDFXVersion": "PDF/X-1:2001",
"/ModDate": "D:20110526173154+09\u002700\u0027",
"/Producer": "Acrobat Distiller 8.2.6 (Windows)",
"/Subject": "MX-FR15",
"/Title": "Security Target",
"/Trapped": "/False",
"pdf_file_size_bytes": 797003,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 24
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d515ab48589b1314f1981eab2b2d03c665beaac75bee47760d695c5e1eb381ee",
"txt_hash": "c6d852f96ea2e447e073cd591b0d3c97bb33dec19e8d5798af64847ecde162f9"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7a211ea230b026f9a2483e0a88bec4b934e8c3a1678c9a5855d6eecc8e996e62",
"txt_hash": "ccb42e8a65434c905095f24d8405f2d3d9b238e1296970dbb090e825bed39610"
}
},
"status": "archived"
}