MX-FR15 Version C.10

CSV information ?

Status archived
Valid from 26.05.2010
Valid until 02.06.2015
Scheme 🇯🇵 JP
Manufacturer Sharp Corporation
Category Other Devices and Systems
Security level EAL3

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0255

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, Rijndael

Security level
EAL3
Claims
T.RECOVER, A.OPERATOR
Certificates
CRP-C0255-01, Certification No. C0255
Evaluation facilities
Information Technology Security Center

Standards
CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004

File metadata

Title CRP-e
Author IPA/JISEC
Creation date D:20110530111145+09'00'
Modification date D:20110530111242+09'00'
Pages 21
Creator Word 用 Acrobat PDFMaker 8.1
Producer Acrobat Distiller 8.2.3 (Windows)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, Rijndael

Vendor
Microsoft

Security level
EAL3
Claims
O.REMOVE, O.MANAGE, O.RESIDUAL, T.RECOVER, A.OPERATOR, OE.ERASEALL, OE.OPERATE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_RIP.1.1, FIA_AFL.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2, FIA_UID.1, FIA_UAU.2.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2, FIA_UID.2.1, FMT_MOF.1, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2

Standards
FIPS PUB 197, ISO/IEC 646

File metadata

Title Security Target
Subject MX-FR15
Author K.Nakagawa
Creation date D:20110525112546+09'00'
Modification date D:20110526173154+09'00'
Pages 24
Creator Word 用 Acrobat PDFMaker 8.1
Producer Acrobat Distiller 8.2.6 (Windows)

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0255

Extracted SARs

ATE_FUN.1, ASE_ECD.1, AGD_PRE.1, ADV_ARC.1, ASE_TSS.1, ATE_DPT.1, ALC_DEL.1, ASE_OBJ.2, ASE_CCL.1, ALC_CMS.3, ASE_INT.1, ALC_CMC.3, AGD_OPE.1, ATE_IND.2, ALC_LCD.1, ASE_SPD.1, AVA_VAN.2, ASE_REQ.2, ALC_DVS.1, ADV_TDS.2, ATE_COV.2, ADV_FSP.3

Scheme data ?

Cert Id C0255
Supplier Sharp Corporation
Toe Overseas Name MX-FR15 C.10
Expiration Date 2015-06
Claim EAL3
Certification Date 2010-05
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0255_it9273.html
Toe Japan Name MX-FR15 C.10
Enhanced
Product MX-FR15
Toe Version C.10
Product Type Data protection function in Multi Function Device
Certification Date 2010-05-26
Cc Version 3.1
Assurance Level EAL3
Vendor Sharp Corporation
Evaluation Facility Information Technology Security Center Evaluation Department
Report Link https://www.ipa.go.jp/en/security/c0255_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/c0255_eimg.pdf
Target Link https://www.ipa.go.jp/en/security/c0255_est.pdf
Description PRODUCT DESCRIPTION Description of TOE The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as "MFD"). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. TOE security functionality To counter attempts to steal image data in an MFD, the TOE provides such security functions as: - The cryptographic operation function: Encrypts the image data that the MFD manages before storing to the Flash memory in the MFD, - The data clear function: Overwrites random or fixed values over the storage area that the spooled image data occupy in the volatile memory and Flash memory in the MFD.

References ?

No references are available for this certificate.

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'C0255', 'supplier': 'Sharp Corporation', 'toe_overseas_name': 'MX-FR15\n C.10', 'expiration_date': '2015-06', 'claim': 'EAL3', 'certification_date': '2010-05', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0255_it9273.html', 'toe_japan_name': 'MX-FR15\n C.10', 'enhanced': {'product': 'MX-FR15', 'toe_version': 'C.10', 'product_type': 'Data protection function in Multi Function Device', 'certification_date': '2010-05-26', 'cc_version': '3.1', 'assurance_level': 'EAL3', 'vendor': 'Sharp Corporation', 'evaluation_facility': 'Information Technology Security Center Evaluation Department', 'report_link': 'https://www.ipa.go.jp/en/security/c0255_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0255_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0255_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as "MFD"). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. \n \n TOE security functionality \n To counter attempts to steal image data in an MFD, the TOE provides such security functions as: \n \n \n \n \n - \n The cryptographic operation function: Encrypts the image data that the MFD manages before storing to the Flash memory in the MFD, \n \n \n - \n The data clear function: Overwrites random or fixed values over the storage area that the spooled image data occupy in the volatile memory and Flash memory in the MFD.'}}.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd515ab48589b1314f1981eab2b2d03c665beaac75bee47760d695c5e1eb381ee', 'txt_hash': 'c6d852f96ea2e447e073cd591b0d3c97bb33dec19e8d5798af64847ecde162f9'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7a211ea230b026f9a2483e0a88bec4b934e8c3a1678c9a5855d6eecc8e996e62', 'txt_hash': 'ccb42e8a65434c905095f24d8405f2d3d9b238e1296970dbb090e825bed39610'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 441982, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 21, '/Author': 'IPA/JISEC', '/Company': 'IPA', '/CreationDate': "D:20110530111145+09'00'", '/Creator': 'Word 用 Acrobat PDFMaker 8.1', '/Manager': 'IPA', '/ModDate': "D:20110530111242+09'00'", '/Producer': 'Acrobat Distiller 8.2.3 (Windows)', '/Title': 'CRP-e', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 797003, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 24, '/Author': 'K.Nakagawa', '/Company': 'Sharp Corporation', '/CreationDate': "D:20110525112546+09'00'", '/Creator': 'Word 用 Acrobat PDFMaker 8.1', '/GTS_PDFXConformance': 'PDF/X-1a:2001', '/GTS_PDFXVersion': 'PDF/X-1:2001', '/ModDate': "D:20110526173154+09'00'", '/Producer': 'Acrobat Distiller 8.2.6 (Windows)', '/Subject': 'MX-FR15', '/Title': 'Security Target', '/Trapped': '/False', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0255-01': 1, 'Certification No. C0255': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.RECOVER': 4}, 'A': {'A.OPERATOR': 1}}, 'vendor': {}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}, 'Rijndael': {'Rijndael': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2007-09-002': 2, 'CCMB-2007-09-003': 2, 'CCMB-2007-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 10, 'FCS_CKM.2': 2, 'FCS_COP.1': 11, 'FCS_CKM.4': 8, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ITC.1': 2, 'FDP_ITC.2': 1, 'FDP_RIP.1': 10, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_AFL.1': 11, 'FIA_UAU.1': 3, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1': 7, 'FIA_SOS.1.1': 1, 'FIA_UAU.2': 13, 'FIA_UID.1': 4, 'FIA_UAU.2.1': 1, 'FIA_UAU.7': 11, 'FIA_UAU.7.1': 1, 'FIA_UID.2': 13, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MOF.1': 9, 'FMT_SMR.1': 13, 'FMT_SMF.1': 14, 'FMT_MOF.1.1': 1, 'FMT_MTD.1': 7, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}}, 'cc_claims': {'O': {'O.REMOVE': 7, 'O.MANAGE': 7, 'O.RESIDUAL': 8}, 'T': {'T.RECOVER': 6}, 'A': {'A.OPERATOR': 6}, 'OE': {'OE.ERASEALL': 3, 'OE.OPERATE': 3}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}, 'Rijndael': {'Rijndael': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}, 'ISO': {'ISO/IEC 646': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to c0255_erpt.pdf.
    • The st_filename property was set to c0255_est.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0255.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_erpt.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_est.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name MX-FR15 Version C.10 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "630ebe8ce3aab74e",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0255",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "10"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "C0255",
      "certification_date": "2010-05",
      "claim": "EAL3",
      "enhanced": {
        "assurance_level": "EAL3",
        "cc_version": "3.1",
        "cert_link": "https://www.ipa.go.jp/en/security/c0255_eimg.pdf",
        "certification_date": "2010-05-26",
        "description": "PRODUCT DESCRIPTION \n    Description of TOE \n    The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as \"MFD\"). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware.  \n      \n    TOE security functionality \n    To counter attempts to steal image data in an MFD, the TOE provides such security functions as:  \n     \n      \n      \n        \n        - \n        The cryptographic operation function: Encrypts the image data that the MFD manages before storing to the Flash memory in the MFD,  \n        \n        \n        - \n        The data clear function: Overwrites random or fixed values over the storage area that the spooled image data occupy in the volatile memory and Flash memory in the MFD.",
        "evaluation_facility": "Information Technology Security Center Evaluation Department",
        "product": "MX-FR15",
        "product_type": "Data protection function in Multi Function Device",
        "report_link": "https://www.ipa.go.jp/en/security/c0255_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0255_est.pdf",
        "toe_version": "C.10",
        "vendor": "Sharp Corporation"
      },
      "expiration_date": "2015-06",
      "supplier": "Sharp Corporation",
      "toe_japan_name": "MX-FR15\n                    C.10",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0255_it9273.html",
      "toe_overseas_name": "MX-FR15\n                    C.10"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sharp Corporation",
  "manufacturer_web": "https://sharp-world.com/",
  "name": "MX-FR15 Version C.10",
  "not_valid_after": "2015-06-02",
  "not_valid_before": "2010-05-26",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0255_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0255-01": 1,
          "Certification No. C0255": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.OPERATOR": 1
        },
        "T": {
          "T.RECOVER": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL3": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "ITSC": {
          "Information Technology Security Center": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 2,
          "CCMB-2007-09-002": 2,
          "CCMB-2007-09-003": 2,
          "CCMB-2007-09-004": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          },
          "Rijndael": {
            "Rijndael": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "IPA/JISEC",
      "/Company": "IPA",
      "/CreationDate": "D:20110530111145+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 8.1",
      "/Manager": "IPA",
      "/ModDate": "D:20110530111242+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.2.3 (Windows)",
      "/Title": "CRP-e",
      "pdf_file_size_bytes": 441982,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 21
    },
    "st_filename": "c0255_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.OPERATOR": 6
        },
        "O": {
          "O.MANAGE": 7,
          "O.REMOVE": 7,
          "O.RESIDUAL": 8
        },
        "OE": {
          "OE.ERASEALL": 3,
          "OE.OPERATE": 3
        },
        "T": {
          "T.RECOVER": 6
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 4
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 10,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 8,
          "FCS_COP.1": 11,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ITC.1": 2,
          "FDP_ITC.2": 1,
          "FDP_RIP.1": 10,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 11,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_SOS.1": 7,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 3,
          "FIA_UAU.2": 13,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.7": 11,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 4,
          "FIA_UID.2": 13,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 9,
          "FMT_MOF.1.1": 1,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 13,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS PUB 197": 1
        },
        "ISO": {
          "ISO/IEC 646": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          },
          "Rijndael": {
            "Rijndael": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "K.Nakagawa",
      "/Company": "Sharp Corporation",
      "/CreationDate": "D:20110525112546+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 8.1",
      "/GTS_PDFXConformance": "PDF/X-1a:2001",
      "/GTS_PDFXVersion": "PDF/X-1:2001",
      "/ModDate": "D:20110526173154+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.2.6 (Windows)",
      "/Subject": "MX-FR15",
      "/Title": "Security Target",
      "/Trapped": "/False",
      "pdf_file_size_bytes": 797003,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 24
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d515ab48589b1314f1981eab2b2d03c665beaac75bee47760d695c5e1eb381ee",
      "txt_hash": "c6d852f96ea2e447e073cd591b0d3c97bb33dec19e8d5798af64847ecde162f9"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7a211ea230b026f9a2483e0a88bec4b934e8c3a1678c9a5855d6eecc8e996e62",
      "txt_hash": "ccb42e8a65434c905095f24d8405f2d3d9b238e1296970dbb090e825bed39610"
    }
  },
  "status": "archived"
}