KYOCERA ECOSYS MA6000ifx, MA5500ifx, MA4500ifx,TA Triumph Adler P-6039i MFP, P-5539i MFP, P-4539i MFP,UTAX P-6039i MFP, P-5539i MFP, P-4539i MFP,with system firmware C0V_S0IS.C04.002
Link Link by certificate ID Link by certificate nameCSV information ?
Status | active |
---|---|
Valid from | 22.06.2023 |
Valid until | 22.06.2028 |
Scheme | 🇸🇪 SE |
Manufacturer | KYOCERA Document Solutions Inc. |
Category | Multi-Function Devices |
Security level | ALC_FLR.2, EAL2+ |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL 2Security Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2Certificates
CSEC2022011Evaluation facilities
Combitech ABFile metadata
Creation date | D:20230615140518+02'00' |
---|---|
Modification date | D:20230615140518+02'00' |
Pages | 1 |
Creator | RICOH MP C4504ex |
Producer | RICOH MP C4504ex |
Certification report ?
Extracted keywords
Protocols
TLSVendor
MicrosoftSecurity level
EAL 2, EAL 2 augmentedClaims
T.SETTING_DATA, T.IMAGE_DATA, T.NETWORK, A.ACCESS, A.NETWORK, A.USER_EDUCATION, A.DADMIN_TRUSTSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, AGD_OPE.1, ALC_FLR.2, ALC_CMC.2, ALC_DEL.1, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_SPD.1, ASE_ECD.1, ASE_TSS.1Certificates
CSEC2022011Evaluation facilities
Combitech ABVulnerabilities
CVE-2022-1026Standards
ISO/IEC 17025, CCMB-2017-04-001File metadata
Title | Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx |
---|---|
Subject | 22FMV6381-24 |
Author | Jerry Johansson |
Creation date | D:20230619164950+02'00' |
Modification date | D:20230619164950+02'00' |
Pages | 17 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, 3DES, HMAC, HMAC-SHA-256, HMAC-SHA-384Asymmetric Algorithms
RSA 2048, ECDHE, DHE, Diffie-Hellman, DHHash functions
SHA-1, SHA-256, SHA-384, SHA-512Protocols
SSL, SSLv1.0, SSLv2.0, SSLv3.0, TLS, TLSv1.2, TLSv1.3, TLS1.2, TLS1.3, TLSv1.0, TLSv1.1, IKEv1, IPsecRandomness
DRBGLibraries
OpenSSLBlock cipher modes
CBC, GCM, XTSTLS cipher suites
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHAVendor
MicrosoftSecurity level
EAL2, EAL2 augmentedClaims
O.SSD_ENCRYPTION, O.NETWORK_ENCRYPTION, O.FAX_CONTROL, O.SETTING_DATA, O.ACCESS_CONTROL, T.SETTING_DATA, T.IMAGE_DATA, T.NETWORK, A.ACCESS, A.NETWORK, A.USER_EDUCATION, A.DADMIN_TRUST, A.NETWROK, OE.ACCESS, OE.NETWORK_PROTECTION, OE.USER_EDUCATION, OE.DADMIN_TRUSTSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_IFC.1, FDP_IFF.1, FDP_IFC.1.1, FIA_AFL.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Certification process
out of scope, in case forwarding to the internal network fails, the TOE would prints the data. In this case it is out of scope of forwarding to the internal network and the security objective is fulfilled. FMT_MSA.1 (bCertification process
out of scope, in case forwarding to the internal network fails, the TOE would prints the data. In this case it is out of scope of forwarding to the internal network and the security objective is fulfilled. FMT_MSA.1 (bStandards
FIPS 186-4, FIPS 197, FIPS PUB 197, FIPS 180-4, FIPS 46-3, FIPS PUB 180-4, SP 800-135, SP 800-67, PKCS #1, RFC8439, RFC 2409, RFC 5114, RFC 2104, RFC5246, RFC8446, RFC5289, RFC5288, RFC2409File metadata
Title | Security Target |
---|---|
Subject | ISO15408認証対応資料 |
Author | KDC |
Creation date | D:20230615130709+02'00' |
Modification date | D:20230615130709+02'00' |
Pages | 71 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Heuristics ?
Extracted SARs
ASE_TSS.1, ATE_FUN.1, ASE_INT.1, ASE_ECD.1, ASE_SPD.1, ADV_FSP.2, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1, ASE_CCL.1, ALC_DEL.1, ALC_CMC.2, ASE_REQ.2, ATE_IND.2, ALC_FLR.2, AGD_PRE.1, ADV_TDS.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1Similar certificates
References ?
No references are available for this certificate.
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f9622654ff3a86eb1a6cda6a8aca87aaaae9ac6b1393f17b9e53a7953bbf3eb6', 'txt_hash': '19ce70f66331b939e1e7359124e741fef3b3723cd5a70c4e6dabd4bd2190fc59'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0b6a8698cea89438200f8ead13485312fe2a6d3b28c608aa6fd8a8727ef60407', 'txt_hash': 'a9c3d0d6387254de8df2505553e07c6ac778543e10428c958253ea0cef0a05ec'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2069595, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 71, '/Title': 'Security Target', '/Author': 'KDC', '/Subject': 'ISO15408認証対応資料', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20230615130709+02'00'", '/ModDate': "D:20230615130709+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['file:///D:/ISO15408/拒果盩/Virgo/01.ST/ST_ECOSYS_MA4000cifx_v090.doc%23_Toc80342619', 'file:///D:/ISO15408/拒果盩/Virgo/01.ST/ST_ECOSYS_MA4000cifx_v090.doc%23_Toc80342618', 'file:///D:/ISO15408/拒果盩/Virgo/01.ST/ST_ECOSYS_MA4000cifx_v090.doc%23_Toc80342620']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 4217486, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20230615140518+02'00'", '/ModDate': "D:20230615140518+02'00'", '/Creator': 'RICOH MP C4504ex', '/Producer': 'RICOH MP C4504ex', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 7, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 28, 'FCS_CKM.2': 3, 'FCS_COP.1': 27, 'FCS_CKM.4': 13, 'FCS_CKM.1.1': 3, 'FCS_COP.1.1': 3}, 'FDP': {'FDP_ITC.1': 3, 'FDP_ITC.2': 3, 'FDP_ACC.1': 11, 'FDP_ACF.1': 8, 'FDP_ACC.1.1': 1, 'FDP_IFC.1': 11, 'FDP_IFF.1': 8, 'FDP_IFC.1.1': 1}, 'FIA': {'FIA_AFL.1': 8, 'FIA_UAU.1': 10, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 8, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 8, 'FIA_SOS.1.1': 1, 'FIA_UID.1': 12, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.7': 8, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1': 7, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA.3': 18, 'FMT_MSA.1': 18, 'FMT_SMR.1': 15, 'FMT_SMF.1': 17, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1': 14, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FTA': {'FTA_SSL.3': 8, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 7, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.SSD_ENCRYPTION': 6, 'O.NETWORK_ENCRYPTION': 6, 'O.FAX_CONTROL': 6, 'O.SETTING_DATA': 6, 'O.ACCESS_CONTROL': 7}, 'T': {'T.SETTING_DATA': 4, 'T.IMAGE_DATA': 3, 'T.NETWORK': 4}, 'A': {'A.ACCESS': 5, 'A.NETWORK': 3, 'A.USER_EDUCATION': 5, 'A.DADMIN_TRUST': 4, 'A.NETWROK': 1}, 'OE': {'OE.ACCESS': 4, 'OE.NETWORK_PROTECTION': 3, 'OE.USER_EDUCATION': 3, 'OE.DADMIN_TRUST': 3}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'3DES': {'3DES': 5}}, 'constructions': {'MAC': {'HMAC': 1, 'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1}, 'ECC': {'ECDH': {'ECDHE': 2}}, 'FF': {'DH': {'DHE': 2, 'Diffie-Hellman': 4, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1, 'SSLv1.0': 1, 'SSLv2.0': 1, 'SSLv3.0': 1}, 'TLS': {'TLS': 17, 'TLSv1.2': 2, 'TLSv1.3': 3, 'TLS1.2': 1, 'TLS1.3': 1, 'TLSv1.0': 1, 'TLSv1.1': 1}}, 'IKE': {'IKEv1': 7}, 'IPsec': {'IPsec': 7}}, 'randomness': {'PRNG': {'DRBG': 2}}, 'cipher_mode': {'CBC': {'CBC': 3}, 'GCM': {'GCM': 1}, 'XTS': {'XTS': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384': 1, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_DHE_RSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_DHE_RSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_RSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_RSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA256': 1, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA': 1}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-4': 2, 'FIPS 197': 3, 'FIPS PUB 197': 3, 'FIPS 180-4': 3, 'FIPS 46-3': 1, 'FIPS PUB 180-4': 1}, 'NIST': {'SP 800-135': 3, 'SP 800-67': 1}, 'PKCS': {'PKCS #1': 1}, 'RFC': {'RFC8439': 3, 'RFC 2409': 2, 'RFC 5114': 1, 'RFC 2104': 2, 'RFC5246': 11, 'RFC8446': 3, 'RFC5289': 4, 'RFC5288': 4, 'RFC2409': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'in case forwarding to the internal network fails, the TOE would prints the data. In this case it is out of scope of forwarding to the internal network and the security objective is fulfilled. FMT_MSA.1 (b': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'SE': {'CSEC2022011': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 2}}, 'cc_sar': {'ALC': {'ALC_FLR': 1, 'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Combitech': {'Combitech AB': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
ST_ECOSYS_MA6000ifx_v100.pdf
. - The cert_filename property was set to
CCRA_MA6000.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7b28320f9ee76f66ad83d18f250db0d3b4b2cf51411ff25d3fd077476c8bc6fe', 'txt_hash': '5d1d3cebf85c8a1a6069139f41b5ce0aeba1828d5ae4c8f7065ced64a49ec016'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 351103, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/Title': 'Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx', '/Author': 'Jerry Johansson', '/Subject': '22FMV6381-24', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20230619164950+02'00'", '/ModDate': "D:20230619164950+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'SE': {'CSEC2022011': 18}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 2, 'EAL 2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1}, 'ALC': {'ALC_FLR.2': 2, 'ALC_CMC.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_SPD.1': 1, 'ASE_ECD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.SETTING_DATA': 1, 'T.IMAGE_DATA': 1, 'T.NETWORK': 1}, 'A': {'A.ACCESS': 1, 'A.NETWORK': 1, 'A.USER_EDUCATION': 1, 'A.DADMIN_TRUST': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {'Combitech': {'Combitech AB': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {'CVE': {'CVE-2022-1026': 1}}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2017-04-001': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx_1-0_22FMV6381-24.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
CSEC2022011
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Kyocera%20ECOSYS%20MA6000ifx,%20MA5500ifx,%20MA4500ifx_1-0_22FMV6381-24.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_ECOSYS_MA6000ifx_v100.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]}
values discarded.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name KYOCERA ECOSYS MA6000ifx, MA5500ifx, MA4500ifx,TA Triumph Adler P-6039i MFP, P-5539i MFP, P-4539i MFP,UTAX P-6039i MFP, P-5539i MFP, P-4539i MFP,with system firmware C0V_S0IS.C04.002 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Multi-Function Devices",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA_MA6000.pdf",
"dgst": "7c78e33bc02e807a",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CSEC2022011",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"04.002"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "KYOCERA Document Solutions Inc.",
"manufacturer_web": "https://www.kyoceradocumentsolutions.com/",
"name": "KYOCERA ECOSYS MA6000ifx, MA5500ifx, MA4500ifx,TA Triumph Adler P-6039i MFP, P-5539i MFP, P-4539i MFP,UTAX P-6039i MFP, P-5539i MFP, P-4539i MFP,with system firmware C0V_S0IS.C04.002",
"not_valid_after": "2028-06-22",
"not_valid_before": "2023-06-22",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "CCRA_MA6000.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"SE": {
"CSEC2022011": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Combitech": {
"Combitech AB": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20230615140518+02\u002700\u0027",
"/Creator": "RICOH MP C4504ex",
"/ModDate": "D:20230615140518+02\u002700\u0027",
"/Producer": "RICOH MP C4504ex",
"pdf_file_size_bytes": 4217486,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx_1-0_22FMV6381-24.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"SE": {
"CSEC2022011": 18
}
},
"cc_claims": {
"A": {
"A.ACCESS": 1,
"A.DADMIN_TRUST": 1,
"A.NETWORK": 1,
"A.USER_EDUCATION": 1
},
"T": {
"T.IMAGE_DATA": 1,
"T.NETWORK": 1,
"T.SETTING_DATA": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 2
},
"ASE": {
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 2,
"EAL 2 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Combitech": {
"Combitech AB": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1
},
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {
"CVE": {
"CVE-2022-1026": 1
}
}
},
"report_metadata": {
"/Author": "Jerry Johansson",
"/CreationDate": "D:20230619164950+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20230619164950+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "22FMV6381-24",
"/Title": "Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx",
"pdf_file_size_bytes": 351103,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "ST_ECOSYS_MA6000ifx_v100.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDHE": 2
}
},
"FF": {
"DH": {
"DH": 1,
"DHE": 2,
"Diffie-Hellman": 4
}
},
"RSA": {
"RSA 2048": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 5,
"A.DADMIN_TRUST": 4,
"A.NETWORK": 3,
"A.NETWROK": 1,
"A.USER_EDUCATION": 5
},
"O": {
"O.ACCESS_CONTROL": 7,
"O.FAX_CONTROL": 6,
"O.NETWORK_ENCRYPTION": 6,
"O.SETTING_DATA": 6,
"O.SSD_ENCRYPTION": 6
},
"OE": {
"OE.ACCESS": 4,
"OE.DADMIN_TRUST": 3,
"OE.NETWORK_PROTECTION": 3,
"OE.USER_EDUCATION": 3
},
"T": {
"T.IMAGE_DATA": 3,
"T.NETWORK": 4,
"T.SETTING_DATA": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 4
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 7,
"EAL2 augmented": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 28,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 3,
"FCS_CKM.4": 13,
"FCS_COP.1": 27,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_ACC.1": 11,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 8,
"FDP_IFC.1": 11,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 8,
"FDP_ITC.1": 3,
"FDP_ITC.2": 3
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 8,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 8,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.7": 8,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 12,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA.1": 18,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 18,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MTD.1": 14,
"FMT_MTD.1.1": 2,
"FMT_SMF.1": 17,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 15,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FTA": {
"FTA_SSL.3": 8,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"in case forwarding to the internal network fails, the TOE would prints the data. In this case it is out of scope of forwarding to the internal network and the security objective is fulfilled. FMT_MSA.1 (b": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"GCM": {
"GCM": 1
},
"XTS": {
"XTS": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 2
}
},
"crypto_protocol": {
"IKE": {
"IKEv1": 7
},
"IPsec": {
"IPsec": 7
},
"TLS": {
"SSL": {
"SSL": 1,
"SSLv1.0": 1,
"SSLv2.0": 1,
"SSLv3.0": 1
},
"TLS": {
"TLS": 17,
"TLS1.2": 1,
"TLS1.3": 1,
"TLSv1.0": 1,
"TLSv1.1": 1,
"TLSv1.2": 2,
"TLSv1.3": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 180-4": 3,
"FIPS 186-4": 2,
"FIPS 197": 3,
"FIPS 46-3": 1,
"FIPS PUB 180-4": 1,
"FIPS PUB 197": 3
},
"NIST": {
"SP 800-135": 3,
"SP 800-67": 1
},
"PKCS": {
"PKCS #1": 1
},
"RFC": {
"RFC 2104": 2,
"RFC 2409": 2,
"RFC 5114": 1,
"RFC2409": 2,
"RFC5246": 11,
"RFC5288": 4,
"RFC5289": 4,
"RFC8439": 3,
"RFC8446": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 14
}
},
"DES": {
"3DES": {
"3DES": 5
}
},
"constructions": {
"MAC": {
"HMAC": 1,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 1,
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA256": 1,
"TLS_RSA_WITH_AES_256_GCM_SHA384": 1
}
},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "KDC",
"/CreationDate": "D:20230615130709+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20230615130709+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "ISO15408\u8a8d\u8a3c\u5bfe\u5fdc\u8cc7\u6599",
"/Title": "Security Target",
"pdf_file_size_bytes": 2069595,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"file:///D:/ISO15408/\u00e6\u2039\u2019\u00e6\u017e\u0153\u00e7\u203a\u00a9/Virgo/01.ST/ST_ECOSYS_MA4000cifx_v090.doc%23_Toc80342618",
"file:///D:/ISO15408/\u00e6\u2039\u2019\u00e6\u017e\u0153\u00e7\u203a\u00a9/Virgo/01.ST/ST_ECOSYS_MA4000cifx_v090.doc%23_Toc80342619",
"file:///D:/ISO15408/\u00e6\u2039\u2019\u00e6\u017e\u0153\u00e7\u203a\u00a9/Virgo/01.ST/ST_ECOSYS_MA4000cifx_v090.doc%23_Toc80342620"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 71
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Kyocera%20ECOSYS%20MA6000ifx,%20MA5500ifx,%20MA4500ifx_1-0_22FMV6381-24.pdf",
"scheme": "SE",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_ECOSYS_MA6000ifx_v100.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0b6a8698cea89438200f8ead13485312fe2a6d3b28c608aa6fd8a8727ef60407",
"txt_hash": "a9c3d0d6387254de8df2505553e07c6ac778543e10428c958253ea0cef0a05ec"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7b28320f9ee76f66ad83d18f250db0d3b4b2cf51411ff25d3fd077476c8bc6fe",
"txt_hash": "5d1d3cebf85c8a1a6069139f41b5ce0aeba1828d5ae4c8f7065ced64a49ec016"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f9622654ff3a86eb1a6cda6a8aca87aaaae9ac6b1393f17b9e53a7953bbf3eb6",
"txt_hash": "19ce70f66331b939e1e7359124e741fef3b3723cd5a70c4e6dabd4bd2190fc59"
}
},
"status": "active"
}