bizhub C650 / ineo+ 650 Control Software v A00J0Y0-0100-GM0-00

CSV information ?

Status archived
Valid from 29.10.2007
Valid until 28.12.2010
Scheme 🇯🇵 JP
Manufacturer Konica Minolta Business Technologies, Inc
Category Multi-Function Devices
Security level EAL3

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0121

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES
Hash functions
SHA-1
Protocols
SSL

Security level
EAL3
Claims
T.DISCARD-MFP, T.BRING-OUT, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.ACCESS-NET, T.ACCESS, T.BACKUP, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTING, A.SERVER
Certificates
CRP-C0121-01, Certification No. C0121
Certification process
650)(Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking

Certification process
650)(Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking

Standards
FIPS 186, FIPS PUB 197, FIPS 186-1, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title untitled
Creation date D:20080222184444+09'00'
Modification date D:20080222184444+09'00'
Pages 33
Producer Acrobat Distiller 6.0 (Windows)

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Hash functions
SHA-1
Protocols
SSL

Security level
EAL3, EAL4
Claims
O.REGISTERED-USER, O.PRIVATE-BOX, O.PUBLIC-BOX, O.GROUP-BOX, O.SECURE-PRINT, O.CONFIG, O.OVERWRITE-ALL, O.CRYPT-KEY, O.CHECK-HDD, O.TRUSTED-PASS, O.CRYPTO-MAIL, T.DISCARD-MFP, T.ACCESS-PRIVATE-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-NET-SETTING, T.BACKUP-RESTORE, T.ACCESS-SETTING, A.SERVER, A.ADMIN, A.NETWORK, A.SETTING, OE.CRYPT, OE.LOCK-HDD, OE.FEED-BACK, OE.SESSION
Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP, FCS_COP.1, FCS_CKM, FCS_COP.1.1, FCS_CKM.4, FDP_ITC.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ACC, FDP_IFC, FDP_RIP.1, FDP_ITC, FDP_IFC.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FIA_UAU.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.2.1, FIA_UAU.1, FIA_UID, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_NEW.1, FIA_NEW.1.1, FIA_NEW.1.2, FIA_SOS, FMT_MSA, FMT_MSA.2, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF, FMT_SMR, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_CKM.1, FMT_MAS.1, FPT_RVM.1, FPT_RVM.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Certification process
functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking

Certification process
functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking

Standards
FIPS 186, FIPS PUB 197, FIPS 186-1, FIPS 180-1, X.509, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003

File metadata

Title Microsoft Word - 【C0121】Mosel1_英文ST-1.06-080221.doc
Author
Creation date D:20080221211757+09'00'
Modification date D:20080221211844+09'00'
Pages 131
Creator Word 用 Acrobat PDFMaker 7.0
Producer Acrobat Distiller 7.0 (Windows)

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0121

Extracted SARs

AVA_VLA.1, ATE_FUN.1, AGD_ADM.1, ATE_DPT.1, ATE_COV.2, AVA_SOF.1, ADV_HLD.2, AVA_MSU.1, AGD_USR.1, ADV_FSP.1, ATE_IND.2, ALC_DVS.1, ADV_RCR.1

Scheme data ?

Cert Id C0121
Supplier Konica Minolta Business Technologies, Inc.
Toe Overseas Name bizhub C650 / ineo+ 650 Control Software A00H0Y0-0100-GM0-00
Claim EAL3
Certification Date 2007-10
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0121_it7132.html
Toe Japan Name bizhub C650 / ineo+ 650 Control Software A00H0Y0-0100-GM0-00
Enhanced
Product bizhub C650 / ineo+ 650 Control Software
Toe Version A00H0Y0-0100-GM0-00
Product Type IT Product (data protection function in digital MFD)
Certification Date 2007-10-29
Cc Version 2.3
Assurance Level EAL3
Vendor Konica Minolta Business Technologies, Inc.
Evaluation Facility Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
Report Link https://www.ipa.go.jp/en/security/c0121_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/c0121_eimg.pdf
Target Link https://www.ipa.go.jp/en/security/c0121_est.pdf
Description PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C650 / ineo+ 650)(Hereinafter referred to as “MFP”). This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '676f28b1c3a0a98224b084f404f2dc0bdc1d5bc6420196784df2661d7bd4f2c7', 'txt_hash': '4c9603e415cf50be0695ee0529123f41afa70736261b9bef76586ec84f98b296'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ca751e062a15a7e083c4c1bb990e10b2e1c866772e1f734d9d04270c07545b84', 'txt_hash': '7d54747a3deff88b670e357fc263800369b68db4e3aef4de563debb5bc54b50d'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 289639, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 33, '/ModDate': "D:20080222184444+09'00'", '/CreationDate': "D:20080222184444+09'00'", '/Title': 'untitled', '/Producer': 'Acrobat Distiller 6.0 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 923581, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 131, '/CreationDate': "D:20080221211757+09'00'", '/_EmailSubject': '【Mosel ISO15408】 ST翻訳確認のお願い', '/Author': ' ', '/Creator': 'Word 用 Acrobat PDFMaker 7.0', '/_AuthorEmailDisplayName': 'megumi tanabe', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/_AuthorEmail': '[email protected]', '/ModDate': "D:20080221211844+09'00'", '/_AdHocReviewCycleID': '-1264862075', '/Company': ' ', '/Title': 'Microsoft Word - 【C0121】Mosel1_英文ST-1.06-080221.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0121-01': 1, 'Certification No. C0121': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DISCARD-MFP': 1, 'T.BRING-OUT': 1, 'T.ACCESS-PRIVATE-BOX': 1, 'T.ACCESS-PUBLIC': 1, 'T.ACCESS-GROUP-BOX': 1, 'T.ACCESS-SECURE-PRINT': 1, 'T.ACCESS-NET': 1, 'T.ACCESS': 1, 'T.BACKUP': 1}, 'A': {'A.ADMIN': 1, 'A.SERVICE': 1, 'A.NETWORK': 1, 'A.SECRET': 1, 'A.SETTING': 1, 'A.SERVER': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186': 1, 'FIPS PUB 197': 1, 'FIPS 186-1': 1}, 'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 2}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2, 'CCMB-2005-08-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'650)(Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 6, 'EAL4': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 2, 'ACM_SCP.1': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_FSP.1': 2, 'ADV_HLD.2': 2, 'ADV_RCR.1': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2}, 'ALC': {'ALC_DVS.1': 2}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_MSU.1': 2, 'AVA_SOF.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 15, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 1, 'FCS_COP': 1, 'FCS_COP.1': 19, 'FCS_CKM': 4, 'FCS_COP.1.1': 2, 'FCS_CKM.4': 4}, 'FDP': {'FDP_ITC.1': 5, 'FDP_ACC.1': 50, 'FDP_ACC.1.1': 3, 'FDP_ACF': 3, 'FDP_ACF.1': 48, 'FDP_ACF.1.1': 3, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 3, 'FDP_ACF.1.4': 3, 'FDP_ACC': 3, 'FDP_IFC': 3, 'FDP_RIP.1': 1, 'FDP_ITC': 1, 'FDP_IFC.1': 3}, 'FIA': {'FIA_AFL.1': 87, 'FIA_AFL.1.1': 9, 'FIA_AFL.1.2': 9, 'FIA_UAU': 11, 'FIA_UAU.2': 119, 'FIA_ATD.1': 12, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 67, 'FIA_SOS.1.1': 7, 'FIA_SOS.2': 11, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.2.1': 7, 'FIA_UAU.1': 17, 'FIA_UID': 16, 'FIA_UAU.6': 10, 'FIA_UAU.6.1': 1, 'FIA_UAU.7': 17, 'FIA_UAU.7.1': 2, 'FIA_UID.2': 62, 'FIA_UID.2.1': 7, 'FIA_UID.1': 21, 'FIA_USB.1': 10, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_NEW.1': 12, 'FIA_NEW.1.1': 1, 'FIA_NEW.1.2': 1, 'FIA_SOS': 1}, 'FMT': {'FMT_MSA': 12, 'FMT_MSA.2': 4, 'FMT_MOF.1': 111, 'FMT_MOF.1.1': 3, 'FMT_SMF': 19, 'FMT_SMR': 23, 'FMT_SMR.1': 112, 'FMT_MSA.1': 34, 'FMT_MSA.1.1': 3, 'FMT_MSA.3': 22, 'FMT_MSA.3.1': 4, 'FMT_MSA.3.2': 3, 'FMT_MTD.1': 191, 'FMT_MTD.1.1': 13, 'FMT_SMF.1': 41, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 6, 'FMT_SMR.1.2': 6, 'FMT_CKM.1': 1, 'FMT_MAS.1': 1}, 'FPT': {'FPT_RVM.1': 19, 'FPT_RVM.1.1': 1, 'FPT_SEP.1': 13, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}, 'FTA': {'FTA_SSL.3': 9, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.REGISTERED-USER': 12, 'O.PRIVATE-BOX': 3, 'O.PUBLIC-BOX': 6, 'O.GROUP-BOX': 4, 'O.SECURE-PRINT': 6, 'O.CONFIG': 9, 'O.OVERWRITE-ALL': 5, 'O.CRYPT-KEY': 1, 'O.CHECK-HDD': 5, 'O.TRUSTED-PASS': 3, 'O.CRYPTO-MAIL': 6}, 'T': {'T.DISCARD-MFP': 1, 'T.ACCESS-PRIVATE-BOX': 1, 'T.ACCESS-GROUP-BOX': 2, 'T.ACCESS-NET-SETTING': 1, 'T.BACKUP-RESTORE': 1, 'T.ACCESS-SETTING': 1}, 'A': {'A.SERVER': 1, 'A.ADMIN': 1, 'A.NETWORK': 2, 'A.SETTING': 1}, 'OE': {'OE.CRYPT': 5, 'OE.LOCK-HDD': 1, 'OE.FEED-BACK': 12, 'OE.SESSION': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186': 4, 'FIPS PUB 197': 5, 'FIPS 186-1': 2, 'FIPS 180-1': 1}, 'X509': {'X.509': 1}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking': 1}}}.
    • The report_filename property was set to 20080303_c0121_erpt.pdf.
    • The st_filename property was set to 20080303_c0121_est.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0121.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080303_c0121_erpt.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080303_c0121_est.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name bizhub C650 / ineo+ 650 Control Software v A00J0Y0-0100-GM0-00 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Multi-Function Devices",
  "cert_link": null,
  "dgst": "88fe5bedb1982f39",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0121",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "650",
        "00",
        "0100"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "C0121",
      "certification_date": "2007-10",
      "claim": "EAL3",
      "enhanced": {
        "assurance_level": "EAL3",
        "cc_version": "2.3",
        "cert_link": "https://www.ipa.go.jp/en/security/c0121_eimg.pdf",
        "certification_date": "2007-10-29",
        "description": "PRODUCT DESCRIPTION \n    This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C650 / ineo+ 650)(Hereinafter referred to as \u201cMFP\u201d).  \n    This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user\u0027s intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.",
        "evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc.Center for Evaluation of Information Security",
        "product": "bizhub C650 / ineo+ 650 Control Software",
        "product_type": "IT Product (data protection function in digital MFD)",
        "report_link": "https://www.ipa.go.jp/en/security/c0121_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0121_est.pdf",
        "toe_version": "A00H0Y0-0100-GM0-00",
        "vendor": "Konica Minolta Business Technologies, Inc."
      },
      "supplier": "Konica Minolta                    Business Technologies, Inc.",
      "toe_japan_name": "bizhub C650 / ineo+ 650 Control Software \n                    A00H0Y0-0100-GM0-00",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0121_it7132.html",
      "toe_overseas_name": "bizhub C650 / ineo+\n                    650 Control Software\n                    A00H0Y0-0100-GM0-00"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Konica Minolta Business Technologies, Inc",
  "manufacturer_web": "https://www.konicaminolta.com/",
  "name": "bizhub C650 / ineo+ 650 Control Software v A00J0Y0-0100-GM0-00",
  "not_valid_after": "2010-12-28",
  "not_valid_before": "2007-10-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "20080303_c0121_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0121-01": 1,
          "Certification No. C0121": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 1,
          "A.NETWORK": 1,
          "A.SECRET": 1,
          "A.SERVER": 1,
          "A.SERVICE": 1,
          "A.SETTING": 1
        },
        "T": {
          "T.ACCESS": 1,
          "T.ACCESS-GROUP-BOX": 1,
          "T.ACCESS-NET": 1,
          "T.ACCESS-PRIVATE-BOX": 1,
          "T.ACCESS-PUBLIC": 1,
          "T.ACCESS-SECURE-PRINT": 1,
          "T.BACKUP": 1,
          "T.BRING-OUT": 1,
          "T.DISCARD-MFP": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL3": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "650\uff09\uff08Hereinafter referred to as \u201cMFP\u201d\uff09. This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 2,
          "CCMB-2005-08-002": 2,
          "CCMB-2005-08-003": 2,
          "CCMB-2005-08-004": 2
        },
        "FIPS": {
          "FIPS 186": 1,
          "FIPS 186-1": 1,
          "FIPS PUB 197": 1
        },
        "ISO": {
          "ISO/IEC 15408:2005": 1,
          "ISO/IEC 18045:2005": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20080222184444+09\u002700\u0027",
      "/ModDate": "D:20080222184444+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "untitled",
      "pdf_file_size_bytes": 289639,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 33
    },
    "st_filename": "20080303_c0121_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 1,
          "A.NETWORK": 2,
          "A.SERVER": 1,
          "A.SETTING": 1
        },
        "O": {
          "O.CHECK-HDD": 5,
          "O.CONFIG": 9,
          "O.CRYPT-KEY": 1,
          "O.CRYPTO-MAIL": 6,
          "O.GROUP-BOX": 4,
          "O.OVERWRITE-ALL": 5,
          "O.PRIVATE-BOX": 3,
          "O.PUBLIC-BOX": 6,
          "O.REGISTERED-USER": 12,
          "O.SECURE-PRINT": 6,
          "O.TRUSTED-PASS": 3
        },
        "OE": {
          "OE.CRYPT": 5,
          "OE.FEED-BACK": 12,
          "OE.LOCK-HDD": 1,
          "OE.SESSION": 1
        },
        "T": {
          "T.ACCESS-GROUP-BOX": 2,
          "T.ACCESS-NET-SETTING": 1,
          "T.ACCESS-PRIVATE-BOX": 1,
          "T.ACCESS-SETTING": 1,
          "T.BACKUP-RESTORE": 1,
          "T.DISCARD-MFP": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.3": 2,
          "ACM_SCP.1": 2
        },
        "ADO": {
          "ADO_DEL.1": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP.1": 2,
          "ADV_HLD.2": 2,
          "ADV_RCR.1": 2
        },
        "AGD": {
          "AGD_ADM.1": 2,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS.1": 2
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_MSU.1": 2,
          "AVA_SOF.1": 2,
          "AVA_VLA.1": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 6,
          "EAL4": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM": 4,
          "FCS_CKM.1": 15,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 4,
          "FCS_COP": 1,
          "FCS_COP.1": 19,
          "FCS_COP.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 3,
          "FDP_ACC.1": 50,
          "FDP_ACC.1.1": 3,
          "FDP_ACF": 3,
          "FDP_ACF.1": 48,
          "FDP_ACF.1.1": 3,
          "FDP_ACF.1.2": 3,
          "FDP_ACF.1.3": 3,
          "FDP_ACF.1.4": 3,
          "FDP_IFC": 3,
          "FDP_IFC.1": 3,
          "FDP_ITC": 1,
          "FDP_ITC.1": 5,
          "FDP_RIP.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 87,
          "FIA_AFL.1.1": 9,
          "FIA_AFL.1.2": 9,
          "FIA_ATD.1": 12,
          "FIA_ATD.1.1": 1,
          "FIA_NEW.1": 12,
          "FIA_NEW.1.1": 1,
          "FIA_NEW.1.2": 1,
          "FIA_SOS": 1,
          "FIA_SOS.1": 67,
          "FIA_SOS.1.1": 7,
          "FIA_SOS.2": 11,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_UAU": 11,
          "FIA_UAU.1": 17,
          "FIA_UAU.2": 119,
          "FIA_UAU.2.1": 7,
          "FIA_UAU.6": 10,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 17,
          "FIA_UAU.7.1": 2,
          "FIA_UID": 16,
          "FIA_UID.1": 21,
          "FIA_UID.2": 62,
          "FIA_UID.2.1": 7,
          "FIA_USB.1": 10,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_CKM.1": 1,
          "FMT_MAS.1": 1,
          "FMT_MOF.1": 111,
          "FMT_MOF.1.1": 3,
          "FMT_MSA": 12,
          "FMT_MSA.1": 34,
          "FMT_MSA.1.1": 3,
          "FMT_MSA.2": 4,
          "FMT_MSA.3": 22,
          "FMT_MSA.3.1": 4,
          "FMT_MSA.3.2": 3,
          "FMT_MTD.1": 191,
          "FMT_MTD.1.1": 13,
          "FMT_SMF": 19,
          "FMT_SMF.1": 41,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 23,
          "FMT_SMR.1": 112,
          "FMT_SMR.1.1": 6,
          "FMT_SMR.1.2": 6
        },
        "FPT": {
          "FPT_RVM.1": 19,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 13,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1
        },
        "FTA": {
          "FTA_SSL.3": 9,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 8,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 2,
          "CCMB-2005-08-002": 2,
          "CCMB-2005-08-003": 2
        },
        "FIPS": {
          "FIPS 180-1": 1,
          "FIPS 186": 4,
          "FIPS 186-1": 2,
          "FIPS PUB 197": 5
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": " ",
      "/Company": " ",
      "/CreationDate": "D:20080221211757+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 7.0",
      "/ModDate": "D:20080221211844+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/Title": "Microsoft Word - \u3010C0121\u3011Mosel1_\u82f1\u6587ST-1.06-080221.doc",
      "/_AdHocReviewCycleID": "-1264862075",
      "/_AuthorEmail": "[email protected]",
      "/_AuthorEmailDisplayName": "megumi tanabe",
      "/_EmailSubject": "\u3010Mosel ISO15408\u3011 ST\u7ffb\u8a33\u78ba\u8a8d\u306e\u304a\u9858\u3044",
      "pdf_file_size_bytes": 923581,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 131
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080303_c0121_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080303_c0121_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "676f28b1c3a0a98224b084f404f2dc0bdc1d5bc6420196784df2661d7bd4f2c7",
      "txt_hash": "4c9603e415cf50be0695ee0529123f41afa70736261b9bef76586ec84f98b296"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ca751e062a15a7e083c4c1bb990e10b2e1c866772e1f734d9d04270c07545b84",
      "txt_hash": "7d54747a3deff88b670e357fc263800369b68db4e3aef4de563debb5bc54b50d"
    }
  },
  "status": "archived"
}