bizhub C650 / ineo+ 650 Control Software v A00J0Y0-0100-GM0-00

CSV information

Status archived
Valid from 29.10.2007
Valid until 28.12.2010
Scheme 🇯🇵 JP
Manufacturer Konica Minolta Business Technologies, Inc
Category Multi-Function Devices
Security level EAL3

Heuristics summary

Certificate ID: JISEC-CC-CRP-C0121

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Symmetric Algorithms
AES
Hash functions
SHA-1
Protocols
SSL

Security level
EAL3
Claims
T.DISCARD-MFP, T.BRING-OUT, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.ACCESS-NET, T.ACCESS, T.BACKUP, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTING, A.SERVER
Certificates
CRP-C0121-01, Certification No. C0121

Certification process
650)(Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking

Standards
FIPS 186, FIPS PUB 197, FIPS 186-1, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title untitled
Creation date D:20080222184444+09'00'
Modification date D:20080222184444+09'00'
Pages 33
Producer Acrobat Distiller 6.0 (Windows)

Security target

Extracted keywords

Symmetric Algorithms
AES
Hash functions
SHA-1
Protocols
SSL

Security level
EAL3, EAL4
Claims
O.REGISTERED-USER, O.PRIVATE-BOX, O.PUBLIC-BOX, O.GROUP-BOX, O.SECURE-PRINT, O.CONFIG, O.OVERWRITE-ALL, O.CRYPT-KEY, O.CHECK-HDD, O.TRUSTED-PASS, O.CRYPTO-MAIL, T.DISCARD-MFP, T.ACCESS-PRIVATE-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-NET-SETTING, T.BACKUP-RESTORE, T.ACCESS-SETTING, A.SERVER, A.ADMIN, A.NETWORK, A.SETTING, OE.CRYPT, OE.LOCK-HDD, OE.FEED-BACK, OE.SESSION
Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP, FCS_COP.1, FCS_CKM, FCS_COP.1.1, FCS_CKM.4, FDP_ITC.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ACC, FDP_IFC, FDP_RIP.1, FDP_ITC, FDP_IFC.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FIA_UAU.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.2.1, FIA_UAU.1, FIA_UID, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_NEW.1, FIA_NEW.1.1, FIA_NEW.1.2, FIA_SOS, FMT_MSA, FMT_MSA.2, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF, FMT_SMR, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_CKM.1, FMT_MAS.1, FPT_RVM.1, FPT_RVM.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3

Certification process
functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking

Standards
FIPS 186, FIPS PUB 197, FIPS 186-1, FIPS 180-1, X.509, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003

File metadata

Title Microsoft Word - 【C0121】Mosel1_英文ST-1.06-080221.doc
Author
Creation date D:20080221211757+09'00'
Modification date D:20080221211844+09'00'
Pages 131
Creator Word 用 Acrobat PDFMaker 7.0
Producer Acrobat Distiller 7.0 (Windows)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

JISEC-CC-CRP-C0121

Extracted SARs

ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1

Similar certificates

Name Certificate ID
bizhub C550 / bizhub C451 / ineo+ 550 / ineo+ 451 Control Software v A00H0Y0-0100-GM0-00 JISEC-CC-CRP-C0120 Compare
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control S... JISEC-CC-CRP-C0265 Compare
bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software Versio... JISEC-CC-CRP-C0290 Compare
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / ... JISEC-CC-CRP-C0314 Compare
bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+... JISEC-CC-CRP-C0260 Compare
bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+... JISEC-CC-CRP-C0312 Compare
bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink... JISEC-CC-CRP-C0259 Compare
bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink... JISEC-CC-CRP-C0313 Compare
bizhub C652 / bizhub C552 / bizhub C452 / ineo+ 652 / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / Var... JISEC-CC-CRP-C0241 Compare
bizhub C360 / bizhub C280 / bizhub C220 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / Var... JISEC-CC-CRP-C0240 Compare
Showing 5 out of 10.

Scheme data

Cert Id JISEC-CC-CRP-C0121
Supplier Konica Minolta Business Technologies, Inc.
Toe Overseas Name bizhub C650 / ineo+ 650 Control Software A00H0Y0-0100-GM0-00
Expiration Date 01.01.2011
Claim EAL3
Certification Date 01.10.2007
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0121_it7132.html
Toe Japan Name bizhub C650 / ineo+ 650 Control Software A00H0Y0-0100-GM0-00
Enhanced
Product bizhub C650 / ineo+ 650 Control Software
Toe Version A00H0Y0-0100-GM0-00
Product Type IT Product (data protection function in digital MFD)
Cc Version 2.3
Assurance Level EAL3
Vendor Konica Minolta Business Technologies, Inc.
Evaluation Facility Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
Report Link https://www.ipa.go.jp/en/security/c0121_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/c0121_eimg.pdf
Target Link https://www.ipa.go.jp/en/security/c0121_est.pdf
Description PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C650 / ineo+ 650)(Hereinafter referred to as “MFP”). This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Multi-Function Devices",
  "cert_link": null,
  "dgst": "88fe5bedb1982f39",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0121",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL3",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "650",
        "0100",
        "00"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "JISEC-CC-CRP-C0121",
      "certification_date": "2007-10-01",
      "claim": "EAL3",
      "enhanced": {
        "assurance_level": "EAL3",
        "cc_version": "2.3",
        "cert_link": "https://www.ipa.go.jp/en/security/c0121_eimg.pdf",
        "description": "PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C650 / ineo+ 650)(Hereinafter referred to as \u201cMFP\u201d). This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user\u0027s intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.",
        "evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc.Center for Evaluation of Information Security",
        "product": "bizhub C650 / ineo+ 650 Control Software",
        "product_type": "IT Product (data protection function in digital MFD)",
        "report_link": "https://www.ipa.go.jp/en/security/c0121_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0121_est.pdf",
        "toe_version": "A00H0Y0-0100-GM0-00",
        "vendor": "Konica Minolta Business Technologies, Inc."
      },
      "expiration_date": "2011-01-01",
      "supplier": "Konica Minolta Business Technologies, Inc.",
      "toe_japan_name": "bizhub C650 / ineo+ 650 Control Software A00H0Y0-0100-GM0-00",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0121_it7132.html",
      "toe_overseas_name": "bizhub C650 / ineo+ 650 Control Software A00H0Y0-0100-GM0-00"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Konica Minolta Business Technologies, Inc",
  "manufacturer_web": "https://www.konicaminolta.com/",
  "name": "bizhub C650 / ineo+ 650 Control Software v A00J0Y0-0100-GM0-00",
  "not_valid_after": "2010-12-28",
  "not_valid_before": "2007-10-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "20080303_c0121_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0121-01": 1,
          "Certification No. C0121": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 1,
          "A.NETWORK": 1,
          "A.SECRET": 1,
          "A.SERVER": 1,
          "A.SERVICE": 1,
          "A.SETTING": 1
        },
        "T": {
          "T.ACCESS": 1,
          "T.ACCESS-GROUP-BOX": 1,
          "T.ACCESS-NET": 1,
          "T.ACCESS-PRIVATE-BOX": 1,
          "T.ACCESS-PUBLIC": 1,
          "T.ACCESS-SECURE-PRINT": 1,
          "T.BACKUP": 1,
          "T.BRING-OUT": 1,
          "T.DISCARD-MFP": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL3": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "650\uff09\uff08Hereinafter referred to as \u201cMFP\u201d\uff09. This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 2,
          "CCMB-2005-08-002": 2,
          "CCMB-2005-08-003": 2,
          "CCMB-2005-08-004": 2
        },
        "FIPS": {
          "FIPS 186": 1,
          "FIPS 186-1": 1,
          "FIPS PUB 197": 1
        },
        "ISO": {
          "ISO/IEC 15408:2005": 1,
          "ISO/IEC 18045:2005": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20080222184444+09\u002700\u0027",
      "/ModDate": "D:20080222184444+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "untitled",
      "pdf_file_size_bytes": 289639,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 33
    },
    "st_filename": "20080303_c0121_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 1,
          "A.NETWORK": 2,
          "A.SERVER": 1,
          "A.SETTING": 1
        },
        "O": {
          "O.CHECK-HDD": 5,
          "O.CONFIG": 9,
          "O.CRYPT-KEY": 1,
          "O.CRYPTO-MAIL": 6,
          "O.GROUP-BOX": 4,
          "O.OVERWRITE-ALL": 5,
          "O.PRIVATE-BOX": 3,
          "O.PUBLIC-BOX": 6,
          "O.REGISTERED-USER": 12,
          "O.SECURE-PRINT": 6,
          "O.TRUSTED-PASS": 3
        },
        "OE": {
          "OE.CRYPT": 5,
          "OE.FEED-BACK": 12,
          "OE.LOCK-HDD": 1,
          "OE.SESSION": 1
        },
        "T": {
          "T.ACCESS-GROUP-BOX": 2,
          "T.ACCESS-NET-SETTING": 1,
          "T.ACCESS-PRIVATE-BOX": 1,
          "T.ACCESS-SETTING": 1,
          "T.BACKUP-RESTORE": 1,
          "T.DISCARD-MFP": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.3": 2,
          "ACM_SCP.1": 2
        },
        "ADO": {
          "ADO_DEL.1": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP.1": 2,
          "ADV_HLD.2": 2,
          "ADV_RCR.1": 2
        },
        "AGD": {
          "AGD_ADM.1": 2,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS.1": 2
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_MSU.1": 2,
          "AVA_SOF.1": 2,
          "AVA_VLA.1": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 6,
          "EAL4": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM": 4,
          "FCS_CKM.1": 15,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 4,
          "FCS_COP": 1,
          "FCS_COP.1": 19,
          "FCS_COP.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 3,
          "FDP_ACC.1": 50,
          "FDP_ACC.1.1": 3,
          "FDP_ACF": 3,
          "FDP_ACF.1": 48,
          "FDP_ACF.1.1": 3,
          "FDP_ACF.1.2": 3,
          "FDP_ACF.1.3": 3,
          "FDP_ACF.1.4": 3,
          "FDP_IFC": 3,
          "FDP_IFC.1": 3,
          "FDP_ITC": 1,
          "FDP_ITC.1": 5,
          "FDP_RIP.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 87,
          "FIA_AFL.1.1": 9,
          "FIA_AFL.1.2": 9,
          "FIA_ATD.1": 12,
          "FIA_ATD.1.1": 1,
          "FIA_NEW.1": 12,
          "FIA_NEW.1.1": 1,
          "FIA_NEW.1.2": 1,
          "FIA_SOS": 1,
          "FIA_SOS.1": 67,
          "FIA_SOS.1.1": 7,
          "FIA_SOS.2": 11,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_UAU": 11,
          "FIA_UAU.1": 17,
          "FIA_UAU.2": 119,
          "FIA_UAU.2.1": 7,
          "FIA_UAU.6": 10,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 17,
          "FIA_UAU.7.1": 2,
          "FIA_UID": 16,
          "FIA_UID.1": 21,
          "FIA_UID.2": 62,
          "FIA_UID.2.1": 7,
          "FIA_USB.1": 10,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_CKM.1": 1,
          "FMT_MAS.1": 1,
          "FMT_MOF.1": 111,
          "FMT_MOF.1.1": 3,
          "FMT_MSA": 12,
          "FMT_MSA.1": 34,
          "FMT_MSA.1.1": 3,
          "FMT_MSA.2": 4,
          "FMT_MSA.3": 22,
          "FMT_MSA.3.1": 4,
          "FMT_MSA.3.2": 3,
          "FMT_MTD.1": 191,
          "FMT_MTD.1.1": 13,
          "FMT_SMF": 19,
          "FMT_SMF.1": 41,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 23,
          "FMT_SMR.1": 112,
          "FMT_SMR.1.1": 6,
          "FMT_SMR.1.2": 6
        },
        "FPT": {
          "FPT_RVM.1": 19,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 13,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1
        },
        "FTA": {
          "FTA_SSL.3": 9,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 8,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 2,
          "CCMB-2005-08-002": 2,
          "CCMB-2005-08-003": 2
        },
        "FIPS": {
          "FIPS 180-1": 1,
          "FIPS 186": 4,
          "FIPS 186-1": 2,
          "FIPS PUB 197": 5
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": " ",
      "/Company": " ",
      "/CreationDate": "D:20080221211757+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 7.0",
      "/ModDate": "D:20080221211844+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/Title": "Microsoft Word - \u3010C0121\u3011Mosel1_\u82f1\u6587ST-1.06-080221.doc",
      "/_AdHocReviewCycleID": "-1264862075",
      "/_AuthorEmail": "[email protected]",
      "/_AuthorEmailDisplayName": "megumi tanabe",
      "/_EmailSubject": "\u3010Mosel ISO15408\u3011 ST\u7ffb\u8a33\u78ba\u8a8d\u306e\u304a\u9858\u3044",
      "pdf_file_size_bytes": 923581,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 131
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080303_c0121_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080303_c0121_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "676f28b1c3a0a98224b084f404f2dc0bdc1d5bc6420196784df2661d7bd4f2c7",
      "txt_hash": "4c9603e415cf50be0695ee0529123f41afa70736261b9bef76586ec84f98b296"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "ca751e062a15a7e083c4c1bb990e10b2e1c866772e1f734d9d04270c07545b84",
      "txt_hash": "7d54747a3deff88b670e357fc263800369b68db4e3aef4de563debb5bc54b50d"
    }
  },
  "status": "archived"
}