bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software Version: A2XK0Y0-0100-G00-56
CSV information ?
Status | archived |
---|---|
Valid from | 15.11.2012 |
Valid until | 06.12.2017 |
Scheme | 🇯🇵 JP |
Manufacturer | Konica Minolta Business Technologies, Inc |
Category | Other Devices and Systems |
Security level | EAL3 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSLVendor
MicrosoftSecurity level
EAL3Claims
T.DISCARD-MFP, T.BRING-OUT-STORA, T.ACCESS-PRIVATE-, T.ACCESS-PUBLIC-, T.ACCESS-GROUP-, T.ACCESS-SECURE-, T.UNEXPECTED-TRA, T.ACCESS-SETTING, T.BACKUP-RESTORE, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.UNEXPECTED-TRANSMISSION, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRETCertificates
CRP-C0378-01, Certification No. C0378Certification process
or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection ofStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Creation date | D:20130419151909+09'00' |
---|---|
Modification date | D:20130419151955+09'00' |
Pages | 42 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DESProtocols
SSLSecurity level
EAL3Claims
O.REGISTERED, O.PRIVATE, O.PUBLIC, O.GROUP, O.SECURE, O.CONFIG, O.OVERWRITE, O.CRYPT, O.TRUSTED, O.CRYPTO, O.FAX, O.AUTH, O.AUDIT, O.REGISTERED-USER, O.PRIVATE-BOX, O.PUBLIC-BOX, O.GROUP-BOX, O.SECURE-PRINT, O.CRYPTO-KEY, O.CRYPTO-MAIL, O.FAX-CONTROL, O.CRYPTO-CAPABILITY, O.AUTH-CAPABILITY, O.AUDIT-LOGGED, O.TRU, T.DISCARD, T.BRING, T.ACCESS, T.UNEXPECTED, T.BACKUP, T.DISCARD-MFP, T.ACCESS-PRIVATE-BOX, T.ACCESS-GROUP-BOX, T.UNEXPECTED-TRANSMISSION, T.BACKUP-RESTORE, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, OE.FEED, OE.S, OE.SESSION, OE.ADMIN, OE.SERVICE, OE.NETWORK, OE.FAX, OE.SECRET, OE.SETTING, OE.AUDIT, OE.FEED-BACK, OE.SERVER, OE.FAX-UNIT, OE.SETTING-SECURITY, OE.AUDIT_STORAGE-PR, OE.AUDIT_ACCESS-AUT, OE.AUDIT-REVIEWED, OE.AUDIT_STORAGE-PROTECTED, OE.AUDIT_ACESS-AUTHORIZEDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GNE.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FAU_STG.1, FAU_SAR.2, FAU_STG.4, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_COP, FCS_CKM, FCS_CAP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC, FDP_ACP.1, FDP_UAU.7, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1, FIA_UAU.2.1, FIA_UID.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID, FIA_SSL.3, FIA_UAU, FIA_MSA.3, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MAS.1, FMT_MSA, FMT_SOS.1, FPT_STM.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Certification process
main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data inStandards
FIPS 186, FIPS 186-2, FIPS PUB 197, X.509, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Creation date | D:20130415152125+09'00' |
---|---|
Modification date | D:20130415152132+09'00' |
Pages | 115 |
Creator | CubePDF |
Producer | GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA |
Heuristics ?
Extracted SARs
ASE_CCL.1, ATE_DPT.1, ALC_CMS.3, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ALC_CMC.3, ASE_SPD.1, ASE_REQ.2, ATE_COV.2, AGD_OPE.1, ALC_DVS.1, ADV_TDS.2, ASE_ECD.1, AVA_VAN.2, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2, ADV_FSP.3CPE matches
Similar certificates
Scheme data ?
Cert Id | JISEC-CC-CRP-C0378 | |
---|---|---|
Supplier | Konica Minolta Business Technologies, Inc. | |
Toe Overseas Name | bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 / D410 / D411 / D412 / D415 / D416 / D417 / D710 / D711 / D715 / D716 Control Software A2XK0Y0-0100-G00-56 | |
Expiration Date | 01.12.2017 | |
Claim | EAL3 | |
Revalidations | [frozendict({'date': '2013-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386_01.html'})] | |
Certification Date | 01.11.2012 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386.html | |
Toe Japan Name | bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software A2XK0Y0-0100-G00-56 | |
Enhanced | ||
Product | Japanese : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software English : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software | |
Toe Version | A2XK0Y0-0100-G00-56 | |
Product Type | Control Software for digital MFP | |
Cc Version | 3.1 | |
Assurance Level | EAL3 | |
Vendor | Konica Minolta Business Technologies, Inc. | |
Evaluation Facility | Mizuho Information & Research Institute, Inc. Information Security Evaluation Office | |
Report Link | https://www.ipa.go.jp/en/security/c0378_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0378_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0378_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone. |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'JISEC-CC-CRP-C0378', 'toe_overseas_name': 'bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 / D410 / D411 / D412 / D415 / D416 / D417 / D710 / D711 / D715 / D716 Control Software A2XK0Y0-0100-G00-56', 'expiration_date': '2017-12-01', 'certification_date': '2012-11-01', 'toe_japan_name': 'bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software A2XK0Y0-0100-G00-56', 'enhanced': {'__update__': {'product': 'Japanese : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software English : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software', 'description': 'PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.'}, '__delete__': ['certification_date']}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0378', 'supplier': 'Konica Minolta Business Technologies, Inc.', 'toe_overseas_name': 'bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 / D410 / D411 / D412 / D415 / D416 / D417 / D710 / D711 / D715 / D716 Control Software\n A2XK0Y0-0100-G00-56', 'expiration_date': '2017-12', 'claim': 'EAL3', 'revalidations': [{'date': '2013-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386_01.html'}], 'certification_date': '2012-11', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386.html', 'toe_japan_name': 'bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software\n A2XK0Y0-0100-G00-56', 'enhanced': {'product': 'Japanese : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software\n English : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software', 'toe_version': 'A2XK0Y0-0100-G00-56', 'product_type': 'Control Software for digital MFP', 'certification_date': '2012-11-15', 'cc_version': '3.1', 'assurance_level': 'EAL3', 'vendor': 'Konica Minolta Business Technologies, Inc.', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Information Security Evaluation Office', 'report_link': 'https://www.ipa.go.jp/en/security/c0378_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0378_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0378_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. \n \n \n TOE security functionality \n This TOE mainly provides the following security functions. \n \n \n \n - \n Identification / Authentication and Access Control Function \n \n \n \n The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. \n \n \n - \n Audit Log Function \n \n \n \n The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. \n \n \n - \n HDD Encryption Function \n \n \n \n The function to encrypt the data written in HDD by using the function of ASIC. \n \n \n - \n Overwrite Deletion Function \n \n \n \n The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. \n \n \n - \n Safety Transmitting and Receiving Function of Image file \n \n \n \n The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. \n \n \n - \n Fax Unit Control Function \n \n \n \n The function to prevent accessing the internal network using FAX as steppingstone.'}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'db51956cf968e5f2d2ccc10c17ce0001e991c3a41a610c1f2c923e7a9bc2200f', 'txt_hash': '1d53840fa1142d01b7b4a0cb091f885b5c429d1fd046785aa2c016b12ad2474d'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9789d5c056b2bda3efb19022452387381f8dd2c8e6c40914e0c1c77e2fed5b19', 'txt_hash': '74c8fef791f1413c9b2a01d8f764a9ef30c2f7f9a79200f742e8142d87d3453c'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 477272, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 42, '/CreationDate': "D:20130419151909+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20130419151955+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1193119, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 115, '/Producer': 'GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA', '/CreationDate': "D:20130415152125+09'00'", '/ModDate': "D:20130415152132+09'00'", '/Title': '', '/Creator': 'CubePDF', '/Author': '', '/Subject': '', '/Keywords': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0378-01': 1, 'Certification No. C0378': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DISCARD-MFP': 2, 'T.BRING-OUT-STORA': 1, 'T.ACCESS-PRIVATE-': 1, 'T.ACCESS-PUBLIC-': 1, 'T.ACCESS-GROUP-': 1, 'T.ACCESS-SECURE-': 1, 'T.UNEXPECTED-TRA': 1, 'T.ACCESS-SETTING': 2, 'T.BACKUP-RESTORE': 2, 'T.BRING-OUT-STORAGE': 1, 'T.ACCESS-PRIVATE-BOX': 1, 'T.ACCESS-PUBLIC-BOX': 1, 'T.ACCESS-GROUP-BOX': 1, 'T.ACCESS-SECURE-PRINT': 1, 'T.UNEXPECTED-TRANSMISSION': 1}, 'A': {'A.ADMIN': 1, 'A.SERVICE': 1, 'A.NETWORK': 1, 'A.SECRET': 1}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 11, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GNE.2.1': 1, 'FAU_SAR.1': 7, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 2, 'FAU_STG.1': 7, 'FAU_SAR.2': 2, 'FAU_STG.4': 4}, 'FCS': {'FCS_CKM.1': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 11, 'FCS_CKM.4': 4, 'FCS_COP.1.1': 1, 'FCS_COP': 1, 'FCS_CKM': 2, 'FCS_CAP.1': 2}, 'FDP': {'FDP_ITC.1': 4, 'FDP_ITC.2': 2, 'FDP_ACC.1': 72, 'FDP_ACC.1.1': 4, 'FDP_ACF.1': 57, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 4, 'FDP_ACF.1.3': 4, 'FDP_ACF.1.4': 4, 'FDP_IFC.1': 14, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 6, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_RIP.1': 3, 'FDP_RIP.1.1': 1, 'FDP_ITC': 1, 'FDP_ACP.1': 1, 'FDP_UAU.7': 1}, 'FIA': {'FIA_AFL.1': 66, 'FIA_AFL.1.1': 8, 'FIA_AFL.1.2': 8, 'FIA_UAU.1': 41, 'FIA_UAU.2': 43, 'FIA_ATD.1': 29, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 40, 'FIA_SOS.1.1': 4, 'FIA_SOS.2': 9, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UID.1': 32, 'FIA_UAU.2.1': 4, 'FIA_UID.2': 63, 'FIA_UAU.6': 11, 'FIA_UAU.6.1': 1, 'FIA_UAU.7': 19, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 7, 'FIA_USB.1': 26, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID': 1, 'FIA_SSL.3': 1, 'FIA_UAU': 2, 'FIA_MSA.3': 1}, 'FMT': {'FMT_MSA.3': 42, 'FMT_MOF.1': 48, 'FMT_MOF.1.1': 5, 'FMT_SMF.1': 128, 'FMT_SMR.1': 185, 'FMT_MSA.1': 34, 'FMT_MSA.1.1': 3, 'FMT_MSA.3.1': 8, 'FMT_MSA.3.2': 7, 'FMT_MTD.1': 123, 'FMT_MTD.1.1': 15, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 6, 'FMT_SMR.1.2': 6, 'FMT_MAS.1': 1, 'FMT_MSA': 5, 'FMT_SOS.1': 1}, 'FPT': {'FPT_STM.1': 7}, 'FTA': {'FTA_SSL.3': 6, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.REGISTERED': 3, 'O.PRIVATE': 3, 'O.PUBLIC': 3, 'O.GROUP': 3, 'O.SECURE': 4, 'O.CONFIG': 12, 'O.OVERWRITE': 7, 'O.CRYPT': 4, 'O.TRUSTED': 5, 'O.CRYPTO': 5, 'O.FAX': 2, 'O.AUTH': 2, 'O.AUDIT': 2, 'O.REGISTERED-USER': 11, 'O.PRIVATE-BOX': 3, 'O.PUBLIC-BOX': 5, 'O.GROUP-BOX': 3, 'O.SECURE-PRINT': 5, 'O.CRYPTO-KEY': 2, 'O.CRYPTO-MAIL': 4, 'O.FAX-CONTROL': 3, 'O.CRYPTO-CAPABILITY': 1, 'O.AUTH-CAPABILITY': 7, 'O.AUDIT-LOGGED': 5, 'O.TRU': 1}, 'T': {'T.DISCARD': 3, 'T.BRING': 3, 'T.ACCESS': 19, 'T.UNEXPECTED': 2, 'T.BACKUP': 3, 'T.DISCARD-MFP': 1, 'T.ACCESS-PRIVATE-BOX': 1, 'T.ACCESS-GROUP-BOX': 1, 'T.UNEXPECTED-TRANSMISSION': 1, 'T.BACKUP-RESTORE': 1}, 'A': {'A.ADMIN': 5, 'A.SERVICE': 4, 'A.NETWORK': 6, 'A.SECRET': 3}, 'OE': {'OE.FEED': 2, 'OE.S': 1, 'OE.SESSION': 10, 'OE.ADMIN': 3, 'OE.SERVICE': 3, 'OE.NETWORK': 4, 'OE.FAX': 2, 'OE.SECRET': 3, 'OE.SETTING': 2, 'OE.AUDIT': 3, 'OE.FEED-BACK': 8, 'OE.SERVER': 5, 'OE.FAX-UNIT': 2, 'OE.SETTING-SECURITY': 2, 'OE.AUDIT_STORAGE-PR': 1, 'OE.AUDIT_ACCESS-AUT': 1, 'OE.AUDIT-REVIEWED': 2, 'OE.AUDIT_STORAGE-PROTECTED': 1, 'OE.AUDIT_ACESS-AUTHORIZED': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 2}, '3DES': {'3DES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 5}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186': 2, 'FIPS 186-2': 4, 'FIPS PUB 197': 2}, 'X509': {'X.509': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in': 1}}}
. - The report_filename property was set to
c0378_erpt.pdf
. - The st_filename property was set to
c0378_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0378
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0378_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0378_est.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software Version: A2XK0Y0-0100-G00-56 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "ca756a37746bc3cd",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0378",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:konicaminolta:bizhub_c284:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c364:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c224:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c454:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c554:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"56",
"454",
"224",
"554",
"364",
"0100",
"284"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0378",
"certification_date": "2012-11-01",
"claim": "EAL3",
"enhanced": {
"assurance_level": "EAL3",
"cc_version": "3.1",
"cert_link": "https://www.ipa.go.jp/en/security/c0378_eimg.pdf",
"description": "PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as \u201cMFP\u201d), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Information Security Evaluation Office",
"product": "Japanese : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software English : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software",
"product_type": "Control Software for digital MFP",
"report_link": "https://www.ipa.go.jp/en/security/c0378_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0378_est.pdf",
"toe_version": "A2XK0Y0-0100-G00-56",
"vendor": "Konica Minolta Business Technologies, Inc."
},
"expiration_date": "2017-12-01",
"revalidations": [
{
"date": "2013-06",
"link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386_01.html"
}
],
"supplier": "Konica Minolta Business Technologies, Inc.",
"toe_japan_name": "bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software A2XK0Y0-0100-G00-56",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386.html",
"toe_overseas_name": "bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 / D410 / D411 / D412 / D415 / D416 / D417 / D710 / D711 / D715 / D716 Control Software A2XK0Y0-0100-G00-56"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Konica Minolta Business Technologies, Inc",
"manufacturer_web": "https://www.konicaminolta.com/",
"name": "bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software Version: A2XK0Y0-0100-G00-56",
"not_valid_after": "2017-12-06",
"not_valid_before": "2012-11-15",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0378_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0378-01": 1,
"Certification No. C0378": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN": 1,
"A.NETWORK": 1,
"A.SECRET": 1,
"A.SERVICE": 1
},
"T": {
"T.ACCESS-GROUP-": 1,
"T.ACCESS-GROUP-BOX": 1,
"T.ACCESS-PRIVATE-": 1,
"T.ACCESS-PRIVATE-BOX": 1,
"T.ACCESS-PUBLIC-": 1,
"T.ACCESS-PUBLIC-BOX": 1,
"T.ACCESS-SECURE-": 1,
"T.ACCESS-SECURE-PRINT": 1,
"T.ACCESS-SETTING": 2,
"T.BACKUP-RESTORE": 2,
"T.BRING-OUT-STORA": 1,
"T.BRING-OUT-STORAGE": 1,
"T.DISCARD-MFP": 2,
"T.UNEXPECTED-TRA": 1,
"T.UNEXPECTED-TRANSMISSION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL3": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 7
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20130419151909+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20130419151955+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 477272,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 42
},
"st_filename": "c0378_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 5,
"A.NETWORK": 6,
"A.SECRET": 3,
"A.SERVICE": 4
},
"O": {
"O.AUDIT": 2,
"O.AUDIT-LOGGED": 5,
"O.AUTH": 2,
"O.AUTH-CAPABILITY": 7,
"O.CONFIG": 12,
"O.CRYPT": 4,
"O.CRYPTO": 5,
"O.CRYPTO-CAPABILITY": 1,
"O.CRYPTO-KEY": 2,
"O.CRYPTO-MAIL": 4,
"O.FAX": 2,
"O.FAX-CONTROL": 3,
"O.GROUP": 3,
"O.GROUP-BOX": 3,
"O.OVERWRITE": 7,
"O.PRIVATE": 3,
"O.PRIVATE-BOX": 3,
"O.PUBLIC": 3,
"O.PUBLIC-BOX": 5,
"O.REGISTERED": 3,
"O.REGISTERED-USER": 11,
"O.SECURE": 4,
"O.SECURE-PRINT": 5,
"O.TRU": 1,
"O.TRUSTED": 5
},
"OE": {
"OE.ADMIN": 3,
"OE.AUDIT": 3,
"OE.AUDIT-REVIEWED": 2,
"OE.AUDIT_ACCESS-AUT": 1,
"OE.AUDIT_ACESS-AUTHORIZED": 1,
"OE.AUDIT_STORAGE-PR": 1,
"OE.AUDIT_STORAGE-PROTECTED": 1,
"OE.FAX": 2,
"OE.FAX-UNIT": 2,
"OE.FEED": 2,
"OE.FEED-BACK": 8,
"OE.NETWORK": 4,
"OE.S": 1,
"OE.SECRET": 3,
"OE.SERVER": 5,
"OE.SERVICE": 3,
"OE.SESSION": 10,
"OE.SETTING": 2,
"OE.SETTING-SECURITY": 2
},
"T": {
"T.ACCESS": 19,
"T.ACCESS-GROUP-BOX": 1,
"T.ACCESS-PRIVATE-BOX": 1,
"T.BACKUP": 3,
"T.BACKUP-RESTORE": 1,
"T.BRING": 3,
"T.DISCARD": 3,
"T.DISCARD-MFP": 1,
"T.UNEXPECTED": 2,
"T.UNEXPECTED-TRANSMISSION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 11,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GNE.2.1": 1,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 2,
"FAU_SAR.2.1": 1,
"FAU_STG.1": 7,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.4": 4,
"FAU_STG.4.1": 2
},
"FCS": {
"FCS_CAP.1": 2,
"FCS_CKM": 2,
"FCS_CKM.1": 10,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 4,
"FCS_COP": 1,
"FCS_COP.1": 11,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 72,
"FDP_ACC.1.1": 4,
"FDP_ACF.1": 57,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.3": 4,
"FDP_ACF.1.4": 4,
"FDP_ACP.1": 1,
"FDP_IFC.1": 14,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 6,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC": 1,
"FDP_ITC.1": 4,
"FDP_ITC.2": 2,
"FDP_RIP.1": 3,
"FDP_RIP.1.1": 1,
"FDP_UAU.7": 1
},
"FIA": {
"FIA_AFL.1": 66,
"FIA_AFL.1.1": 8,
"FIA_AFL.1.2": 8,
"FIA_ATD.1": 29,
"FIA_ATD.1.1": 1,
"FIA_MSA.3": 1,
"FIA_SOS.1": 40,
"FIA_SOS.1.1": 4,
"FIA_SOS.2": 9,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_SSL.3": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 41,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UAU.2": 43,
"FIA_UAU.2.1": 4,
"FIA_UAU.6": 11,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 19,
"FIA_UAU.7.1": 1,
"FIA_UID": 1,
"FIA_UID.1": 32,
"FIA_UID.2": 63,
"FIA_UID.2.1": 7,
"FIA_USB.1": 26,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MAS.1": 1,
"FMT_MOF.1": 48,
"FMT_MOF.1.1": 5,
"FMT_MSA": 5,
"FMT_MSA.1": 34,
"FMT_MSA.1.1": 3,
"FMT_MSA.3": 42,
"FMT_MSA.3.1": 8,
"FMT_MSA.3.2": 7,
"FMT_MTD.1": 123,
"FMT_MTD.1.1": 15,
"FMT_SMF.1": 128,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 185,
"FMT_SMR.1.1": 6,
"FMT_SMR.1.2": 6,
"FMT_SOS.1": 1
},
"FPT": {
"FPT_STM.1": 7
},
"FTA": {
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 5
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
},
"FIPS": {
"FIPS 186": 2,
"FIPS 186-2": 4,
"FIPS PUB 197": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"3DES": 2
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20130415152125+09\u002700\u0027",
"/Creator": "CubePDF",
"/Keywords": "",
"/ModDate": "D:20130415152132+09\u002700\u0027",
"/Producer": "GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 1193119,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 115
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0378_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0378_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "db51956cf968e5f2d2ccc10c17ce0001e991c3a41a610c1f2c923e7a9bc2200f",
"txt_hash": "1d53840fa1142d01b7b4a0cb091f885b5c429d1fd046785aa2c016b12ad2474d"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9789d5c056b2bda3efb19022452387381f8dd2c8e6c40914e0c1c77e2fed5b19",
"txt_hash": "74c8fef791f1413c9b2a01d8f764a9ef30c2f7f9a79200f742e8142d87d3453c"
}
},
"status": "archived"
}