Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C250P / ineo+ 250P / magicolor 7460CK Control Software 4038-0100-GM0-11-000
JISEC-CC-CRP-C0105-01
ID-One ePass Full EAC v2 en configuration EAC et PACE masqué sur les composants P60x080PVC/PVG
ANSSI-CC-2015/63
name bizhub C250P / ineo+ 250P / magicolor 7460CK Control Software 4038-0100-GM0-11-000 ID-One ePass Full EAC v2 en configuration EAC et PACE masqué sur les composants P60x080PVC/PVG
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 07.10.2013 18.11.2020
not_valid_before 27.06.2007 18.11.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0105_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_63.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0105_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015_63_LITE.pdf
manufacturer Konica Minolta Business Technologies, Inc Oberthur Technologies / NXP Semiconductors GmbH
manufacturer_web https://www.konicaminolta.com/ https://www.oberthur.com/
security_level EAL3 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst 035ea4808ab3d6fd 8fd4e81add040491
heuristics/cert_id JISEC-CC-CRP-C0105-01 ANSSI-CC-2015/63
heuristics/cert_lab [] CEA
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 ALC_FLR.1, ALC_CMS.5, AVA_VAN.5, ADV_TDS.4, ATE_DPT.3, ALC_DVS.2, ADV_FSP.5, ADV_INT.2, ALC_TAT.2, ASE_TSS.2
heuristics/extracted_versions 11, 000, 4038, 0100 -
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0837-V2-2014
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0837-V2-2014
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0105
  • certification_date: 01.06.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0105_eimg.pdf
    • description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. network printer ( bizhub C250P / ineo+ 250P / magicolor 7460CK )( Hereinafter referred to as “ printer ” ) . This software is on the flash memory on the printer controller carried in printer, and this controls the whole operation of printer such as the operation control processing and the image data management received from the panel of printer body or the network. This product offers the protection from exposure of the highly confidential document stored in the printer, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD (option part) unjustly which is a medium for storing image data in printer. If the encryption board, an option product, is installed in the printer controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: bizhub C250P / ineo+ 250P / magicolor 7460CK Control Software
    • product_type: IT Product (data protection function in printer systems)
    • report_link: https://www.ipa.go.jp/en/security/c0105_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0105_est.pdf
    • toe_version: 4038-0100-GM0-11-000
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.10.2013
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C250P / ineo+ 250P / magicolor 7460CK Control Software 4038-0100-GM0-11-000
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0105_it6081.html
  • toe_overseas_name: bizhub C250P / ineo+ 250P / magicolor 7460CK Control Software 4038-0100-GM0-11-000
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0837-V2-2014
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0837-V2-2014
heuristics/protection_profiles {} a33327d40f253f46, b380aabf93b29692
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf
pdf_data/report_filename c0105_erpt.pdf ANSSI-CC-2015_63.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2015/63
    • cert_item: ID-One ePass Full EAC v2 en configuration EAC et PACE masqué sur les composants P60x080PVC/PVG
    • cert_item_version: SAAAAR 080031 : ePass V3 Full EACv2 on NXP SAAAAR 082455 : Code r5.0 Generic SAAAAR 082843 : Optional Code r3.0 Digital Blurred Image
    • cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France NXP Semiconductors Box 54 02 40, D-22502 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: BSI-CC-PP-0056-V2, [PP EAC PACE], version 1.3.1 Machine Readable Travel Document with ICAO Application, BSI-CC-PP-0068-V2, [PP SAC], version 1.0 Machine Readable Travel Document using Standard Inspection Procedure with PACE
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0105-01: 1
    • Certification No. C105: 1
  • DE:
    • BSI-DSZ-CC-0837-V2-2014: 3
  • FR:
    • ANSSI-CC-2015/63: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0056-V2-2012-MA-01: 1
    • BSI-CC-PP-0056-V2: 1
    • BSI-CC-PP-0068-V2: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP- 0035-2007: 1
    • BSI-PP-0035-2007: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 4
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS: 1
    • T.ACCESS-BOX: 1
    • T.ACCESS-NET: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.BACKUP: 1
    • T.BRING-OUT: 1
    • T.DISCARD-PRINTER: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 7
    • NXP Semiconductors: 1
  • Oberthur:
    • OBERTHUR: 4
    • Oberthur Technologies: 8
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 33
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 180-1: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • ICAO:
    • ICAO: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • panel of Printer body or the network. This TOE offers the protection from exposure of the highly confidential document stored in the Printer, and aims at protecting the data which may be exposed against a user’s: 1
pdf_data/report_metadata
  • /CreationDate: D:20070906134841+09'00'
  • /ModDate: D:20070906134841+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 332971
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate:
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title: ANSSI-CC-2015_63
  • pdf_file_size_bytes: 215629
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename c0105_est.pdf anssi_cible_2015_63_LITE.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0837-v2-2014: 1
    • BSI-DSZ-CC-0845-V2-2013-MA-02: 1
  • FR:
    • ANSSi-CC-PP-2009/02: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP-0035: 1
    • BSI-PP-0056: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 6
    • EAL4: 1
  • EAL:
    • EAL 5: 1
    • EAL 6: 2
    • EAL4: 2
    • EAL5: 8
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ADV:
    • ADV_FSP.5: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 3
  • ALC:
    • ALC_CMS.5: 2
    • ALC_DVS.2: 12
    • ALC_FLR.1: 1
    • ALC_TAT.2: 2
  • ASE:
    • ASE_TSS.2: 1
  • ATE:
    • ATE_DPT.3: 2
  • AVA:
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_COP: 2
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 6
    • FDP_ACC.1: 34
    • FDP_ACC.1.1: 3
    • FDP_ACF: 3
    • FDP_ACF.1: 42
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ITC.1: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 62
    • FIA_AFL.1.1: 7
    • FIA_AFL.1.2: 7
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 12
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 47
    • FIA_SOS.1.1: 5
    • FIA_SOS.2: 10
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU: 9
    • FIA_UAU.1: 13
    • FIA_UAU.2: 64
    • FIA_UAU.2.1: 5
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 2
    • FIA_UID: 11
    • FIA_UID.1: 13
    • FIA_UID.2: 34
    • FIA_UID.2.1: 4
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MOF.1: 69
    • FMT_MOF.1.1: 3
    • FMT_MSA: 9
    • FMT_MSA.2: 2
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 81
    • FMT_MTD.1.1: 6
    • FMT_SMF: 18
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 51
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_RVM.1: 17
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FAU:
    • FAU_SAS: 4
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
    • FAU_STG: 4
    • FAU_STG.2: 3
  • FCS:
    • FCS_CKM: 25
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 2
    • FCS_COP: 59
    • FCS_COP.1: 25
    • FCS_RND: 4
    • FCS_RND.1: 6
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC: 7
    • FDP_ACC.1: 1
    • FDP_ACC.2: 2
    • FDP_ACF: 7
    • FDP_ACF.1: 11
    • FDP_DAU: 4
    • FDP_DAU.1: 2
    • FDP_ITC: 9
    • FDP_ITC.1: 6
    • FDP_RIP.1: 2
    • FDP_RIP.1.1: 1
    • FDP_UCT: 7
    • FDP_UCT.1: 2
    • FDP_UIT: 12
    • FDP_UIT.1: 6
  • FIA:
    • FIA_AFL: 7
    • FIA_AFL.1: 4
    • FIA_API: 4
    • FIA_API.1: 6
    • FIA_API.1.1: 1
    • FIA_UAU: 53
    • FIA_UAU.1: 8
    • FIA_UAU.4: 5
    • FIA_UAU.5: 15
    • FIA_UAU.6: 3
    • FIA_UID: 13
    • FIA_UID.1: 8
  • FMT:
    • FMT_LIM: 10
    • FMT_LIM.1: 11
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 11
    • FMT_LIM.2.1: 1
    • FMT_MOF: 4
    • FMT_MOF.1: 1
    • FMT_MTD: 61
    • FMT_MTD.1: 18
    • FMT_MTD.3: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 2
    • FMT_SMR: 10
    • FMT_SMR.1: 8
  • FPT:
    • FPT_EMS: 13
    • FPT_EMS.1: 17
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS: 2
    • FPT_FLS.1: 2
    • FPT_PHP: 2
    • FPT_PHP.3: 2
    • FPT_TST: 6
    • FPT_TST.1: 14
  • FTP:
    • FTP_ITC: 11
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SETTING: 1
  • O:
    • O.BOX: 5
    • O.CHECK-HDD: 2
    • O.CONFIG: 9
    • O.CRYPT-KEY: 3
    • O.OVERWRITE-ALL: 2
    • O.SECURE-PRINT: 3
  • OE:
    • OE.CRYPT: 4
    • OE.FEED-BACK: 8
    • OE.LOCK-HDD: 1
  • T:
    • T.ACCESS-BOX: 1
    • T.ACCESS-NET-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.DISCARD-PRINTER: 1
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 13
    • NXP Semiconductors: 6
  • Oberthur:
    • Oberthur: 1
    • Oberthur Technologies: 118
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 17
      • AES128: 1
  • DES:
    • 3DES:
      • 3DES: 16
    • DES:
      • DES: 6
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
  • SHA:
    • SHA1:
      • SHA1: 7
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
      • SHA224: 1
      • SHA256: 4
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 270
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 3
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 4
  • SCA:
    • DPA: 1
    • physical probing: 3
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 2006: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 4
    • EF.DG1: 7
    • EF.DG14: 3
    • EF.DG15: 2
    • EF.DG16: 5
    • EF.DG2: 3
    • EF.DG3: 8
    • EF.DG4: 8
    • EF.DG5: 1
    • EF.SOD: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS PUB 197: 2
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS 46-3: 1
  • ICAO:
    • ICAO: 12
  • ISO:
    • ISO/IEC 11770-2: 3
    • ISO/IEC 15946: 2
    • ISO/IEC 15946-1: 1
    • ISO/IEC 15946-2: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC 7816-9: 1
  • NIST:
    • NIST SP 800-90: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS#3: 4
  • RFC:
    • RFC 3447: 1
  • SCP:
    • SCP02: 2
    • SCP03: 2
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the printer. Moreover, TOE can encrypt the image data written in HDD for the danger of: 1
pdf_data/st_metadata
  • /CreationDate: D:20070904141916+09'00'
  • /Creator: クセロPDF v1.14 Rev0495
  • /ModDate: D:20070904141916+09'00'
  • /Producer: Xelo PDF Library
  • pdf_file_size_bytes: 1754729
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /Author: michetho
  • /CreationDate: D:20151127101823+01'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20151127101823+01'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: <Document name>
  • pdf_file_size_bytes: 2110194
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 109
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different