name |
Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.20 AR-FR5: version E.20 |
Logiciel Mistral IP version 2.1.2 |
category |
Multi-Function Devices |
Boundary Protection Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
07.01.2013 |
22.07.2021 |
not_valid_before |
17.09.2004 |
22.07.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0018_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_42.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0018_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20Lite%202016-42.pdf |
manufacturer |
Sharp Corporation |
Thales Communications & Security |
manufacturer_web |
https://sharp-world.com/ |
https://www.thalescommuninc.com |
security_level |
EAL4 |
EAL3+, AVA_VAN.3, ALC_FLR.3 |
dgst |
03749c220b32bdce |
0ef53661a4c000d4 |
heuristics/cert_id |
JISEC-CC-CRP-C0018 |
ANSSI-CC-2016/42 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, AGD_FSP.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
20 |
2.1.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0018
- certification_date: 01.09.2004
- claim: EAL4
- enhanced:
- assurance_level: EAL4
- cert_link: https://www.ipa.go.jp/en/security/c0018_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is a firmware intended to reduce the danger against the disclosure of document data and image data that are temporarily spooled in the Multi-Function Device (hereafter referred to as “MFD”). TOE is offered as an upgraded kit for firmware of the MFD. The TOE provides security function to counter the threat against document data and image data that are temporarily spooled in the Mass Storage Device ( hereafter referred to as MSD) which is defined for each configuration of the functional unit in M FD. When MFD executes basic function as copy, print, Fax or image scanning, MFD executes data encryption before spooling document image data in MSD. Moreover MFD erases image data in MSD automatically after finishing copy, print, Fax or image scanning jobs or at the time of power-on. As a result, MFD keeps high confidentiality of the document/ image data in MSD, and it opposes fraudulent disclosure.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Data Security Kit AR-FR4, Data Security Kit AR-FR5
- product_type: IT product (Data protection function inside digital MFD)
- protection_profile: N/A
- report_link: https://www.ipa.go.jp/en/security/c0018_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0018_est.pdf
- toe_version: AR-FR4: version M.20 AR-FR5: version E.20
- vendor: Sharp Corporation
- expiration_date: 01.03.2013
- revalidations: [frozendict({'date': '2005-03', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0018_it4026_01.html'})]
- supplier: Sharp Corporation
- toe_japan_name: Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.20 AR-FR5: version E.20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0018_it4026.html
- toe_overseas_name: Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.21 AR-FR5: version E.21
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0018_erpt.pdf |
ANSSI-CC-2016_42.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0018-01: 1
- Certification No. C0018: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 5: 1
- EAL 7: 1
- EAL3: 2
- EAL4: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 4
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.OFFICE: 1
- A.PROCEDURE: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20050214150436+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /Manager: IPA
- /ModDate: D:20050214150557+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20050214053206
- /Title: CRP-e
- pdf_file_size_bytes: 260158
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2016_42
- pdf_file_size_bytes: 780613
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
c0018_est.pdf |
Cible Lite 2016-42.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL3: 4
- EAL3 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 4
- ACM_CAP.3: 6
- ACM_CAP.4: 3
- ACM_SCP.1: 2
- ACM_SCP.2: 4
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 6
- ADV:
- ADV_FSP.1: 19
- ADV_FSP.2: 4
- ADV_HLD.1: 1
- ADV_HLD.2: 7
- ADV_IMP.1: 7
- ADV_LLD.1: 6
- ADV_RCR.1: 12
- ADV_SPM.1: 4
- AGD:
- AGD_ADM.1: 11
- AGD_FSP.1: 1
- AGD_USR.1: 10
- ALC:
- ALC_DVS.1: 6
- ALC_LCD.1: 4
- ALC_TAT.1: 6
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 9
- ATE_IND.2: 4
- AVA:
- AVA_MSU.2: 4
- AVA_SOF.1: 4
- AVA_VLA.2: 4
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.3: 9
- ADV_FSP.4: 3
- ADV_IMP.1: 3
- ADV_TDS.1: 2
- ADV_TDS.2: 3
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.3: 2
- ALC_CMS.1: 1
- ALC_CMS.3: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 3
- ALC_FLR.3: 8
- ALC_LCD.1: 4
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 5
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 4
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 27
- FCS_CKM.4: 20
- FCS_CKM.4.1: 1
- FCS_COP.1: 20
- FCS_COP.1.1: 1
- FDP:
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID.1: 4
- FMT:
- FMT_MOF.1: 23
- FMT_MOF.1.1: 1
- FMT_MSA.2: 13
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
- FAU:
- FAU_GEN: 9
- FAU_GEN.1: 16
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 5
- FAU_GEN.2.1: 2
- FAU_GEN_EXT.3: 13
- FAU_GEN_EXT.3.1: 2
- FAU_SEG.1: 2
- FAU_STG.1: 1
- FAU_STG.3: 1
- FAU_STG_EXT.1: 16
- FAU_STG_EXT.1.1: 3
- FAU_STG_EXT.3: 13
- FAU_STG_EXT.3.1: 2
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 29
- FCS_CKM.1.1: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 16
- FCS_CKM_EXT: 50
- FCS_CKM_EXT.4: 15
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.5: 23
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.5.3: 1
- FCS_COP: 96
- FCS_COP.1: 23
- FCS_COP.1.1: 4
- FCS_IPS_EXT: 4
- FCS_IPS_EXT.1: 23
- FCS_IPS_EXT.1.1: 4
- FCS_IPS_EXT.1.2: 3
- FCS_IPS_EXT.1.3: 3
- FCS_IPS_EXT.1.4: 3
- FCS_IPS_EXT.1.5: 3
- FCS_IPS_EXT.1.6: 3
- FCS_IPS_EXT.1.7: 3
- FCS_IPS_EXT.1.8: 4
- FCS_RBG_EXT: 5
- FCS_RBG_EXT.1: 17
- FCS_RBG_EXT.1.1: 3
- FCS_RBG_EXT.1.2: 3
- FDP:
- FDP_ACC.1: 8
- FDP_ETC: 8
- FDP_ETC.2: 4
- FDP_IFC: 35
- FDP_IFC.1: 14
- FDP_IFF: 32
- FDP_IFF.1: 21
- FDP_ITC: 43
- FDP_ITC.1: 32
- FDP_ITC.2: 44
- FDP_RIP.2: 6
- FDP_RIP.2.1: 2
- FDP_UCT: 14
- FDP_UCT.1: 2
- FDP_UIT: 18
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 8
- FIA_AFL.1: 2
- FIA_AFL.1.1: 1
- FIA_PMG_EXT: 10
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 2
- FIA_UAU: 15
- FIA_UAU.1: 4
- FIA_UAU.6: 1
- FIA_UAU.7: 1
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 6
- FIA_UAU_EXT.2: 9
- FIA_UAU_EXT.2.1: 2
- FIA_UIA: 1
- FIA_UIA_EXT: 16
- FIA_UIA_EXT.1: 7
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID: 10
- FIA_UID.1: 4
- FIA_UID.2: 2
- FMT:
- FMT_MDT: 1
- FMT_MOF: 5
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 21
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 52
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SKP_EXT.1: 1
- FMT_SMF.1: 30
- FMT_SMF.1.1: 2
- FMT_SMR: 23
- FMT_SMR.1: 16
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 4
- FPT_APW_EXT.1: 10
- FPT_APW_EXT.1.1: 3
- FPT_APW_EXT.1.2: 3
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_SDP_EXT: 3
- FPT_SDP_EXT.1: 5
- FPT_SDP_EXT.1.1: 1
- FPT_SDP_EXT.2: 10
- FPT_SDP_EXT.2.1: 2
- FPT_SDP_EXT.2.2: 2
- FPT_SIE_EXT: 9
- FPT_SIE_EXT.1: 6
- FPT_SIE_EXT.1.1: 1
- FPT_SIE_EXT.2: 4
- FPT_SIE_EXT.2.1: 1
- FPT_SKP_EXT: 4
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 3
- FPT_STM.1: 19
- FPT_STM.1.1: 2
- FPT_TDC: 8
- FPT_TDC.1: 5
- FPT_TST.1: 6
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 20
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 6
- FTA_SSL.1: 2
- FTA_SSL.3.1: 1
- FTA_SSL.4: 1
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 6
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 2
- FTA_TAB: 7
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 14
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 1
- FTP_TRP.1: 7
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.OFFICE: 2
- A.PROCEDURE: 1
- O:
- O.AUTHEN: 5
- O.AUTHENTICATION: 1
- O.REMOVE: 4
- O.RESIDUAL: 6
- OE:
- OE.OPERATE: 1
- OE.SECURE: 2
- T:
|
- A:
- A.ACCESS_CONTROL_MANAGEMENT_DEVICES: 3
- A.ALARM: 3
- A.AUDIT: 3
- A.CEC_CRYPTO_REGULATION: 3
- A.CONFIGURATION_CONTROL: 3
- A.KEY_TRANSPORTATION: 3
- A.NO_GENERAL_PURPOSE: 4
- A.PHYSICAL: 1
- A.PHYSICAL_ENVIRONMENT_MANAGEMENT_DEVICES: 3
- A.PHYSICAL_ENVIRONMENT_TOE: 3
- A.POLICIES_CONTINUITY: 3
- A.SECURED_MANAGEMENT_DEVICES: 3
- A.SGC_TO_FRONT-END: 3
- A.STAND_ALONE_CEC: 3
- A.SW_PROTECTION: 3
- A.TRUSTED_ADMIN: 4
- A.TRUSTED_NETWORKS: 4
- D:
- D.APPLICATIVE_DATA: 7
- D.AUDIT: 3
- D.AUTHENTICATION_DATA: 11
- D.CONFIG_PARAM: 22
- D.CRYPTO_KEY: 4
- D.CRYPTO_KEYS: 18
- D.CRYPTO_KEYS_PROTECTION_PWD: 3
- D.SECURITY_POLICIES: 23
- D.SOFTWARE: 4
- D.SOFTWARES: 3
- D.SUPERVISION_DATA: 3
- D.SWUPDATE_PUBLICKEYS: 5
- D.TIME_BASE: 8
- D.TOPOLOGIC_INFO: 5
- O:
- O.AUDIT: 12
- O.AUDIT_PROTECTION: 6
- O.AUTHENTICATION_FAILURE: 4
- O.CRYPTOPERIOD: 4
- O.CRYPTO_REGULATION: 7
- O.DATA_ERASURE: 6
- O.DISPLAY_BANNER: 6
- O.FLOW_PARTITIONING: 5
- O.KEYS_INJECTION: 5
- O.LED: 1
- O.LOCAL_DATA_PROTECTION: 11
- O.MANAGEMENT: 7
- O.POL_ENFORCEMENT: 6
- O.POL_VIEW: 7
- O.PROTECTED_COMMUNICATIONS: 11
- O.RESIDUAL_INFORMATION_CLEAR: 6
- O.ROLES: 4
- O.SELF_TEST: 7
- O.SESSION_LOCK: 6
- O.SOFTWARE_UPDATES: 5
- O.SUPERVISION: 5
- O.SUPERVISION_IMPACT: 4
- O.SYSTEM_MONITORING: 1
- O.TIME_BASE: 5
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- O.VIEW: 5
- O.VISUAL: 1
- O.VISUAL_ALARMS: 5
- OE:
- OE.ACCESS_CONTROL_CEC: 3
- OE.ACCESS_CONTROL_FPD: 3
- OE.ACCESS_CONTROL_NTP_SERVER: 2
- OE.ACCESS_CONTROL_SF: 2
- OE.ACCESS_CONTROL_SGC: 3
- OE.ACCESS_CONTROL_SGL: 2
- OE.ALARM: 3
- OE.AUDIT_ANALYSIS: 2
- OE.AUDIT_MNGT: 3
- OE.AUDIT_RECORD_SGC: 5
- OE.CEC_CRYPTO_REGULATION: 6
- OE.DISPLAY_BANNER_SGC: 3
- OE.KEYS_TRANSPORTATION: 1
- OE.KEY_TRANSPORTATION: 2
- OE.LINUX_GUIDANCE: 3
- OE.NO_GENERAL_PURPOSE: 1
- OE.NTP_SERVER_LOCATION: 2
- OE.PHYSICAL: 1
- OE.PHYSICAL_ENVIRONMENT_CEC: 3
- OE.PHYSICAL_ENVIRONMENT_FPD: 3
- OE.PHYSICAL_ENVIRONMENT_NTP_SERVER: 2
- OE.PHYSICAL_ENVIRONMENT_SF: 2
- OE.PHYSICAL_ENVIRONMENT_SGC: 3
- OE.PHYSICAL_ENVIRONMENT_SGL: 2
- OE.PHYSICAL_ENVIRONMENT_TOE: 3
- OE.POLICIES_CONTINUITY: 3
- OE.SECURED_CEC: 3
- OE.SECURED_FPD: 2
- OE.SECURED_NTP_SERVER: 3
- OE.SECURED_SGC: 3
- OE.SECURED_SGL: 2
- OE.SGC_TO_FRONT-END: 3
- OE.SGL_CONNECTION: 4
- OE.STAND_ALONE_CEC: 3
- OE.SW_PROTECTION: 3
- OE.SW_UPDATE_KEY: 3
- OE.TOE_INTEGRITY: 8
- OE.TOE_TRANSPORTATION: 3
- OE.TRUSTED_ADMIN: 6
- OE.TRUSTED_NETWORKS: 5
- R:
- R.ADMINISTRATOR: 13
- R.OPERATOR: 6
- R.SGC: 8
- R.SGL: 1
- T:
- T.ADMIN_ERROR: 4
- T.RESIDUAL_DATA: 3
- T.TIME_BASE: 3
- T.TSF_FAILURE: 4
- T.UNAUTHORISED_ACCESS: 3
- T.UNAUTHORISED_UPDATE: 3
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 4
- T.USER_DATA_REUSE: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 2
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 2
- SHA-384: 2
- SHA512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 2
- Key exchange: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 71
- IKEv1: 8
- IKEv2: 27
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 180-3: 4
- FIPS 186-4: 1
- FIPS 197: 4
- FIPS 198-1: 2
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- SP 800-107: 1
- RFC:
- RFC 1042: 1
- RFC 1213: 1
- RFC 2408: 1
- RFC 2409: 1
- RFC 3566: 4
- RFC 3602: 3
- RFC 4106: 1
- RFC 4109: 1
- RFC 4303: 2
- RFC 4868: 3
- RFC 5639: 1
- RFC 5903: 1
- RFC 5996: 4
- RFC 894: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Mistral IP system are considered as part of the operational environment. Thus, those equipments are out of scope of the Target of Evaluation described in this Security Target. In particular, the Mistral: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: A.Iwasaki
- /Company: Pigs, Inc.
- /CreationDate: D:20050214174331+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20050214175221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20050214052924
- /Subject: デジタル複合機データセキュリティキット
- /Title: セキュリティターゲット
- /_AdHocReviewCycleID: -4335251
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Yamanaka Toshihiro/副参事
- /_EmailSubject: NIAPへの認証製品掲載の件
- pdf_file_size_bytes: 552988
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.3
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.04
- /Subject:
- /Title:
- pdf_file_size_bytes: 942738
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 128
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |