Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft Windows 10 version 1909 and Microsoft Windows Server version 1909
2019-47-INF-3134
EPSON LM-C400/AM-C550/AM-C400 with FAX Ver.1.00
JISEC-CC-CRP-C0832
name Microsoft Windows 10 version 1909 and Microsoft Windows Server version 1909 EPSON LM-C400/AM-C550/AM-C400 with FAX Ver.1.00
category Operating Systems Multi-Function Devices
scheme ES JP
not_valid_after 05.06.2025 19.11.2029
not_valid_before 05.06.2020 19.11.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-47_Certificate.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-47-INF-3134.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-47-ST-lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_est.pdf
manufacturer Microsoft Corporation SEIKO EPSON CORPORATION
manufacturer_web https://www.microsoft.com https://www.epson.com/
security_level {} EAL2, ALC_FLR.2
dgst 03f18b362454d73e 353b43f9ad2ee96e
heuristics/cert_id 2019-47-INF-3134 JISEC-CC-CRP-C0832
heuristics/cpe_matches cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.753:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2212:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.753:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.592:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.719:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1646:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.476:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.900:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1977:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2212:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.900:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.778:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.836:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.628:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.752:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.997:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.693:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1766:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.959:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1977:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1714:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2039:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.592:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2037:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.900:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1832:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.719:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1714:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.904:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2039:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.719:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1646:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.657:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2094:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.836:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1714:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.720:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2037:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.997:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.778:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.815:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.752:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.904:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1646:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.815:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2212:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.836:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1766:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.535:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2094:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1832:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.476:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.752:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2158:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.959:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.592:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.693:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2158:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.904:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.476:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.628:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.778:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.535:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1832:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.720:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.753:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.959:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.815:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2039:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.693:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.657:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.535:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1977:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2094:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2158:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.997:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.657:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2037:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.628:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.720:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1766:*:*:*:*:*:x86:* {}
heuristics/related_cves CVE-2021-33742, CVE-2022-26923, CVE-2021-34484, CVE-2021-31199, CVE-2022-24521, CVE-2022-21882, CVE-2021-40444, CVE-2022-21999, CVE-2021-1675, CVE-2021-31956, CVE-2021-36955, CVE-2021-33739, CVE-2021-36934, CVE-2021-41379, CVE-2021-34486, CVE-2022-22718, CVE-2022-21919, CVE-2021-31201, CVE-2022-26934, CVE-2021-36948, CVE-2021-33771, CVE-2021-40449, CVE-2022-21971, CVE-2021-40450, CVE-2022-26904, CVE-2021-31955, CVE-2021-34448, CVE-2022-26925, CVE-2021-31979, CVE-2022-21871 {}
heuristics/extracted_sars ASE_OBJ.2, ASE_TSS.1, ALC_CMS.1, ASE_REQ.2, AVA_VAN.1, ATE_IND.1, ASE_CCL.1, AGD_PRE.1, ALC_TSU_EXT.1, ALC_CMC.1, ASE_INT.1, ADV_FSP.1, AGD_OPE.1, ASE_SPD.1, ASE_ECD.1 ATE_IND.2, ASE_CCL.1, ALC_CMS.2, AGD_OPE.1, ASE_SPD.1, AVA_VAN.2, ASE_OBJ.2, ADV_ARC.1, ALC_CMC.2, ATE_FUN.1, ASE_INT.1, ASE_TSS.1, ADV_FSP.2, ASE_REQ.2, ALC_FLR.2, ALC_DEL.1, AGD_PRE.1, ATE_COV.1, ADV_TDS.1, ASE_ECD.1
heuristics/extracted_versions 1909, 10 1.00
heuristics/scheme_data
  • category: Operating systems
  • certification_date: 05.06.2020
  • enhanced:
  • manufacturer: Microsoft Corp.
  • product: Microsoft Windows 10 version 1909 and Microsoft Windows Server version 1909
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/565-microsoft-windows-10-version-1909-and-microsoft-windows-server-version-1909
  • cert_id: JISEC-CC-CRP-C0832
  • certification_date: 01.11.2024
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0832
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral (MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE security functionality The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
    • evaluation_facility: Information Technology Security Center, Evaluation Department
    • expiration_date: 19.11.2029
    • product: EPSON LM-C400/AM-C550/AM-C400 with FAX
    • product_type: Multifunction Peripheral
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_est.pdf
    • toe_version: 1.00
    • vendor: SEIKO EPSON CORPORATION
  • expiration_date: 01.11.2029
  • supplier: SEIKO EPSON CORPORATION
  • toe_japan_name: EPSON LM-C400 / AM-C550 / AM-C400 with FAX 1.00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0832_it4873.html
  • toe_overseas_name: EPSON LM-C400 / AM-C550 / AM-C400 with FAX 1.00
heuristics/protection_profiles c88af12926be2779, e34797b67a3163c5, f4474c6c73660987 43ce79b420f23a00
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf
pdf_data/cert_filename 2019-47_Certificate.pdf c0832_eimg.pdf
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL4: 1
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
  • Microsoft:
    • Microsoft: 5
    • Microsoft Corporation: 1
pdf_data/cert_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 1
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_metadata
  • /CreationDate: D:20200522084033+02'00'
  • pdf_file_size_bytes: 765746
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: Information-technology Promotion Agency,Japan
  • /CreationDate: D:20250109162218+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /ModDate: D:20250130161540+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /Subject:
  • /Title: C0832_Certificate_01
  • pdf_file_size_bytes: 234858
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename 2019-47-INF-3134.pdf c0832_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2019-47-INF-3134-v1: 1
  • JP:
    • JISEC-CC-CRP-C0832-01-2024: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_FLR: 2
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 5
    • FAU_SEL.1: 2
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.2: 3
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.4: 2
    • FCS_COP.1: 8
    • FCS_DTLS_EXT.1: 2
    • FCS_RBG_EXT.1: 2
    • FCS_STO_EXT.1: 2
    • FCS_TLSC_EXT.1: 3
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.3: 2
    • FCS_TLSC_EXT.4: 2
  • FDP:
    • FDP_ACF_EXT.1: 2
    • FDP_IFC_EXT.1: 4
    • FDP_RIP.2: 2
  • FIA:
    • FIA_AFL.1: 2
    • FIA_PAE_EXT.1: 1
    • FIA_PSK_EXT.1: 2
    • FIA_UAU.5: 2
  • FMT:
    • FMT_MOF_EXT.1: 2
    • FMT_SMF.1: 2
    • FMT_SMF_EXT.1: 3
  • FPT:
    • FPT_ACF_EXT.1: 2
    • FPT_ASLR_EXT.1: 2
    • FPT_SBOP_EXT.1: 2
    • FPT_SRP_EXT.1: 2
    • FPT_TST_EXT.1: 5
    • FPT_TUD_EXT.1: 2
    • FPT_TUD_EXT.2: 2
  • FTA:
    • FTA_TAB.1: 2
    • FTA_WSE_EXT.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_ITC_EXT.1: 5
    • FTP_TRP.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 4
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 50
    • Microsoft Corporation: 3
  • Samsung:
    • Samsung: 4
  • Microsoft:
    • Microsoft: 13
pdf_data/report_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 4
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • IPsec:
    • IPsec: 11
  • TLS:
    • DTLS:
      • DTLS: 5
    • TLS:
      • TLS: 12
  • VPN:
    • VPN: 15
  • IPsec:
    • IPsec: 4
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • X509:
    • X.509: 8
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_metadata
  • /CreationDate: D:20200604123324+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20200604123324+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 945038
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.sogis.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
  • /CreationDate: D:20250109170129+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 20
  • /ModDate: D:20250130161123+09'00'
  • /Producer: Adobe PDF Library 20.5.172
  • /Title:
  • pdf_file_size_bytes: 438507
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
pdf_data/st_filename 2019-47-ST-lite.pdf c0832_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 28
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 5
    • FAU_SEL: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
  • FCS:
    • FCS_CKM: 15
    • FCS_CKM.1: 42
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 28
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 2
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.2: 6
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 3
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 70
    • FCS_COP.1.1: 5
    • FCS_DTLS_EXT: 1
    • FCS_DTLS_EXT.1: 9
    • FCS_DTLS_EXT.1.1: 2
    • FCS_DTLS_EXT.1.2: 2
    • FCS_IPSC_EXT.1: 2
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_STO_EXT: 1
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 1
    • FCS_TLCS_EXT: 1
    • FCS_TLCS_EXT.1: 1
    • FCS_TLSC: 2
    • FCS_TLSC_EXT: 9
    • FCS_TLSC_EXT.1: 19
    • FCS_TLSC_EXT.1.1: 3
    • FCS_TLSC_EXT.1.2: 3
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.1.5: 1
    • FCS_TLSC_EXT.2: 15
    • FCS_TLSC_EXT.2.1: 2
    • FCS_TLSC_EXT.3: 9
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.4: 8
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 2
    • FCS_TLS_EXT.2: 2
    • FCS_TLS_EXT.3: 1
  • FDP:
    • FDP_ACF_EXT: 1
    • FDP_ACF_EXT.1: 7
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 20
    • FDP_IFC_EXT.1.1: 2
    • FDP_RDP.2: 1
    • FDP_RIP: 1
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_PAE_EXT: 1
    • FIA_PAE_EXT.1: 8
    • FIA_PAE_EXT.1.1: 1
    • FIA_PSK_EXT: 1
    • FIA_PSK_EXT.1: 7
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_UAU: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF_EXT.1: 8
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMF_EXT: 8
    • FMT_SMF_EXT.1: 20
    • FMT_SMF_EXT.1.1: 3
  • FPT:
    • FPT_ACF_EXT: 1
    • FPT_ACF_EXT.1: 7
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 7
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT: 1
    • FPT_SBOP_EXT.1: 7
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT: 1
    • FPT_SRP_EXT.1: 7
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT: 6
    • FPT_TST_EXT.1: 30
    • FPT_TST_EXT.1.1: 3
    • FPT_TST_EXT.1.2: 2
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 13
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 8
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 2
    • FTA_WSE_EXT.1: 9
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC_EXT: 3
    • FTP_ITC_EXT.1: 29
    • FTP_ITC_EXT.1.1: 3
    • FTP_ITC_EXT.1.2: 1
    • FTP_TRP: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 24
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 24
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 26
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 26
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 33
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 12
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_TOE_BYPASS: 6
    • A.PHYSICAL: 3
    • A.PLATFORM: 3
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ACCOUNTABILITY: 11
    • O.AUTH_COMM: 4
    • O.CRYPTOGRAPHIC_FUNCTIONS: 3
    • O.INTEGRITY: 11
    • O.MANAGEMENT: 10
    • O.PROTECTED_COMMS: 10
    • O.PROTECTED_STORAGE: 5
    • O.SYSTEM_MONITORING: 4
    • O.TOE_ADMINISTRATION: 4
    • O.TSF_SELF_TEST: 4
    • O.WIRELESS_ACCESS_POINT_: 1
    • O.WIRELESS_ACCESS_POINT_CO: 2
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.NO_TOE_BYPASS: 6
    • OE.PHYSICAL: 3
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
    • OE.TRUSTED_ADMIN: 3
    • OE.TRUSTED_CONFIG: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 2
    • T.LOCAL_ATTACK: 5
    • T.NETWORK_ATTACK: 7
    • T.NETWORK_EAVESDROP: 6
    • T.TSF_CONFIGURATION: 2
    • T.TSF_FAILURE: 4
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNAUTHORIZED_UPDATE: 2
    • T.UNDETECTED_ACTIONS: 2
    • T.USER_DATA_REUSE: 2
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 11
    • D.DOC: 42
    • D.FUNC: 26
    • D.PROT: 8
  • O:
    • O.AUDIT: 5
    • O.AUDIT_ACCESS: 4
    • O.AUDIT_STORAGE: 4
    • O.CONF: 10
    • O.DOC: 10
    • O.FUNC: 5
    • O.INTERFACE: 5
    • O.PROT: 5
    • O.SOFTWARE: 5
    • O.USER: 11
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_STORAGE: 2
    • OE.INTERFACE: 3
    • OE.PHISICAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 230
    • Microsoft Corporation: 5
  • Samsung:
    • Samsung: 4
  • Microsoft:
    • Microsoft: 7
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 27
      • AES-: 1
      • AES-128: 1
      • AES-256: 4
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 16
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 12
    • ECDH:
      • ECDH: 4
      • ECDHE: 7
    • ECDSA:
      • ECDSA: 21
  • FF:
    • DH:
      • DH: 11
      • DHE: 4
      • Diffie-Hellman: 11
    • DSA:
      • DSA: 9
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
      • SHA1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-256: 13
      • SHA-384: 3
      • SHA-512: 3
      • SHA256: 4
      • SHA384: 3
      • SHA512: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 23
  • MAC:
    • MAC: 21
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 49
    • IKEv1: 28
    • IKEv2: 24
  • IPsec:
    • IPsec: 214
  • PGP:
    • PGP: 1
  • TLS:
    • DTLS:
      • DTLS: 23
      • DTLS 1.0: 2
      • DTLS 1.2: 3
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 104
      • TLS 1.0: 3
      • TLS 1.1: 3
      • TLS 1.2: 5
  • VPN:
    • VPN: 134
  • IPsec:
    • IPsec: 19
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
    • PRNG: 2
  • RNG:
    • RBG: 14
    • RNG: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 1
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 20
    • P-384: 20
    • P-521: 14
    • secp256r1: 3
    • secp384r1: 3
    • secp521r1: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_NULL_WITH_NULL_NULL: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 5
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 1
    • FIPS 180-4: 1
    • FIPS 186-4: 16
    • FIPS 197: 2
    • FIPS 198-1: 1
    • FIPS 198-2: 1
    • FIPS PUB 186-4: 8
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 2900-2: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38C: 3
    • NIST SP 800-38D: 2
    • NIST SP 800-38E: 2
    • NIST SP 800-38F: 3
    • NIST SP 800-56A: 2
    • NIST SP 800-56B: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90: 1
    • NIST SP 800-90A: 1
    • NIST SP 800-90B: 1
    • SP 800-56A: 1
    • SP 800-90: 1
  • PKCS:
    • PKCS #7: 1
  • RFC:
    • RFC 2246: 3
    • RFC 2396: 1
    • RFC 2404: 1
    • RFC 2408: 1
    • RFC 2560: 1
    • RFC 2818: 1
    • RFC 3268: 1
    • RFC 3394: 1
    • RFC 3526: 2
    • RFC 3546: 2
    • RFC 3602: 1
    • RFC 4106: 1
    • RFC 4109: 1
    • RFC 4301: 5
    • RFC 4303: 1
    • RFC 4304: 1
    • RFC 4306: 1
    • RFC 4346: 1
    • RFC 4347: 1
    • RFC 4366: 1
    • RFC 4492: 1
    • RFC 4681: 1
    • RFC 4868: 3
    • RFC 4945: 1
    • RFC 5216: 1
    • RFC 5246: 15
    • RFC 5280: 7
    • RFC 5288: 8
    • RFC 5289: 18
    • RFC 5430: 2
    • RFC 5759: 1
    • RFC 6066: 1
    • RFC 6125: 1
    • RFC 6347: 2
    • RFC 6379: 1
    • RFC 7296: 2
  • X509:
    • X.509: 27
    • x.509: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • kernel. Software loaded for execution directly by the platform (e.g. first-stage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will: 1
    • out of scope: 2
pdf_data/st_metadata
  • /CreationDate: D:20241209132032+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_ContentBits: 2
  • /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_Enabled: true
  • /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_Method: Standard
  • /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_SiteId: 3ce358ea-700e-4f0f-bb37-fd0b7c21366c
  • /ModDate: D:20250130161243+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 1302442
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 71
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different