Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
2019-7-INF-4068
bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 ControlSoftware
JISEC-CC-CRP-C0126
name Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230 bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 ControlSoftware
category Other Devices and Systems Multi-Function Devices
scheme ES JP
status active archived
not_valid_after 21.09.2028 28.12.2010
not_valid_before 21.06.2023 26.11.2007
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07-INF-4068.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0126_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0126_est.pdf
manufacturer Huawei Technologies Co., Ltd. Konica Minolta Business Technologies, Inc
manufacturer_web https://www.huawei.com https://www.konicaminolta.com/
security_level EAL4+, ALC_FLR.1 EAL3
dgst 0e8a25a9fbdc32c5 060aadeb6ceeb09c
heuristics/cert_id 2019-7-INF-4068 JISEC-CC-CRP-C0126
heuristics/extracted_sars ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_INT.1, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ADV_ARC.1, ADV_IMP.1, ASE_CCL.1, AVA_VAN.3, ASE_REQ.2 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1
heuristics/extracted_versions - 203, 253
heuristics/scheme_data
  • category: Others
  • certification_date: 21.06.2023
  • enhanced:
    • category: Others
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1852
    • certification_date: 21.06.2023
    • description: The TOE is server service software that is deployed on CloudOS, which serves as a united network controller (UNC). UNC authenticates mobile subscribers onto the network system and tracks active and idle subscribers on the network system. UNC pages mobile subscribers when it is triggered by new data arriving for an idle subscriber at the assigned Serving GW (gateway). When a subscriber attaches to an eNodeB, the eNodeB select a UNC. UNC in turn selects the Serving GW and the PDN GW that will handle bearer packets of the subscriber. There are procedures to relocate a subscriber to a new UNC (and potentially a new Serving GW), when an active or idle subscriber moves to a new area outside of the current UNC control.
    • evaluation_facility: DEKRA Testing and Certification S.A.U.
    • level: EAL4 + ALC_FLR.1
    • manufacturer: Huawei Technologies Co., Ltd.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1853
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1851
    • type: Product
  • manufacturer: Huawei Technologies Co., Ltd.
  • product: Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/995-huawei-unc-v001r001c20spc200-with-patch-v100r001c20sph230
  • cert_id: JISEC-CC-CRP-C0126
  • certification_date: 01.11.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0126_eimg.pdf
    • description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203)(Hereinafter referred to as “MFP”). This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 Control Software (Japanese Name) bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 Control Software (English Name)
    • product_type: IT Product (data protection function in digital MFD)
    • report_link: https://www.ipa.go.jp/en/security/c0126_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0126_est.pdf
    • toe_version: A02E0Y0-0100-GN0-02
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.01.2011
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 Control Software A02E0Y0-0100-GN0-02
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0126_it7141.html
  • toe_overseas_name: bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 Control Software A02E0Y0-0100-GN0-02
pdf_data/cert_filename 2019-07_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.1: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • R:
    • R.C: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 2
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 934591
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 2019-07-INF-4068.pdf 20080306_c0126_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2019-7-INF-4068- v1: 1
  • JP:
    • CRP-C0126-01: 1
    • Certification No. C0126: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL4: 8
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 9
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
    • FAU_STG.1: 1
  • FDP:
    • FDP_ACC.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.4: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1: 1
  • FTA:
    • FTA_MCS: 2
    • FTA_SSL.3: 1
  • FTP:
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 4
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVER: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-NET: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.BACKUP: 1
    • T.BRING-OUT: 1
    • T.DISCARD-MFP: 1
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 20
    • Huawei Technologies Co: 3
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 2
  • SHA:
    • SHA1:
      • SHA-1: 4
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 3
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 180-1: 1
    • FIPS 186: 1
    • FIPS 186-1: 1
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 203) (Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
pdf_data/report_metadata
  • /CreationDate: D:20080305165317+09'00'
  • /ModDate: D:20080305165317+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 309885
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
pdf_data/st_filename 2019-07_ST.pdf 20080306_c0126_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
  • EAL:
    • EAL3: 6
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 2
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 4
    • FAU_STG.3.1: 1
  • FDP:
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UAU.4: 4
    • FIA_UAU.4.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 4
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SAE.1: 3
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FTA:
    • FTA_MCS: 10
    • FTA_MCS.1.1: 2
    • FTA_MCS.1.2: 2
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 50
    • FDP_ACC.1.1: 3
    • FDP_ACF: 3
    • FDP_ACF.1: 48
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 3
    • FDP_IFC.1: 3
    • FDP_ITC: 1
    • FDP_ITC.1: 5
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 87
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 12
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 67
    • FIA_SOS.1.1: 7
    • FIA_SOS.2: 11
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU: 11
    • FIA_UAU.1: 17
    • FIA_UAU.2: 119
    • FIA_UAU.2.1: 7
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 17
    • FIA_UAU.7.1: 2
    • FIA_UID: 16
    • FIA_UID.1: 21
    • FIA_UID.2: 62
    • FIA_UID.2.1: 7
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MAS.1: 1
    • FMT_MOF.1: 111
    • FMT_MOF.1.1: 3
    • FMT_MSA: 12
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 191
    • FMT_MTD.1.1: 13
    • FMT_SMF: 19
    • FMT_SMF.1: 41
    • FMT_SMF.1.1: 1
    • FMT_SMR: 23
    • FMT_SMR.1: 112
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
  • FPT:
    • FPT_RVM.1: 19
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECU: 1
    • A.ADMIN_CREDENTIALS_SECURE: 2
    • A.COMPONENTS_RUNNING: 3
    • A.ENVIRONMENT_ACL: 3
    • A.LIMITED_FUNCTIONALITY: 3
    • A.NETWORK_SEGREGATION: 3
    • A.PHYSICAL_PROTECTION: 3
    • A.RESIDUAL_INFORMATION: 3
    • A.TIME: 3
    • A.TRUSTED_ADMINISTRATOR: 3
  • O:
    • O.AUDIT: 5
    • O.COMMUNICA: 1
    • O.COMMUNICATI: 1
    • O.COMMUNICATION: 5
    • O.IDAUTH: 8
  • OE:
    • OE.ADMIN_CRE: 1
    • OE.ADMIN_CREDENTI: 2
    • OE.ADMIN_CREDENTIALS_SEC: 2
    • OE.COMPONEN: 1
    • OE.COMPONENTS_RU: 1
    • OE.COMPONENTS_RUNNING: 1
    • OE.ENVIRONM: 1
    • OE.ENVIRONMENT_AC: 1
    • OE.ENVIRONMENT_ACL: 1
    • OE.LIMITED_FU: 1
    • OE.LIMITED_FUNCTIO: 1
    • OE.LIMITED_FUNCTIONALITY: 1
    • OE.NETWORK_: 1
    • OE.NETWORK_SEGRE: 1
    • OE.NETWORK_SEGREGATION: 1
    • OE.NETWOR_SEGREG: 1
    • OE.NETWOR_SEGREGATION: 1
    • OE.PHYSICAL: 4
    • OE.RESIDUAL_I: 1
    • OE.RESIDUAL_INFOR: 3
    • OE.RESIDUAL_INFORMATION: 3
    • OE.TIME: 7
    • OE.TRUSTED_A: 1
    • OE.TRUSTED_ADMIN: 4
  • OSP:
    • OSP: 1
    • OSP.AUDIT: 4
  • T:
    • T.UNAUTHORIZED_: 2
    • T.UNAUTHORIZED_ADMINISTR: 1
    • T.UNTRUSTED_COMMUNICATI: 2
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.WEAK_AUTHENTICATION_E: 2
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 3
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 2
    • A.SERVER: 1
    • A.SETTING: 1
  • O:
    • O.CHECK-HDD: 5
    • O.CONFIG: 9
    • O.CRYPT-KEY: 1
    • O.CRYPTO-MAIL: 6
    • O.GROUP-BOX: 4
    • O.OVERWRITE-ALL: 5
    • O.PRIVATE-BOX: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED-USER: 12
    • O.SECURE-PRINT: 6
    • O.TRUSTED-PASS: 3
  • OE:
    • OE.CRYPT: 5
    • OE.FEED-BACK: 12
    • OE.LOCK-HDD: 1
    • OE.SESSION: 1
  • T:
    • T.ACCESS-GROUP-BOX: 2
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.DISCARD-MFP: 1
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 23
    • Huawei Technologies Co: 3
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • constructions:
    • MAC:
      • HMAC: 4
  • AES_competition:
    • AES:
      • AES: 7
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 3
      • SHA384: 1
  • SHA:
    • SHA1:
      • SHA-1: 8
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 45
  • TLS:
    • SSL:
      • SSL: 12
    • TLS:
      • TLS: 33
      • TLS1.2: 1
  • VPN:
    • VPN: 1
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • GCM:
    • GCM: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS 186: 4
    • FIPS 186-1: 2
    • FIPS PUB 197: 5
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
pdf_data/st_metadata
  • /Author:
  • /Company:
  • /CreationDate: D:20080304171807+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20080304171946+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - 【C0126】Thames2_英文ST-1.03-080304.doc
  • /_AdHocReviewCycleID: -1264862075
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: megumi tanabe
  • /_EmailSubject: 【Mosel ISO15408】 ST翻訳確認のお願い
  • pdf_file_size_bytes: 927101
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 131
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different