name |
bizhub C652 / bizhub C552 / ineo+ 652 / ineo+ 552 / VarioLink 6522c / VarioLink 5522c Control Software Version:A0P00Y0-0100-GM0-02 |
HUAWEI NE9000 Router |
category |
Multi-Function Devices |
Network and Network-Related Devices and Systems |
scheme |
JP |
NO |
status |
archived |
archived |
not_valid_after |
15.04.2011 |
04.07.2023 |
not_valid_before |
29.06.2009 |
04.07.2018 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180704%20S114%20C.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0217_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-114%20CR%20v1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0217_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/180515%20[HUA]%20[ST]%20NE9000%20V800R010C00%20CC%20ST-Security%20Target%20V1.8.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Huawei Technologies Co. Ltd. |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.huawei.com |
security_level |
EAL3 |
EAL2+, ALC_FLR.2 |
dgst |
0f69329926ab9ff1 |
9fb03fdcc2cd9b97 |
heuristics/cert_id |
JISEC-CC-CRP-C0217 |
SERTIT-114 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:h:huawei:e9000:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ALC_DVS.1, ASE_OBJ.2, ALC_CMS.3, AVA_VLA.1, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, ATE_FUN.1, ALC_CMC.3, ATE_DPT.1, ADV_FSP.3, ADV_TDS.2, ATE_COV.2, ASE_ECD.1, ASE_REQ.2, ALC_LCD.1, ASE_TSS.1, ASE_INT.1, ASE_CCL.1, AGD_OPE.1 |
ATE_COV.1, ADV_ARC.1, ALC_CMS.2, ADV_FSP.2, ALC_CMC.2, ASE_OBJ.2, ALC_FLR.2, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, ALC_DEL.1, ATE_FUN.1, AVA_VAN.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_INT.1, ASE_CCL.1, ADV_TDS.1, AGD_OPE.1 |
heuristics/extracted_versions |
652, 0100, 02, 552 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0217
- certification_date: 01.06.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as "MFP") or through the network and supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in MFP, TOE can encrypt all the data written in HDD including image data using ASIC (Application Specific Integrated Circuit). Besides, TOE has a deletion method compliant with various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator function - SNMP administrator function - Service mode function - User function - User box function - Secure print function - ID & print function - All area overwrite deletion function - Encryption key generation function - Authentication Failure Frequency Reset function - Trusted Channel function - S/MIME encryption processing function - External Server authentication operation support function - ASIC support function - WebDAV administrator function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese : bizhub C652 / bizhub C552 / ineo+ 652 / ineo+ 552 / VarioLink 6522c / VarioLink 5522c Zentai Seigyo Software English : bizhub C652 / bizhub C552 / ineo+ 652 / ineo+ 552 / VarioLink 6522c / VarioLink 5522c Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0217_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0217_est.pdf
- toe_version: A0P00Y0-0100-GM0-02
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.04.2011
- revalidations: [frozendict({'date': '2009-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0217_it8237_01.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C652 / bizhub C552 / ineo+ 652 / ineo+ 552 VarioLink 6522c / VarioLink 5522c Zentai Seigyo Software A0P00Y0-0100-GM0-02
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0217_it8237.html
- toe_overseas_name: bizhub C652 / bizhub C552 / ineo+ 652 / ineo+ 552 VarioLink 6522c / VarioLink 5522c Control Software A0P00Y0-0100-GM0-04
|
- category: Network and Network-Related Devices and Systems
- certification_date: 04.07.2018
- developer: Huawei Technologies Co. , Ltd.
- enhanced:
- category: Network and Network-Related Devices and Systems
- cert_id: SERTIT-114
- certification_date: 04.07.2018
- description: The HUAWEI NE9000 Core Router (NE9000) is a large-capacity and high-performance router designed by HUAWEI to provide carrier-class reliability. Based on the powerful versatile routing platform (VRP), the NE9000 provides strong switching capabilities, dense ports, and high reliability. NE9000s mainly serve as super-core nodes on carriers' backbone networks, core nodes on metropolitan area networks (MANs), egresses in large-scale Internet Data Centers (IDCs), and core nodes on large-scale enterprise networks. The NE9000 can be flexibly deployed at the edge or core of IP/MPLS networks to simplify the network structure and provide an extensive range of services and reliable service quality. The NE9000 is driving IP/MPLS bearer networks to develop greater broadband capacities and to become more secure, intelligent, and service-oriented.
- developer: Huawei Technologies Co. , Ltd.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135361-1607953962/SERTIT/Sertifikater/2018/114/20180704%20S114%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135364-1607953964/SERTIT/Sertifikater/2018/114/180515%20%5BHUA%5D%20%5BST%5D%20NE9000%20V800R010C00%20CC%20ST-Security%20Target%20V1.8.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135367-1607953969/SERTIT/Sertifikater/2018/114/SERTIT-114%20CR%20v1.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- expiration_date: 04.07.2023
- level: EAL 2, ALC_FLR.2
- mutual_recognition: CCRA, SOG-IS
- product: V800R010C00SPC200
- sponsor: Huawei Technologies Co., Ltd.
- product: HUAWEI NE9000 Router
- url: https://sertit.no/certified-products/product-archive/huawei-ne9000-router
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
20180704 S114 C.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- pdf_file_size_bytes: 742664
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0217_erpt.pdf |
SERTIT-114 CR v1.0.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0217-01: 1
- Certification No. C0217: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 3
- EAL 2+: 21
- EAL 4: 1
- EAL1: 1
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 1
- FAU_SAR.3: 1
- FAU_STG.1: 1
- FAU_STG.3: 1
- FCS:
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_DAU.1: 1
- FDP_IFC.1: 2
- FDP_IFF.1: 2
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_SOS.1: 1
- FIA_UAU.1: 1
- FIA_UAU.5: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTA_SSL.3: 1
- FTA_TSE.1: 1
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-GROUP-BOX: 2
- T.ACCESS-PRIVATE-BOX: 2
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 2
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRANSMISSION: 2
|
|
pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 6
- Huawei Technologies: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- X509:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
|
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20090804140613+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20090804140640+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20090804050513
- /Title: CRP-e
- pdf_file_size_bytes: 559443
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
- /CreationDate: D:20180704205712Z00'00'
- /Creator: Word
- /ModDate: D:20180704205712Z00'00'
- /Producer: Mac OS X 10.13.5 Quartz PDFContext
- /Title: Microsoft Word - SERTIT-114 CR v1.0.docx
- pdf_file_size_bytes: 1602449
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
c0217_est.pdf |
180515 [HUA] [ST] NE9000 V800R010C00 CC ST-Security Target V1.8.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 2
- EAL2 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 71
- FDP_ACC.1.1: 4
- FDP_ACF.1: 54
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ACP.1: 1
- FDP_IFC.1: 6
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 72
- FIA_AFL.1.1: 9
- FIA_AFL.1.2: 9
- FIA_ATD.1: 26
- FIA_ATD.1.1: 1
- FIA_MSA.3: 1
- FIA_SOS: 1
- FIA_SOS.1: 45
- FIA_SOS.1.1: 5
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU.1: 25
- FIA_UAU.2: 68
- FIA_UAU.2.1: 6
- FIA_UAU.6: 17
- FIA_UAU.6.1: 1
- FIA_UAU.7: 21
- FIA_UAU.7.1: 1
- FIA_UID.1: 31
- FIA_UID.2: 52
- FIA_UID.2.1: 7
- FIA_USB.1: 23
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 31
- FMT_MOF.1.1: 3
- FMT_MSA: 4
- FMT_MSA.1: 34
- FMT_MSA.1.1: 3
- FMT_MSA.3: 40
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 7
- FMT_MTD.1: 109
- FMT_MTD.1.1: 12
- FMT_SMF.1: 108
- FMT_SMF.1.1: 1
- FMT_SMR.1: 169
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SMS.1: 1
- FMT_SOS.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 3
- FAU_SAR.3.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 3
- FAU_STG.3.1: 1
- FCS:
- FCS_CKM: 37
- FCS_CKM.1: 8
- FCS_CKM.1.1: 4
- FCS_CKM.2: 4
- FCS_CKM.4: 3
- FCS_CKM.4.1: 4
- FCS_COP: 16
- FCS_COP.1: 4
- FCS_COP.1.1: 5
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 7
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_IFC.1: 17
- FDP_IFC.1.1: 2
- FDP_IFF.1: 16
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 11
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.3: 11
- FMT_MSA.3.2: 1
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_TSE.1: 4
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.NETWORK: 4
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.AUTH-CAPABILITY: 10
- O.CONFIG: 11
- O.CRYPT-KEY: 3
- O.CRYPTO-CAPABILITY: 4
- O.CRYPTO-KEY: 1
- O.CRYPTO-MAIL: 4
- O.GROUP-BOX: 5
- O.OVERWRITE-ALL: 7
- O.PRIVATE-BOX: 5
- O.PUBLIC-BOX: 8
- O.REGISTERED-USER: 14
- O.SECURE-PRINT: 8
- O.TRUSTED-PASS: 7
- OE:
- OE.ADMIN: 2
- OE.FEED-BACK: 10
- OE.NETWORK: 2
- OE.SECRET: 2
- OE.SERVER: 5
- OE.SERVICE: 2
- OE.SESSION: 9
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS-GROUP-BOX: 3
- T.ACCESS-PRIVATE-BOX: 3
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTED-TRANSMISSION: 3
|
|
pdf_data/st_keywords/vendor |
|
- Huawei:
- Huawei: 48
- Huawei Technologies Co: 47
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 186-2: 6
- FIPS PUB 197: 3
- X509:
|
- FIPS:
- PKCS:
- RFC:
- RFC 1321: 1
- RFC 2104: 1
- RFC 4253: 2
- RFC3447: 1
- RFC4419: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
|
|
pdf_data/st_metadata |
- /Author:
- /Company:
- /CreationDate: D:20090804140959+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /ModDate: D:20090804141225+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20090722093048
- /Title:
- pdf_file_size_bytes: 1298629
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 109
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |