name |
bizhub C550 / bizhub C451 / ineo+ 550 / ineo+ 451 Control Software v A00H0Y0-0100-GM0-00 |
Cisco HyperFlex Systems HX Series |
category |
Multi-Function Devices |
Other Devices and Systems |
scheme |
JP |
NO |
status |
archived |
archived |
not_valid_after |
28.12.2010 |
06.11.2022 |
not_valid_before |
29.10.2007 |
06.11.2017 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Sertit-095%20C.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080303_c0120_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-095%20Cisco%20HyperFlex%20Systems%20HX%20Series%20CR%20v1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080303_c0120_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HyperFlex-HX_SecurityTarget_v1.0.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Cisco Systems, Inc. |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.cisco.com |
security_level |
EAL3 |
EAL2 |
dgst |
1011e1c06f0da6a5 |
6bb29b901b2e557c |
heuristics/cert_id |
JISEC-CC-CRP-C0120 |
SERTIT-095 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_ADM.1, ATE_DPT.1, AVA_VLA.1, ALC_DVS.1, ADV_RCR.1, ADV_HLD.2, ATE_COV.2, AVA_MSU.1, ADV_FSP.1, ATE_IND.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1 |
ALC_CMC.2, ATE_COV.1, ALC_CMS.2, AVA_VAN.2, ADV_ARC.1, ATE_IND.2, AGD_OPE.1, ATE_FUN.1, ADV_FSP.2, ADV_TDS.1, AGD_PRE.1, ALC_DEL.1 |
heuristics/extracted_versions |
550, 451, 00, 0100 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0120
- certification_date: 01.10.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0120_eimg.pdf
- description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C550 / bizhub C451 / ineo+ 550 / ineo+ 451)(Hereinafter referred to as “MFP”). This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: bizhub C550 / bizhub C451 / ineo+ 550 / ineo+ 451 Control Software
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0120_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0120_est.pdf
- toe_version: A00J0Y0-0100-GM0-00
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.01.2011
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C550 / bizhub C451 / ineo+ 550 / ineo+ 451 Control Software A00J0Y0-0100-GM0-00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0120_it7130.html
- toe_overseas_name: bizhub C550 / bizhub C451 / ineo+ 550 / ineo+ 451 Control Software A00J0Y0-0100-GM0-00
|
- category: Other Devices and Systems
- certification_date: 06.11.2017
- developer: Cisco Inc.
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-095
- certification_date: 06.11.2017
- description: The TOE is the Cisco HyperFlex Systems HX Series, a hyper-convergent software-centric solution that tightly integrates computing, storage, networking and virtualization resources in a single hardware platform.
- developer: Cisco Inc.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135214-1607953351/SERTIT/Sertifikater/2017/95/Sertit-095%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135220-1607953358/SERTIT/Sertifikater/2017/95/HyperFlex-HX_SecurityTarget_v1.0.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/135217-1607953353/SERTIT/Sertifikater/2017/95/HyperFlex-HX_SecurityTarget_v2.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135211-1607953348/SERTIT/Sertifikater/2017/95/SERTIT-095%20Cisco%20HyperFlex%20Systems%20HX%20Series%20CR%20v1.0.pdf'})], 'maintenance': [frozendict({'href': 'https://sertit.no/getfile.php/135208-1607953346/SERTIT/Sertifikater/2017/95/20181008%20SERTIT%20095%20Maintenance%20Report%200.9.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 2
- mutual_recognition: CCRA, SOG-IS
- product: Hardware versions:▪ Cisco HyperFlex HX220C M4 Node▪ Cisco HyperFlex HX240c M4 Node▪ Cisco HyperFlexHX240c M4 Node with Cisco UCS B200 Blade Server; Software version:▪ Cisco HyperFlex HX Data Platform Software, version 2.5(1c)
- sponsor: Cisco Inc.
- product: Cisco HyperFlex Systems HX Series
- url: https://sertit.no/certified-products/product-archive/cisco-hyperflex-systems-hx-series
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
Sertit-095 C.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20171108135048Z00'00'
- /ModDate: D:20171108135048Z00'00'
- /Producer: Mac OS X 10.12.6 Quartz PDFContext
- pdf_file_size_bytes: 725059
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
20080303_c0120_est.pdf |
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 50
- FDP_ACC.1.1: 3
- FDP_ACF: 3
- FDP_ACF.1: 48
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC: 3
- FDP_IFC.1: 3
- FDP_ITC: 1
- FDP_ITC.1: 5
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 87
- FIA_AFL.1.1: 9
- FIA_AFL.1.2: 9
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_NEW.1: 12
- FIA_NEW.1.1: 1
- FIA_NEW.1.2: 1
- FIA_SOS: 1
- FIA_SOS.1: 67
- FIA_SOS.1.1: 7
- FIA_SOS.2: 11
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 11
- FIA_UAU.1: 17
- FIA_UAU.2: 119
- FIA_UAU.2.1: 7
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UAU.7: 17
- FIA_UAU.7.1: 2
- FIA_UID: 16
- FIA_UID.1: 21
- FIA_UID.2: 62
- FIA_UID.2.1: 7
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_CKM.1: 1
- FMT_MAS.1: 1
- FMT_MOF.1: 111
- FMT_MOF.1.1: 3
- FMT_MSA: 12
- FMT_MSA.1: 34
- FMT_MSA.1.1: 3
- FMT_MSA.2: 4
- FMT_MSA.3: 22
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 3
- FMT_MTD.1: 191
- FMT_MTD.1.1: 13
- FMT_SMF: 19
- FMT_SMF.1: 41
- FMT_SMF.1.1: 1
- FMT_SMR: 23
- FMT_SMR.1: 112
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FPT:
- FPT_RVM.1: 19
- FPT_RVM.1.1: 1
- FPT_SEP.1: 13
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 2
- A.SERVER: 1
- A.SETTING: 1
- O:
- O.CHECK-HDD: 5
- O.CONFIG: 9
- O.CRYPT-KEY: 1
- O.CRYPTO-MAIL: 6
- O.GROUP-BOX: 4
- O.OVERWRITE-ALL: 5
- O.PRIVATE-BOX: 3
- O.PUBLIC-BOX: 6
- O.REGISTERED-USER: 12
- O.SECURE-PRINT: 6
- O.TRUSTED-PASS: 3
- OE:
- OE.CRYPT: 5
- OE.FEED-BACK: 12
- OE.LOCK-HDD: 1
- OE.SESSION: 1
- T:
- T.ACCESS-GROUP-BOX: 2
- T.ACCESS-NET-SETTING: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-SETTING: 1
- T.BACKUP-RESTORE: 1
- T.DISCARD-MFP: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 180-1: 1
- FIPS 186: 4
- FIPS 186-1: 2
- FIPS PUB 197: 5
- X509:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
|
|
pdf_data/report_metadata |
- /Author:
- /Company:
- /CreationDate: D:20080221212255+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20080221212337+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - 【C0120】Mosel23_英文ST-1.05-080221.doc
- /_AdHocReviewCycleID: -1264862075
- /_AuthorEmail: megumi.tanabe@konicaminolta.jp
- /_AuthorEmailDisplayName: megumi tanabe
- /_EmailSubject: 【Mosel ISO15408】 ST翻訳確認のお願い
- pdf_file_size_bytes: 929809
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 131
|
|
pdf_data/st_filename |
20080303_c0120_erpt.pdf |
HyperFlex-HX_SecurityTarget_v1.0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- JP:
- CRP-C0120-01: 1
- Certification No. C0120: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 2
- ADV_TDS.1: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 2
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 6
- FDP_ACC.2: 5
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 2
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFF.1: 3
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 8
- FIA_SOS: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU: 5
- FIA_UAU.1: 1
- FIA_UAU.2: 9
- FIA_UAU.7: 5
- FIA_UID: 4
- FIA_UID.1: 3
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 4
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF: 3
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_STM: 3
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FRU:
- FRU_FLT: 1
- FRU_FLT.2: 6
- FRU_FLT.2.1: 1
- FRU_FTL.2: 1
- FTA:
- FTA_SSL: 4
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_TRP: 3
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVER: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-NET: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC: 1
- T.ACCESS-SECURE-PRINT: 1
- T.BACKUP: 1
- T.BRING-OUT: 1
- T.DISCARD-MFP: 1
|
- A:
- A.ADMIN: 3
- A.CONNECTIONS: 2
- A.LOCATE: 3
- O:
- O.ACCESS_CONTROL: 3
- O.ACCESS_CONTROLL: 2
- O.ADMIN: 4
- O.AUDIT_GEN: 7
- O.AUDIT_VIEW: 6
- O.AVAILABILITY: 4
- O.DATA: 3
- O.IDAUTH: 6
- O.SELFPRO: 4
- O.TIME: 7
- OE:
- OE.ADMIN: 3
- OE.CONNECTION: 3
- OE.LOCATE: 3
- T:
- T.ACCOUNTABILITY: 4
- T.NOAUTH: 2
- T.RESOURCE_AVAILABILITY: 4
- T.TIME: 2
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 67
- Cisco Systems: 2
- Cisco Systems, Inc: 2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- FIPS 180-1: 1
- FIPS 186: 1
- FIPS 186-1: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- CC:
- CCMB-2012-009-001: 1
- CCMB-2012-009-004: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- 451) (Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20080222184203+09'00'
- /ModDate: D:20080222184203+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 266381
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: Cisco GCT TME
- /CreationDate: D:20171011095742-04'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20171011095742-04'00'
- /Producer: Microsoft® Word 2016
- /Subject: ST
- /Title: HyperFelx HX ST
- pdf_file_size_bytes: 1536856
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 48
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
False |
state/report/download_ok |
True |
False |
state/report/extract_ok |
True |
False |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |