Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Thales Trusted Security Filter TSF201
SERTIT-060
bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 ControlSoftware
JISEC-CC-CRP-C0126
name Thales Trusted Security Filter TSF201 bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 ControlSoftware
category Boundary Protection Devices and Systems Multi-Function Devices
scheme NO JP
not_valid_after 21.06.2022 28.12.2010
not_valid_before 01.02.2016 26.11.2007
report_link https://www.commoncriteriaportal.org/files/epfiles/20160201%20SERTIT-060%20CR%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0126_erpt.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/3AQ%2025940%20AAAA%20377%20EN%20Security%20Target%20for%20TSF%20201%20ed%20%202.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0126_est.pdf
manufacturer Thales Norway AS Konica Minolta Business Technologies, Inc
manufacturer_web https://www.konicaminolta.com/
security_level EAL5, ALC_FLR.3 EAL3
dgst 1da3d62f11bf4beb 060aadeb6ceeb09c
heuristics/cert_id SERTIT-060 JISEC-CC-CRP-C0126
heuristics/extracted_sars ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, AVA_VAN.4, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1
heuristics/extracted_versions - 203, 253
heuristics/scheme_data
  • category: Boundary Protection Devices and Systems
  • certification_date: 01.02.2016
  • developer: Thales Norway AS
  • enhanced:
    • category: Boundary Protection Devices and Systems
    • cert_id: SERTIT-060
    • certification_date: 01.02.2016
    • description: The TOE is a contents-filtering gateway consisting of both hardware and software. It enables data transfer in a secure manner between two IP networks of different security classifications. Its design shall be trusted to perform separation of data between a HIGH (high security classification) network and a LOW (low security classification) network in a way upholding the security policy concerning data export and import between the individual networks.
    • developer: Thales Norway AS
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135010-1607952512/SERTIT/Sertifikater/2016/60/20160201%20Sertit-060%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135016-1607952522/SERTIT/Sertifikater/2016/60/2018%20TSF201%20Security%20Target.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/135019-1607952527/SERTIT/Sertifikater/2016/60/3AQ%2025940%20AAAA%20377%20EN%20Security%20Target%20for%20TSF%20201%20ed%20%202.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/136621-1625575272/SERTIT/Sertifikater/2016/60/3AQ%2025940%20AAAA%20377%20Security%20Target%20for%20TSF%20201%20v4.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135013-1607952517/SERTIT/Sertifikater/2016/60/20160201%20SERTIT-060%20CR%20v1.0.pdf'})], 'maintenance': [frozendict({'href': 'https://sertit.no/getfile.php/135007-1607952508/SERTIT/Sertifikater/2016/60/20181129%20Sertit-060%20Maintenance%20report%201.0.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/136615-1625568416/SERTIT/Sertifikater/2016/60/SERTIT-060%20MR%20v%202.0.pdf'})]})
    • evaluation_facility: NTT Com Security (Norway) AS
    • expiration_date: 01.02.2021
    • level: EAL 5, ALC_FLR.3
    • mutual_recognition: CCRA, SOG-IS
    • product: HW version: 3AQ 25960 BAAA rev. C; SW version: 3AQ 25950 AAAA rev. 2.2 build 0013
    • sponsor: Thales Norway AS
  • product: Thales Trusted Security Filter TSF201
  • url: https://sertit.no/certified-products/product-archive/thales-trusted-security-filter-tsf201
  • cert_id: JISEC-CC-CRP-C0126
  • certification_date: 01.11.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0126_eimg.pdf
    • description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203)(Hereinafter referred to as “MFP”). This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 Control Software (Japanese Name) bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 Control Software (English Name)
    • product_type: IT Product (data protection function in digital MFD)
    • report_link: https://www.ipa.go.jp/en/security/c0126_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0126_est.pdf
    • toe_version: A02E0Y0-0100-GN0-02
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.01.2011
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 Control Software A02E0Y0-0100-GN0-02
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0126_it7141.html
  • toe_overseas_name: bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 Control Software A02E0Y0-0100-GN0-02
maintenance_updates
protection_profile_links {} {}
pdf_data/report_filename 20160201 SERTIT-060 CR v1.0.pdf 20080306_c0126_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-060: 17
  • JP:
    • CRP-C0126-01: 1
    • Certification No. C0126: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL1: 1
    • EAL5: 19
    • EAL5 augmented: 18
    • EAL7: 1
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 19
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN.1: 1
    • FAU_SAA.1: 1
    • FAU_SAR.1: 1
    • FAU_STG.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 2
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
    • FDP_IFC.2: 2
    • FDP_IFF.1: 2
    • FDP_IFF.6: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_PHP.1: 1
    • FPT_STM.1: 1
    • FPT_TDC.1: 1
    • FPT_TST.1: 1
  • FTP:
    • FTP_ITC.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.CLEARANCE: 1
    • A.MAN: 1
    • A.PHYSICAL: 1
    • A.TRAINING: 1
    • A.USAGE: 1
  • O:
    • O.ALARM: 1
    • O.AUDIT: 1
    • O.CRYPTO: 1
    • O.EMERGENCY: 1
    • O.FILTER: 1
    • O.FW: 1
    • O.KEY: 2
    • O.NO: 1
    • O.ROBUST: 1
    • O.SECURE: 2
    • O.SELF: 1
  • OE:
    • OE.AUDIT: 1
    • OE.KEY: 1
    • OE.MAN: 1
  • T:
    • T.ILLEGAL: 1
    • T.MISUSE: 1
    • T.SECURE: 1
    • T.TAMPERING: 1
    • T.TEMPEST: 1
    • T.UNAUTHORISED: 1
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVER: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-NET: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.BACKUP: 1
    • T.BRING-OUT: 1
    • T.DISCARD-MFP: 1
pdf_data/report_keywords/vendor
  • Thales:
    • Thales: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 4
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 180-1: 1
    • FIPS 186: 1
    • FIPS 186-1: 1
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 203) (Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
pdf_data/report_metadata
  • /Author: Arne
  • /CreationDate: D:20160203130054+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20160203130146+01'00'
  • /Producer: Acrobat Distiller 9.5.5 (Windows)
  • /Title: Microsoft Word - 20160201 SERTIT-060 CR v1.0.docx
  • pdf_file_size_bytes: 607971
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /CreationDate: D:20080305165317+09'00'
  • /ModDate: D:20080305165317+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 309885
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
pdf_data/st_filename 3AQ 25940 AAAA 377 EN Security Target for TSF 201 ed 2.pdf 20080306_c0126_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 4
    • EAL5 augmented: 2
  • EAL:
    • EAL3: 6
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 3
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 1
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 11
    • FAU_ARP.1.1: 2
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAA: 1
    • FAU_SAA.1: 10
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.2.2: 1
  • FCS:
    • FCS_CKM.1: 14
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 18
    • FCS_COP.1.1: 2
    • FCS_ITC.1: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 10
    • FDP_IFC.2: 16
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.1: 11
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.6: 10
    • FDP_IFF.6.1: 1
    • FDP_ITC.1: 7
    • FDP_ITC.2: 20
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_DES_EXT.1: 9
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 10
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 50
    • FDP_ACC.1.1: 3
    • FDP_ACF: 3
    • FDP_ACF.1: 48
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 3
    • FDP_IFC.1: 3
    • FDP_ITC: 1
    • FDP_ITC.1: 5
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 87
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 12
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 67
    • FIA_SOS.1.1: 7
    • FIA_SOS.2: 11
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU: 11
    • FIA_UAU.1: 17
    • FIA_UAU.2: 119
    • FIA_UAU.2.1: 7
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 17
    • FIA_UAU.7.1: 2
    • FIA_UID: 16
    • FIA_UID.1: 21
    • FIA_UID.2: 62
    • FIA_UID.2.1: 7
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MAS.1: 1
    • FMT_MOF.1: 111
    • FMT_MOF.1.1: 3
    • FMT_MSA: 12
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 191
    • FMT_MTD.1.1: 13
    • FMT_SMF: 19
    • FMT_SMF.1: 41
    • FMT_SMF.1.1: 1
    • FMT_SMR: 23
    • FMT_SMR.1: 112
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
  • FPT:
    • FPT_RVM.1: 19
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CLEARANCE: 4
    • A.MAN: 3
    • A.PHYSICAL: 5
    • A.TRAINING: 3
    • A.USAGE: 4
  • O:
    • O.ALARM: 6
    • O.AUDIT: 10
    • O.CRYPTO: 7
    • O.EMERGENCY: 9
    • O.FILTER: 12
    • O.FW: 6
    • O.KEY: 13
    • O.NO: 10
    • O.ROBUST: 12
    • O.SECURE: 16
    • O.SELF: 8
  • OE:
    • OE.AUDIT: 4
    • OE.KEY: 3
    • OE.MAN: 4
  • T:
    • T.CONN: 4
    • T.ILLEGAL: 4
    • T.MISUSE: 3
    • T.SECURE: 4
    • T.TAMPERING: 5
    • T.TEMPEST: 4
    • T.UNAUTHORISED: 3
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 2
    • A.SERVER: 1
    • A.SETTING: 1
  • O:
    • O.CHECK-HDD: 5
    • O.CONFIG: 9
    • O.CRYPT-KEY: 1
    • O.CRYPTO-MAIL: 6
    • O.GROUP-BOX: 4
    • O.OVERWRITE-ALL: 5
    • O.PRIVATE-BOX: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED-USER: 12
    • O.SECURE-PRINT: 6
    • O.TRUSTED-PASS: 3
  • OE:
    • OE.CRYPT: 5
    • OE.FEED-BACK: 12
    • OE.LOCK-HDD: 1
    • OE.SESSION: 1
  • T:
    • T.ACCESS-GROUP-BOX: 2
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.DISCARD-MFP: 1
pdf_data/st_keywords/vendor
  • Thales:
    • Thales: 59
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
      • AES-256: 1
  • AES_competition:
    • AES:
      • AES: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 3
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
    • physical tampering: 3
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • RFC:
    • RFC 5246: 3
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS 186: 4
    • FIPS 186-1: 2
    • FIPS PUB 197: 5
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
pdf_data/st_metadata
  • /Author: a3143
  • /CreationDate: D:20150914135017+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20151106125350+01'00'
  • /Producer: Microsoft® Word 2010
  • /Title: System/Subsystem Specification
  • pdf_file_size_bytes: 963956
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
  • /Author:
  • /Company:
  • /CreationDate: D:20080304171807+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20080304171946+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - 【C0126】Thames2_英文ST-1.03-080304.doc
  • /_AdHocReviewCycleID: -1264862075
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: megumi tanabe
  • /_EmailSubject: 【Mosel ISO15408】 ST翻訳確認のお願い
  • pdf_file_size_bytes: 927101
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 131
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different