Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software
JISEC-CC-CRP-C0205
bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software Version:A11U-0100-G10-06
JISEC-CC-CRP-C0233
name bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software Version:A11U-0100-G10-06
not_valid_after 08.04.2014 28.08.2014
not_valid_before 13.03.2009 21.08.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0233_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0233_est.pdf
dgst 2269d5f12e90117d 0284926c3c58f5e1
heuristics/cert_id JISEC-CC-CRP-C0205 JISEC-CC-CRP-C0233
heuristics/cpe_matches {} cpe:2.3:h:konicaminolta:bizhub_200:-:*:*:*:*:*:*:*
heuristics/extracted_versions 601, 7522, 751, 6022 200, 222, 2821, 3621, 362, 06, 2221, 250, 282, 350, 0100
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0205
  • certification_date: 01.03.2009
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0205_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software English: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0205_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0205_st.pdf
    • toe_version: A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.04.2014
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0205_it8216.html
  • toe_overseas_name: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
  • cert_id: JISEC-CC-CRP-C0233
  • certification_date: 01.08.2009
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0233_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFD” or through the network and supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the protection function to overwrite at once the data that became unnecessary, the HDD lock function loaded on the HDD or the encryption function by the encryption board which is the optional part of MFP. Besides, TOE has a deletion method compliant with various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator function - Service mode function - Secure Print Function - Remaining information overwrite deletion function - All area overwrite deletion function - Encryption key generation function - HDD Verification Function - Authentication Failure Frequency Reset function - Encryption Board Operation Support Function - HDD lock Operation Support Function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese : bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Zentai Seigyo Software English : bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0233_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0233_est.pdf
    • toe_version: A11U-0100-G10-06
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.08.2014
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Zentai Seigyo Software A11U-0100-G10-06
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0233_it9245.html
  • toe_overseas_name: bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software A11U-0100-G10-06
pdf_data/report_filename c0205_erpt.pdf c0233_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0205-01: 1
    • Certification No. C0205: 1
  • JP:
    • CRP-C0233-01: 1
    • Certification No. C0233: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-B: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-NET-SET: 1
    • T.ACCESS-PRIVATE: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTOR: 1
    • T.BACKUP-RESTORE: 1
    • T.BRING-OUT-CF: 2
    • T.BRING-OUT-STOR: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTEC-TRANSMISSION: 1
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-BOX: 2
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BRING-OUT-STORAGE: 3
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRANSMISSION: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Microsoft:
    • Microsoft Corporation: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
  • TLS:
    • SSL:
      • SSL: 6
pdf_data/report_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in: 1
  • ConfidentialDocument:
    • of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
pdf_data/report_metadata
  • /CreationDate: D:20090409174039+09'00'
  • /ModDate: D:20090409174039+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 406178
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20091109163223+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20091109163252+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20091109073126
  • /Title: CRP-e
  • pdf_file_size_bytes: 475366
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
pdf_data/st_filename c0205_st.pdf c0233_est.pdf
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 58
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 42
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ACP.1: 1
    • FDP_IFC.1: 6
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 62
    • FIA_AFL.1.1: 8
    • FIA_AFL.1.2: 8
    • FIA_ATD.1: 25
    • FIA_ATD.1.1: 1
    • FIA_EID: 2
    • FIA_EID.1: 16
    • FIA_EID.1.1: 3
    • FIA_EID.1.2: 1
    • FIA_NEW.1.2: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 48
    • FIA_SOS.1.1: 6
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU.1: 23
    • FIA_UAU.2: 63
    • FIA_UAU.2.1: 6
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 50
    • FIA_UID.2.1: 7
    • FIA_USB.1: 22
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 33
    • FMT_MOF.1.1: 4
    • FMT_MSA: 3
    • FMT_MSA.1: 32
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 5
    • FMT_MSA.3.2: 5
    • FMT_MTD.1: 105
    • FMT_MTD.1.1: 12
    • FMT_SMF.1: 109
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 167
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SMS.1: 1
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 2
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 3
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC.1: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 29
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_CAP.1: 1
    • FIA_EID: 1
    • FIA_EID.1: 11
    • FIA_EID.1.1: 2
    • FIA_EID.1.2: 2
    • FIA_SOS.1: 26
    • FIA_SOS.1.1: 4
    • FIA_UAU.1: 13
    • FIA_UAU.2: 28
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 20
    • FIA_UID.2: 22
    • FIA_UID.2.1: 4
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 31
    • FMT_MTD.1.1: 5
    • FMT_SMF.1: 40
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 50
    • FMT_SMR.1.1: 4
    • FMT_SMR.1.2: 4
  • FPT:
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 4
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.AUTH-CAPABILITY: 10
    • O.CHECK-CF: 4
    • O.CHECK-HDD: 7
    • O.CONFIG: 11
    • O.CRYPT-KEY: 5
    • O.CRYPTO-CAPABILITY: 4
    • O.CRYPTO-MAIL: 4
    • O.GROUP-BOX: 5
    • O.LOCK-CF-CAPABILITY: 4
    • O.LOCK-HDD-CAPABILITY: 7
    • O.OVERWRITE-ALL: 7
    • O.PRIVATE-BOX: 5
    • O.PUBLIC-BOX: 8
    • O.REGISTERED-USER: 14
    • O.SECURE-PRINT: 8
    • O.TRUSTED-PASS: 7
  • OE:
    • OE.ADMIN: 2
    • OE.CRYPT: 3
    • OE.CRYPTO: 1
    • OE.FEED-BACK: 10
    • OE.LOCK-CF: 3
    • OE.LOCK-HDD: 3
    • OE.NETWORK: 2
    • OE.SECRET: 2
    • OE.SERVER: 5
    • OE.SERVICE: 2
    • OE.SESSION: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS-GROUP-BOX: 3
    • T.ACCESS-PRIVATE-BOX: 3
    • T.ACCESS-PUBLIC-BOX: 2
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 3
    • T.BRING-OUT-CF: 2
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 3
    • T.UNEXPECTED-TRANSMISSION: 3
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 3
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.BOX: 7
    • O.CHECK-HDD: 6
    • O.CONFIG: 9
    • O.CRYPT-KEY: 3
    • O.CRYPTO-CAPABILITY: 4
    • O.CRYPTO-KEY: 1
    • O.LOCK-HDD-CAPABILITY: 6
    • O.OVERWRITE-ALL: 4
    • O.OVERWRITE-FILE: 6
    • O.SECURE-PRINT: 5
  • OE:
    • OE.ADMIN: 3
    • OE.CRYPTO: 3
    • OE.FEED-BACK: 7
    • OE.LOCK-HDD: 3
    • OE.NETWORK: 3
    • OE.SECRET: 3
    • OE.SERVICE: 3
    • OE.SESSION: 5
    • OE.SETTING-SECURITY: 3
  • T:
    • T.ACCESS-BOX: 4
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BRING-OUT-: 1
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 3
    • T.UNEXPECTED-TRANSMISSION: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 5
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 186: 1
    • FIPS 186-1: 1
    • FIPS 186-2: 4
    • FIPS PUB 197: 3
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-1: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • INC., All Rights Reserved. 7 / 110 TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in: 1
  • ConfidentialDocument:
    • main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential document stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
pdf_data/st_metadata
  • /Author: m-izumi
  • /CreationDate: D:20090410164324+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20090410164324+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /Title: Microsoft Word - C0205_ST_en.doc
  • pdf_file_size_bytes: 683223
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 110
  • /Author:
  • /CreationDate: D:20091111180533+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20091111180925+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: 1
  • pdf_file_size_bytes: 528113
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 67
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different