| name |
Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.2E |
Fuji Xerox ApeosPort-III C3300/C2200 DocuCentre-III C3300/C2200 Series Controller Software Version: Controller ROM Ver 1.0.10 |
| category |
Network and Network-Related Devices and Systems |
Multi-Function Devices |
| scheme |
UK |
JP |
| status |
archived |
archived |
| not_valid_after |
30.04.2019 |
17.01.2013 |
| not_valid_before |
30.04.2014 |
30.05.2008 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP276%20Cisco%20Cat4K%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/C0165_erpt.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CAT4K%20NDPP%20ST%2020140207-Final-updated-UPDATED20140410-Final.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/C0165_est.pdf |
| manufacturer |
Cisco Systems, Inc. |
Fuji Xerox Co., Ltd. |
| manufacturer_web |
https://www.cisco.com |
https://www.fujixerox.co.jp/eng/ |
| security_level |
{} |
EAL3 |
| dgst |
2ae58c071bd55ee4 |
0bd04cf15aa08cee |
| heuristics/cert_id |
CRP276 |
JISEC-CC-CRP-C0165 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2024-20312, CVE-2023-20109, CVE-2023-20097, CVE-2014-3327, CVE-2025-20199, CVE-2016-6386, CVE-2017-12228, CVE-2016-1409, CVE-2021-34699, CVE-2017-6606, CVE-2019-1746, CVE-2018-0193, CVE-2020-3230, CVE-2023-20076, CVE-2021-34729, CVE-2016-6384, CVE-2020-3209, CVE-2024-20271, CVE-2019-1761, CVE-2020-3200, CVE-2017-6742, CVE-2022-20920, CVE-2017-6736, CVE-2024-20433, CVE-2023-20056, CVE-2020-3204, CVE-2025-20171, CVE-2016-1384, CVE-2017-3857, CVE-2017-6738, CVE-2025-20201, CVE-2018-0188, CVE-2020-3444, CVE-2021-1616, CVE-2025-20170, CVE-2018-0184, CVE-2018-0182, CVE-2018-0185, CVE-2025-20175, CVE-2018-0195, CVE-2016-6381, CVE-2016-6392, CVE-2018-0189, CVE-2021-1384, CVE-2017-6737, CVE-2018-0186, CVE-2025-20176, CVE-2025-20200, CVE-2015-0685, CVE-2024-20414, CVE-2020-3516, CVE-2017-6739, CVE-2016-6415, CVE-2013-6981, CVE-2017-3864, CVE-2018-0194, CVE-2021-1625, CVE-2018-0190, CVE-2019-16009, CVE-2016-6393, CVE-2017-3856, CVE-2017-6740, CVE-2025-20173, CVE-2014-2146, CVE-2014-3354, CVE-2023-20186, CVE-2020-3228, CVE-2025-20338, CVE-2023-20080, CVE-2021-1382, CVE-2016-6385, CVE-2019-1748, CVE-2025-20169, CVE-2018-0197, CVE-2025-20172, CVE-2016-6380, CVE-2024-20308, CVE-2014-3409, CVE-2023-44487, CVE-2019-1737, CVE-2018-0183, CVE-2017-6743, CVE-2013-6692, CVE-2025-20352 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, AVA_VAN.1, ADV_FSP.1 |
AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
3.5.2 |
1.0.10 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0165
- certification_date: 01.05.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, and fax functions as basic functions.The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - System Administrator's Security Management - Customer Engineer Operation Restriction - FAX Flow Security
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Fuji Xerox ApeosPort-III C3300/C2200 DocuCentre-III C3300/C2200 Series Controller Software
- product_type: IT product(Control Software for Multi Function Peripheral)
- report_link: https://www.ipa.go.jp/en/security/C0165_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/C0165_est.pdf
- toe_version: Controller ROM Ver 1.0.10
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.03.2013
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0165_it7184.html
- toe_japan_name: Fuji Xerox ApeosPort-III C3300/C2200 DocuCentre-III C3300/C2200 Series Controller Software Controller ROM Ver 1.0.10
- toe_overseas_link: None
- toe_overseas_name: -----
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
573e14e647e056f2 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.0.pdf |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
CRP276 Cisco Cat4K v1.0.pdf |
C0165_erpt.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- JP:
- Certification No. C0165: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.NET: 1
- A.SECMODE: 1
- T:
- T.CONFDATA: 1
- T.RECOVER: 1
|
| pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 31
- Cisco Systems: 7
|
|
| pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20081107173057+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.0
- /Manager: IPA
- /ModDate: D:20081107173123+09'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- /SourceModified: D:20081107062622
- /Title: CRP-e
- pdf_file_size_bytes: 312689
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
| pdf_data/st_filename |
CAT4K NDPP ST 20140207-Final-updated-UPDATED20140410-Final.pdf |
C0165_est.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ATE:
- AVA:
|
- ACM:
- ACM_CAP.3: 6
- ACM_SCM.1: 1
- ACM_SCP.1: 6
- ADO:
- ADO_DEL.1: 7
- ADO_IGS.1: 8
- ADV:
- ADV_FSP.1: 13
- ADV_HLD.1: 3
- ADV_HLD.2: 4
- ADV_RCR.1: 6
- AGD:
- AGD_ADM.1: 9
- AGD_USR.1: 8
- ALC:
- ATE:
- ATE_COV: 1
- ATE_COV.2: 4
- ATE_DPT.1: 4
- ATE_FUN.1: 7
- ATE_IND.2: 5
- AVA:
- AVA_MSU.1: 5
- AVA_SOF.1: 5
- AVA_VLA.1: 5
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 5
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 6
- FAU_STG_EXT.1: 7
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.3: 5
- FAU_STG_EXT.3.1: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.4: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 8
- FCS_CKM_EXT.4.1: 1
- FCS_COMM_PRO: 1
- FCS_COP.1: 34
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT: 3
- FCS_SSH_EXT.1: 8
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_SSH_EXT.1.8: 1
- FCS_SSH_EXT.1.9: 1
- FCS_TLS_EXT.1: 1
- FDP:
- FDP_IFF.1: 3
- FDP_ITC.1: 5
- FDP_ITC.2: 1
- FDP_RIP: 2
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 4
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 3
- FIA_UAU_EXT.5: 5
- FIA_UAU_EXT.5.1: 1
- FIA_UAU_EXT.5.2: 1
- FIA_UIA_EXT: 3
- FIA_UIA_EXT.1: 9
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 2
- FMT:
- FMT_MTD: 2
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SFR.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 6
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 14
- FPT_ITT.1.1: 2
- FPT_PTD.1: 5
- FPT_PTD_EXT: 2
- FPT_PTD_EXT.1: 11
- FPT_PTD_EXT.1.1: 2
- FPT_PTD_EXT.2: 1
- FPT_RPL: 2
- FPT_RPL.1: 5
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 2
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FRU:
- FRU_RSA: 2
- FRU_RSA.1: 5
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL: 3
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 6
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 14
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 2
- FTP_TRP.1: 14
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 13
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 13
- FDP_IFC.1.1: 1
- FDP_IFF.1: 11
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 13
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 17
- FIA_UAU.2.1: 1
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 8
- FIA_UID.2: 14
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 17
- FMT_MOF.1.1: 1
- FMT_MSA: 3
- FMT_MSA.2: 4
- FMT_MSA.3: 1
- FMT_MTD: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMT.1: 1
- FPT:
- FPT_RVM.1: 27
- FPT_RVM.1.1: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 3
- A.PHYSICAL: 3
- A.TRUSTED_ADMIN: 3
- O:
- O.DISPLAY_BANNER: 4
- O.PROTECTED_COMMUNICA: 1
- O.PROTECTED_COMMUNICATIONS: 6
- O.RESIDUAL_INFORMATION_: 1
- O.RESIDUAL_INFORMATION_CLEA: 1
- O.RESIDUAL_INFORMATION_CLEARING: 2
- O.RESOURCE_AVAILABILITY: 7
- O.SESSION_LOCK: 4
- O.SYSTEM_MONITORING: 7
- O.TOE_ADMINISTRATION: 7
- O.TSF_SELF_TEST: 7
- O.VERIFIABLE_UPDATES: 4
- OE:
- OE.NO_GENERAL_PURP: 1
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 3
- OE.TRUSTED_ADMIN: 2
- T:
- T.ADMIN_ERROR: 3
- T.RESOURCE_EXHAUSTION: 3
- T.TSF_FAILURE: 3
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_UPDATE: 3
- T.UNDETECTED_ACTIONS: 2
- T.USER_DATA_REUSE: 2
|
- A:
- A.ADMIN: 4
- A.NET: 4
- A.SECMODE: 3
- O:
- O.CIPHER: 8
- O.FAX_SEC: 6
- O.MANAGE: 7
- O.RESIDUAL: 7
- OE:
- OE.ADMIN: 4
- OE.AUTH: 6
- OE.FUNCTION: 6
- OE.NET: 4
- T:
- T.CONFDATA: 3
- T.RECOVER: 4
|
| pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 83
- Cisco Systems: 1
- Cisco Systems, Inc: 3
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 13
- AES-: 3
- AES-256: 1
- DES:
- constructions:
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 1
- SHA-512: 4
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 4
- FIPS 197: 1
- FIPS PUB 180-3: 2
- FIPS PUB 186-3: 2
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- NIST SP 800-56B: 1
- SP 800-90: 1
- SP 900-90A: 1
- RFC:
- RFC 0791: 1
- RFC 0894: 1
- RFC 1059: 1
- RFC 1119: 1
- RFC 1305: 1
- RFC 1492: 1
- RFC 2328: 1
- RFC 2385: 1
- RFC 2453: 1
- RFC 2460: 1
- RFC 2865: 1
- RFC 3162: 1
- RFC 3602: 1
- RFC 4109: 1
- RFC 4252: 1
- RFC 4253: 1
- RFC 4303: 1
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- ISO:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Cisco TME
- /CreationDate: D:20140410105908-04'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140410105908-04'00'
- /Producer: Microsoft® Word 2010
- /Subject: Cat4K 4500 E & X Series NDPP CC Eval
- /Title: Security Target
- pdf_file_size_bytes: 1010570
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 88
|
- /Author: kurata-masami
- /CreationDate: D:20081028145922+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20081105151841+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: Microsoft Word - C0165 ST_英訳.doc
- pdf_file_size_bytes: 404857
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |