Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
EPSON LX-10020M/WF-M21000 with FAX 1.00
JISEC-CC-CRP-C0728-01-2021
Juniper Junos OS 22.4R2 for MX304, EX4100-48MP, EX4100-24MP, EX4100-24P, EX4100-24T, EX4100-48P, EX4100-48T
Certificate Number: 2024/146
name EPSON LX-10020M/WF-M21000 with FAX 1.00 Juniper Junos OS 22.4R2 for MX304, EX4100-48MP, EX4100-24MP, EX4100-24P, EX4100-24T, EX4100-48P, EX4100-48T
category Multi-Function Devices Network and Network-Related Devices and Systems
scheme JP AU
not_valid_after 23.08.2026 02.04.2029
not_valid_before 23.08.2021 02.04.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0728_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2024_146_EFT-T040_Junos%20OS%2022.4R2%20for%20MX304%20and%20EX4100x_os.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0728_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2024-EFT-T040-CR-V1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0728_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20Junos%20OS%2022.4R2%20MX304,%20EX4100%20Line%20Security%20Target%20v1.1%201.pdf
manufacturer SEIKO EPSON CORPORATION HPE Juniper Networking
manufacturer_web https://www.epson.com/ https://www.juniper.net/
security_level ALC_FLR.2, EAL2 {}
dgst 2bd1db704b7abf3f 2a2dae0690e9db5a
heuristics/cert_id JISEC-CC-CRP-C0728-01-2021 Certificate Number: 2024/146
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1
heuristics/extracted_versions 1.00 22.4
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0728
  • certification_date: 01.08.2021
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0728
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000a4z-att/c0728_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral (MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE Security functions The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: EPSON LX-10020M/WF-M21000 with FAX
    • product_type: Multifunction Peripheral
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000a4z-att/c0728_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000a4z-att/c0728_est.pdf
    • toe_version: 1.00
    • vendor: SEIKO EPSON CORPORATION
  • expiration_date:
  • supplier: SEIKO EPSON CORPORATION
  • toe_japan_name: EPSON LX-10020M / WF-M21000 with FAX1.00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0728_it0774.html
  • toe_overseas_name: EPSON LX-10020M / WF-M21000 with FAX1.00
heuristics/protection_profiles 43ce79b420f23a00 51ed84742f89c3f7, 89f2a255423f4a20
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_MACSEC_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf
pdf_data/cert_filename c0728_eimg.pdf AISEP_Certificate_2024_146_EFT-T040_Junos OS 22.4R2 for MX304 and EX4100x_os.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0728-01-2021: 1
  • AU:
    • Certificate Number: 2024/146: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/cert_metadata
  • /CreationDate: D:20210921134655+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210921135808+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 139870
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20240619174130+10'00'
  • /ModDate: D:20240619174130+10'00'
  • pdf_file_size_bytes: 160879
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0728_erpt.pdf AISEP-CC-CR-2024-EFT-T040-CR-V1.0.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0728-01-2021: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 13
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
  • Teron:
    • Teron Labs: 4
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 2
    • SSHv2: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • NIST:
    • SP 800-90B: 2
pdf_data/report_metadata
  • /CreationDate: D:20210921134823+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210921140358+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 409027
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
pdf_data/st_filename c0728_est.pdf Juniper Junos OS 22.4R2 MX304, EX4100 Line Security Target v1.1 1.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 24
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 24
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 23
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 25
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 33
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 12
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 3
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.4: 4
    • FCS_CKM.4.1: 1
    • FCS_COP: 33
    • FCS_COP.1: 7
    • FCS_MKA_EXT.1: 4
    • FCS_MKA_EXT.1.1: 1
    • FCS_MKA_EXT.1.2: 1
    • FCS_MKA_EXT.1.3: 1
    • FCS_MKA_EXT.1.4: 1
    • FCS_MKA_EXT.1.5: 2
    • FCS_MKA_EXT.1.6: 1
    • FCS_MKA_EXT.1.7: 1
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT.1: 10
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SNMP_EXT.1: 1
    • FCS_SSHS_EXT: 2
    • FCS_SSHS_EXT.1: 15
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.2.3: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_AFL_EXT.1: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT.1: 5
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_UAU: 2
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.2: 4
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 2
    • FIA_UIA_EXT.1: 5
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 17
    • FMT_MOF.1: 3
    • FMT_MTD: 12
    • FMT_MTD.1: 2
    • FMT_SMF: 6
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.2: 6
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
    • FMT_SNMP_EXT.1: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 5
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_CAK_EXT.1: 4
    • FPT_CAK_EXT.1.1: 1
    • FPT_DDP_EXT.1: 3
    • FPT_DDP_EXT.1.1: 2
    • FPT_FLS.1: 4
    • FPT_FLS.1.1: 1
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_RPL_EXT.1: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT: 2
    • FPT_STM_EXT.1: 7
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 9
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.3: 6
    • FTA_SSL.4: 5
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 5
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 7
  • FTP:
    • FTP_ITC: 5
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 9
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 11
    • D.DOC: 42
    • D.FUNC: 26
    • D.PROT: 8
  • O:
    • O.AUDIT: 5
    • O.AUDIT_ACCESS: 4
    • O.AUDIT_STORAGE: 4
    • O.CONF: 10
    • O.DOC: 10
    • O.FUNC: 5
    • O.INTERFACE: 5
    • O.PROT: 5
    • O.SOFTWARE: 5
    • O.USER: 11
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_STORAGE: 2
    • OE.INTERFACE: 3
    • OE.PHISICAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.ADMIN: 1
    • A.LIMITED: 1
    • A.NO_THRU: 1
    • A.PHYSICAL: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL: 1
    • A.TRUSTED: 1
  • O:
    • O.AUTHENTICATION: 1
    • O.AUTHORIZED: 1
    • O.CRYPTOGRAPHIC: 1
    • O.PORT_FILTERING: 1
    • O.REPLAY_DETECTION: 1
    • O.SYSTEM_MONITORING: 1
    • O.TSF_INTEGRITY: 1
  • OE:
    • OE.ADMIN_CREDENTIALS: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.DATA_INTEGRITY: 1
    • T.NETWORK_ACCESS: 1
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY: 1
    • T.SECURITY_FUNCTIONALITY: 1
    • T.UNAUTHORIZED: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED: 1
    • T.UNTRUSTED_MACSEC: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 7
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 29
  • constructions:
    • MAC:
      • HMAC: 5
      • HMAC-SHA-256: 8
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 13
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 4
    • SHA2:
      • SHA-256: 14
      • SHA-384: 5
      • SHA-512: 6
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 9
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 12
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 18
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 92
    • SSHv2: 8
  • TLS:
    • DTLS:
      • DTLS: 4
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 7
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 9
    • PRNG: 1
  • RNG:
    • RBG: 3
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 4
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 12
    • P-384: 12
    • P-521: 8
    • prime256v1: 2
    • prime384v1: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 3
    • FIPS 186-4: 2
    • FIPS 197: 2
    • FIPS 198-1: 2
    • FIPS PUB 186-4: 5
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-38B: 1
    • NIST SP 800-38F: 2
    • NIST SP 800-90: 1
    • SP 800-38A: 1
    • SP 800-38B: 1
    • SP 800-38F: 1
    • SP 800-90A: 3
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
  • RFC:
    • RFC 3526: 2
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 5077: 1
    • RFC 5656: 1
    • RFC 6668: 1
    • RFC3526: 1
    • RFC4344: 1
    • RFC5656: 1
  • X509:
    • X.509: 4
pdf_data/st_metadata
  • /Author: 0086205
  • /CreationDate: D:20210910135011+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210910135011+09'00'
  • /Producer: Acrobat Distiller 15.0 (Windows)
  • /Title: Microsoft Word - 英文Security Target_(認証番号C0728).docx
  • pdf_file_size_bytes: 847436
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 72
  • /CreationDate: D:20240404054750+11'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Application: Microsoft Azure Information Protection
  • /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled: True
  • /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Extended_MSFT_Method: Automatic
  • /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name: Juniper Internal
  • /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Owner: [email protected]
  • /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate: 2019-04-08T08:03:38.1250689Z
  • /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId: bea78b3c-4cdb-4130-854a-1d193232e5f4
  • /ModDate: D:20240404054750+11'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 959448
  • pdf_hyperlinks: https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/Details?validation=31261, http://www.juniper.net/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 55
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different