| name |
EPSON LX-10020M/WF-M21000 with FAX 1.00 |
Makito and Barracuda Video Encoders with firmware version 2.1.1-3; Appliances: S-280E-SDI, S-290E-HDSDI, S-290E-DVI, S-290E-DVI-S, S-290E-AIR; Blades: B-290E-DVI, B-290E-DVI-S, B-290E-HDSDI, B-280E-SDI; Chassis: F-280-1, F-290-1DH, F-290-1, F-MB6B-RAC, F-MB6X-RAC, F-MB6B-DC, F-MB6B-MED, F-MB21B-R; Firmware Options: SW-290E-KLV, FCO-SV-SW-CONFIG |
| category |
Multi-Function Devices |
Network and Network-Related Devices and Systems |
| scheme |
JP |
US |
| status |
active |
archived |
| not_valid_after |
23.08.2026 |
03.06.2015 |
| not_valid_before |
23.08.2021 |
03.06.2013 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0728_eimg.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0728_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10501-vr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0728_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10501-st.pdf |
| manufacturer |
SEIKO EPSON CORPORATION |
Haivision Systems, Inc. |
| manufacturer_web |
https://www.epson.com/ |
https://www.haivision.com/ |
| security_level |
ALC_FLR.2, EAL2 |
{} |
| dgst |
2bd1db704b7abf3f |
97a59eb71ed4cc7c |
| heuristics/cert_id |
JISEC-CC-CRP-C0728-01-2021 |
CCEVS-VR-VID-10501-2013 |
| heuristics/cert_lab |
[] |
US |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
1.00 |
2.1.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0728
- certification_date: 01.08.2021
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0728
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000a4z-att/c0728_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral (MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE Security functions The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: EPSON LX-10020M/WF-M21000 with FAX
- product_type: Multifunction Peripheral
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000a4z-att/c0728_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000a4z-att/c0728_est.pdf
- toe_version: 1.00
- vendor: SEIKO EPSON CORPORATION
- expiration_date:
- supplier: SEIKO EPSON CORPORATION
- toe_japan_name: EPSON LX-10020M / WF-M21000 with FAX1.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0728_it0774.html
- toe_overseas_name: EPSON LX-10020M / WF-M21000 with FAX1.00
|
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10501/
- categories: ['Network Device']
- category: Network Device
- certification_date: 03.06.2013
- evaluation_facility: COACT, Inc. Labs
- expiration_date: 03.06.2015
- id: CCEVS-VR-VID10501
- product: Makito and Barracuda Video Encoders with firmware version 2.1.1-3; Appliances: S-280E-SDI, S-290E-HDSDI, S-290E-DVI, S-290E-DVI-S, S-290E-AIR; Blades: B-290E-DVI, B-290E-DVI-S, B-290E-HDSDI, B-280E-SDI; Chassis: F-280-1, F-290-1DH, F-290-1, F-MB6B-RAC, F-MB6X-RAC, F-MB6B-DC, F-MB6B-MED, F-MB21B-R; Firmware Options: SW-290E-KLV, FCO-SV-SW-CONFIG
- scheme: US
- url: https://www.niap-ccevs.org/products/10501
- vendor: Haivision Systems, Inc.
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
43ce79b420f23a00 |
ac9abe3d5c5a31f0 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
| pdf_data/cert_filename |
c0728_eimg.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0728-01-2021: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20210921134655+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210921135808+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 139870
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
| pdf_data/report_filename |
c0728_erpt.pdf |
st_vid10501-vr.pdf |
| pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10501-2013
- cert_item: Haivision Systems Inc., 4445 Garand, Montreal, Quebec, Canada H4R 2H9 Makito Video Encoders
- cert_lab: US NIAP
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0728-01-2021: 1
|
- US:
- CCEVS-VR-VID10501-2013: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 2
- A.TRUSTED_ADMIN: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20210921134823+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210921140358+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 409027
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
- /Author: NIAP CCEVS
- /CreationDate: D:20130708131916Z
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130905083248-04'00'
- /Producer: Microsoft® Office Word 2007
- /Title: VID10501 VR
- pdf_file_size_bytes: 283557
- pdf_hyperlinks: http://www.niap-ccevs.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
| pdf_data/st_filename |
c0728_est.pdf |
st_vid10501-st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 1
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- ALC:
- ASE:
- ASE_CCL: 2
- ASE_INT: 2
- ASE_OBJ: 2
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 2
- FDP_ACF.1: 24
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 24
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 23
- FMT_MSA.1.1: 2
- FMT_MSA.3: 22
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_SMF.1: 25
- FMT_SMF.1.1: 1
- FMT_SMR.1: 33
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 12
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_GEN_EXT: 1
- FAU_GEN_EXT.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 8
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM_EXT: 2
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 44
- FCS_COP.1.1: 4
- FCS_ITC.1: 1
- FCS_PMG_EXT.1: 1
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 10
- FCS_SSH_EXT: 2
- FCS_SSH_EXT.1: 15
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 9
- FCS_TRP.1: 1
- FCS_TSL_EXT.1: 1
- FDP:
- FIA:
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 7
- FIA_UAU: 2
- FIA_UAU.7: 8
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 7
- FIA_UIA_EXT: 2
- FIA_UIA_EXT.1: 10
- FMT:
- FMT_MTD: 3
- FMT_MTD.1: 9
- FMT_SMF: 2
- FMT_SMF.1: 9
- FMT_SMR: 2
- FMT_SMR.2: 11
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 10
- FPT_ITC: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 8
- FPT_STM: 2
- FPT_STM.1: 9
- FPT_TRP: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 9
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 11
- FTA:
- FTA_SSL: 6
- FTA_SSL.3: 10
- FTA_SSL.4: 9
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 11
- FTA_TAB: 2
- FTA_TAB.1: 10
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 11
- FTP_TRP: 1
- FTP_TRP.1: 10
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 11
- D.DOC: 42
- D.FUNC: 26
- D.PROT: 8
- O:
- O.AUDIT: 5
- O.AUDIT_ACCESS: 4
- O.AUDIT_STORAGE: 4
- O.CONF: 10
- O.DOC: 10
- O.FUNC: 5
- O.INTERFACE: 5
- O.PROT: 5
- O.SOFTWARE: 5
- O.USER: 11
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_STORAGE: 2
- OE.INTERFACE: 3
- OE.PHISICAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- A:
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 3
- A.TRUSTED_ADMIN: 2
- O:
- O.DISPLAY_BANNER: 3
- O.PROTECTED_COMMUNI: 1
- O.PROTECTED_COMMUNICATIONS: 5
- O.RESIDUAL_INFORMATI: 1
- O.RESIDUAL_INFORMATION_CLEARING: 2
- O.SESSION_LOCK: 6
- O.SYSTEM_MONITORING: 6
- O.TOE_ADMINISTRATION: 6
- O.TSF_SELF_TEST: 3
- O.VERIFIABLE_UPDATES: 2
- OE:
- OE.NO_GENERAL_PURPOSE: 3
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 2
- T:
- T.ADMIN_ERROR: 3
- T.TSF_FAILURE: 4
- T.UNAUTHORIZED_ACCESS: 5
- T.UNAUTHORIZED_UPDATE: 3
- T.UNDETECTED_ACTIONS: 3
- T.USER_DATA_REUSE: 3
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 9
- AES-: 1
- AES-256: 1
- constructions:
- MAC:
- CMAC: 3
- HMAC: 7
- HMAC-SHA-256: 1
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 6
- SHA224: 1
- SHA256: 5
- SHA384: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
- SSH:
- SSH: 57
- SSHv1: 1
- SSHv2: 7
- TLS:
- SSL:
- TLS:
- TLS: 42
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 2
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CFB:
- CTR:
- GCM:
- XTS:
|
| pdf_data/st_keywords/ecc_curve |
|
- NIST:
- K-233: 1
- P-224: 4
- P-256: 2
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 4
- FIPS 180-3: 2
- FIPS 186-2: 1
- FIPS 186-3: 3
- FIPS 197: 1
- FIPS 198-1: 1
- NIST:
- NIST SP 800-38: 1
- NIST SP 800-38A: 1
- NIST SP 800-56: 1
- NIST SP 800-56B: 1
- NIST SP 800-90: 2
- SP 800-56B: 2
- SP 800-57: 1
- SP 800-90: 3
- PKCS:
- RFC:
- RFC 2246: 3
- RFC 2346: 1
- RFC 2818: 2
- RFC 4251: 1
- RFC 4252: 2
- RFC 4253: 3
- RFC 4254: 1
- RFC 4255: 2
- RFC 4346: 3
- RFC 5246: 3
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: 0086205
- /CreationDate: D:20210910135011+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210910135011+09'00'
- /Producer: Acrobat Distiller 15.0 (Windows)
- /Title: Microsoft Word - 英文Security Target_(認証番号C0728).docx
- pdf_file_size_bytes: 847436
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 72
|
- /Author: Jean Dubé
- /CreationDate: D:20130529170819Z
- /Creator: Microsoft Word
- /Keywords: Document No. HVS-PD-ST-MAK211; Version 1.1
www.haivision.com
- /ModDate: D:20130529131437-04'00'
- /Producer: Mac OS X 10.6.8 Quartz PDFContext
- /Title: Haivision Makito 2.1 Security Target for Common Criteria Version 3.1, Revision 3
- pdf_file_size_bytes: 2628550
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 68
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |