name |
Websense V10000 G2 Web Gateway Appliance v7.6 |
Data security kit for digital MFD:AR-FR10 Version S.10 |
category |
Boundary Protection Devices and Systems |
Other Devices and Systems |
scheme |
CA |
JP |
status |
archived |
archived |
not_valid_after |
15.05.2017 |
10.12.2010 |
not_valid_before |
18.01.2012 |
16.03.2004 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/websense-v76-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0006.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/websense-v76-sec-eng.pdf |
|
manufacturer |
Websense, Inc. |
Sharp Corporation |
manufacturer_web |
https://www.websense.com |
https://sharp-world.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL3+ |
dgst |
2fa07c60f571d282 |
9a44d39dec550888 |
heuristics/cert_id |
383-4-179 |
JISEC-CC-CRP-C0006 |
heuristics/cert_lab |
CANADA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
{} |
heuristics/extracted_versions |
7.6 |
10 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0004
- certification_date: 01.01.2004
- claim: EAL4
- enhanced:
- assurance_level: EAL4
- description: PRODUCT DESCRIPTION The data security kit for digital MFD, AR-FR4 version M.20 and AR-FR5 version E.20, is firmware which aims to decrease the risk of document data and image data that is temporarily stored inside of digital MFD from being dosclosed. Digital MFD is business equipment which can be configured by adding, as needed units for copy, image scanning or facsimile functions to printer function unit. The data security kit for digital MFD is provided as an upgrading kit for the firmware of hte MFD.
- evaluation_facility: Mizuho Information & Research Institute, Inc.
- product: Data security kit for digital MFD: AR-FR4 version M.20, AR-FR5 version E.20
- product_type: IT product (digital MFD )
- protection_profile: N/A
- vendor: Sharp Corporation
- expiration_date: 01.03.2013
- supplier: Sharp Corporation
- toe_japan_name: Data security kit for digital MFD:AR-FR4 version M.20,AR-FR5 version E.20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0004_it2005.html
- toe_overseas_name: Data security kit for digital MFD:AR-FR4 version M.20,AR-FR5 version E.20
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
websense-v76-cert-eng.pdf |
c0006.pdf |
pdf_data/report_frontpage |
- CA:
- cert_id: 383-4-179-CR
- cert_lab: CANADA
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- Certification No. C0006: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 2
- EAL 2+: 2
- EAL2: 1
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Shawn Pinet
- /CCEF: CGI IT Security Evaluation & Test Facility
- /CR date: 23 December 2011
- /CR version: 0.1
- /Certificate date: dd month yyyy
- /Company:
- /CreationDate: D:20120202110905-05'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer name: Websense, Inc.
- /Document number: 383-4-179-CR
- /ETR title, version, date: ETR title, version, date
- /Evaluation completion date: dd month yyyy
- /Keywords: Internet Proxy, Web Gateway, Triton, Websense
- /Manager:
- /ModDate: D:20120202110951-05'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /ST Title: Websense, Inc. V10000 G2 Web Gateway Appliance v7.6 Security Target
- /ST date: 22 December 2011
- /ST version: 1.0
- /SourceModified: D:20120202160256
- /Sponsor: Websense, Inc.
- /Subject:
- /TOE Version: 7.6
- /TOE name and version: Websense V10000 G2 Web Gateway Appliance v7.6
- /TOE short name: Websense V10000 G2 7.6
- /Title: EAL 2 Evaluation of V10000 G2 v7.6
- pdf_file_size_bytes: 85151
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /CreationDate: D:20040526154034+09'00'
- /ModDate: D:20040526154034+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13947
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/st_filename |
websense-v76-sec-eng.pdf |
|
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL2: 4
- EAL2 augmented: 1
- EAL2+: 3
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 8
- FAU_GEN.1: 16
- FAU_SAR: 6
- FAU_SAR.1: 11
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SEL.1: 6
- FAU_SEL.1.1: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ROL: 1
- FDP_ROL.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 16
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SAE.1: 6
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 6
- FRU_FLT.2.1: 1
- FRU_RSA: 8
- FRU_RSA.1: 6
- FTA:
- FTA_MCS.1: 1
- FTA_MCS.2: 6
- FTA_MCS.2.1: 1
- FTA_MCS.2.2: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.EXCLUSIVE: 2
- A.INSTALL: 2
- A.LOCATE: 3
- A.MANAGE: 3
- A.NETWORK: 2
- A.NOEVIL: 2
- O:
- O.AUDIT: 12
- O.AUTHENTICATE: 11
- O.DB_RESILIENCY: 7
- O.HARMFUL_CONTENT: 8
- O.MANAGE: 10
- O.PROTECT: 9
- O.QUOTA: 6
- O.RESOURCE_CONTROL: 8
- O.TIMESTAMP: 5
- OE:
- T:
- T.DB_FAILURE: 2
- T.EXTERNAL_CONTENT: 2
- T.MASQUERADE: 2
- T.NACCESS: 2
- T.RESOURCE: 2
- T.UNAUTHORIZED_ACCESS: 2
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
False |
state/st/download_ok |
True |
False |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |