name |
Adder AVS-4228, AVS-42216, XDS441, XDS441FXFirmware Version 44404-E7E7 Peripheral Sharing Devices |
bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
CA |
JP |
status |
active |
archived |
not_valid_after |
07.12.2027 |
08.04.2014 |
not_valid_before |
07.12.2022 |
13.03.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/540-EWA%20CT.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/540-EWA%20CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Adder_CFG_PSD-KM-VI_Combined_ST_1.6.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_st.pdf |
manufacturer |
Adder Technology Ltd |
Konica Minolta Business Technologies, Inc |
manufacturer_web |
https://www.adder.com/ |
https://www.konicaminolta.com/ |
security_level |
{} |
EAL3 |
dgst |
3120cab383c481d0 |
2269d5f12e90117d |
heuristics/cert_id |
540-EWA |
JISEC-CC-CRP-C0205 |
heuristics/cert_lab |
CANADA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, AVA_VLA.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
44404, 42216, 4228 |
7522, 601, 6022, 751 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- certification_date: 07.12.2022
- level: PP_PSD_V4.0 with MOD_KM_V1.0, MOD_VI_V1.0
- product: Adder AVS-4228, AVS-42216, XDS441, XDS441FX Firmware Version 44404-E7E7 Peripheral Sharing Devices Adder AVS-4228, AVS-42216 Firmware Version 44404-E7E7 Peripheral Sharing Devices (August 2023)
- vendor: Adder Technology
|
- cert_id: JISEC-CC-CRP-C0205
- certification_date: 01.03.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0205_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software English: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0205_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0205_st.pdf
- toe_version: A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.04.2014
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0205_it8216.html
- toe_overseas_name: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
42cf355b24450489, 76f8f05a35d87f59, 814f66c77bc7f33b |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf |
{} |
pdf_data/cert_filename |
540-EWA CT.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Morey, Robert B.
- /Company: CSEC-CSTC
- /CreationDate: D:20221221095343-05'00'
- /Creator: Foxit Software Inc.
- /Keywords:
- /ModDate: D:20221221095343-05'00'
- /Producer: Foxit PDF Creator Version 12.0.0.15105
- /Subject:
- /Title:
- pdf_file_size_bytes: 393626
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
540-EWA CR.pdf |
c0205_erpt.pdf |
pdf_data/report_frontpage |
- CA:
- cert_id: 540-EWA
- cert_lab: CANADA
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0205-01: 1
- Certification No. C0205: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-GROUP-B: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-NET-SET: 1
- T.ACCESS-PRIVATE: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTOR: 1
- T.BACKUP-RESTORE: 1
- T.BRING-OUT-CF: 2
- T.BRING-OUT-STOR: 1
- T.BRING-OUT-STORAGE: 1
- T.DISCARD-MFP: 2
- T.UNEXPECTEC-TRANSMISSION: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in: 1
|
pdf_data/report_metadata |
- /Author: Morey, Robert B.
- /Company: CSEC-CSTC
- /CreationDate: D:20221221095230-05'00'
- /Creator: Foxit Software Inc.
- /Keywords:
- /ModDate: D:20221221095230-05'00'
- /Producer: Foxit PDF Creator Version 12.0.0.15105
- /Subject:
- /Title:
- pdf_file_size_bytes: 900798
- pdf_hyperlinks: https://www.adder.com/en, https://nvd.nist.gov/vuln/search, mailto:[email protected], https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=xds441fx&search_type=all&isCpeNameSearch=false, http://www.adder.com/, https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=HDMI&search_type=all&isCpeNameSearch=false, https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=Version+44404-E7E7&search_type=all&isCpeNameSearch=false, https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=avs-42216&search_type=all&isCpeNameSearch=false, mailto:[email protected], https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=DisplayPort&search_type=all&isCpeNameSearch=false, https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=xds441&search_type=all&isCpeNameSearch=false, https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=avs-4228&search_type=all&isCpeNameSearch=false, https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=Network+Extender&search_type=all&isCpeNameSearch=false, https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=adder+isolator+devices&search_type=all&isCpeNameSearch=false, https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=adder+combiner+devices&search_type=all&isCpeNameSearch=false
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /CreationDate: D:20090409174039+09'00'
- /ModDate: D:20090409174039+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 406178
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
Adder_CFG_PSD-KM-VI_Combined_ST_1.6.pdf |
c0205_st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FDP:
- FDP_APC_EXT: 25
- FDP_APC_EXT.1: 17
- FDP_APC_EXT.1.1: 1
- FDP_APC_EXT.1.2: 1
- FDP_APC_EXT.1.3: 1
- FDP_APC_EXT.1.4: 1
- FDP_CDS_EXT: 4
- FDP_CDS_EXT.1: 19
- FDP_CDS_EXT.1.1: 4
- FDP_FIL_EXT: 16
- FDP_FIL_EXT.1: 7
- FDP_FIL_EXT.1.1: 1
- FDP_FIL_EXT.1.2: 1
- FDP_FIL_EXT.1.3: 1
- FDP_FLS_EXT: 1
- FDP_IPC_EXT: 4
- FDP_IPC_EXT.1: 19
- FDP_IPC_EXT.1.1: 4
- FDP_IPC_EXT.1.2: 4
- FDP_PDC_EXT: 30
- FDP_PDC_EXT.1: 31
- FDP_PDC_EXT.1.1: 2
- FDP_PDC_EXT.1.2: 1
- FDP_PDC_EXT.1.3: 1
- FDP_PDC_EXT.1.4: 1
- FDP_PDC_EXT.1.5: 1
- FDP_PDC_EXT.2: 12
- FDP_PDC_EXT.2.1: 1
- FDP_PDC_EXT.2.2: 1
- FDP_PDC_EXT.3: 12
- FDP_PDC_EXT.3.1: 1
- FDP_PDC_EXT.3.2: 1
- FDP_RDR_EXT: 4
- FDP_RDR_EXT.1: 15
- FDP_RDR_EXT.1.1: 2
- FDP_RIP: 8
- FDP_RIP.1: 2
- FDP_RIP_EXT: 4
- FDP_RIP_EXT.1: 9
- FDP_RIP_EXT.1.1: 2
- FDP_SPR_EXT: 18
- FDP_SPR_EXT.1: 6
- FDP_SPR_EXT.1.1: 1
- FDP_SWI_EXT: 4
- FDP_SWI_EXT.1: 22
- FDP_SWI_EXT.1.1: 4
- FDP_SWI_EXT.2: 13
- FDP_SWI_EXT.2.1: 3
- FDP_SWI_EXT.2.2: 3
- FDP_SWI_EXT.3: 16
- FDP_SWI_EXT.3.1: 3
- FDP_UDF_EXT: 16
- FDP_UDF_EXT.1: 6
- FDP_UDF_EXT.1.1: 1
- FPT:
- FPT_FLS_EXT: 3
- FPT_FLS_EXT.1: 10
- FPT_FLS_EXT.1.1: 3
- FPT_NTA_EXT: 4
- FPT_NTA_EXT.1: 8
- FPT_NTA_EXT.1.1: 2
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 2
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST_EXT: 4
- FPT_TST_EXT.1: 20
- FPT_TST_EXT.1.1: 4
- FTA:
- FTA_CIN_EXT: 4
- FTA_CIN_EXT.1: 14
- FTA_CIN_EXT.1.1: 3
- FTA_CIN_EXT.1.2: 3
- FTA_CIN_EXT.1.3: 3
|
- FAU:
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 58
- FDP_ACC.1.1: 3
- FDP_ACF.1: 42
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ACP.1: 1
- FDP_IFC.1: 6
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 62
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 8
- FIA_ATD.1: 25
- FIA_ATD.1.1: 1
- FIA_EID: 2
- FIA_EID.1: 16
- FIA_EID.1.1: 3
- FIA_EID.1.2: 1
- FIA_NEW.1.2: 2
- FIA_SOS: 1
- FIA_SOS.1: 48
- FIA_SOS.1.1: 6
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU.1: 23
- FIA_UAU.2: 63
- FIA_UAU.2.1: 6
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID.1: 31
- FIA_UID.2: 50
- FIA_UID.2.1: 7
- FIA_USB.1: 22
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 33
- FMT_MOF.1.1: 4
- FMT_MSA: 3
- FMT_MSA.1: 32
- FMT_MSA.1.1: 3
- FMT_MSA.3: 31
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 5
- FMT_MTD.1: 105
- FMT_MTD.1.1: 12
- FMT_SMF.1: 109
- FMT_SMF.1.1: 1
- FMT_SMR.1: 167
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SMS.1: 1
- FMT_SOS.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_PHYSICAL: 1
- A.NO_SPECIAL: 1
- A.NO_SPECIAL_ANALOG: 1
- A.NO_TEMPEST: 2
- A.NO_WIRELESS: 1
- A.NO_WIRELESS_DEVICES: 1
- A.PHYSICAL: 1
- A.TRUSTED: 1
- A.TRUSTED_ADMIN: 2
- A.TRUSTED_CONFIG: 1
- A.USER_ALLOWED: 1
- A.USER_ALLOWED_ACCESS: 1
- O:
- O.ANTI_TAMPERING: 2
- O.AUTHORIZED: 2
- O.COMPUTER: 5
- O.EMULATED_INPUT: 3
- O.LEAK: 1
- O.LEAK_PREVENTION: 1
- O.NO_OTHER: 3
- O.NO_TOE_ACCESS: 2
- O.NO_USER: 1
- O.NO_USER_DATA: 1
- O.PERIPHERAL: 1
- O.PERIPHERAL_PORTS: 1
- O.PROTECTED: 1
- O.PROTECTED_EDID: 3
- O.REJECT: 4
- O.SELF_TEST: 4
- O.SELF_TEST_FAIL: 2
- O.TAMPER: 1
- O.TAMPER_EVIDENT: 2
- O.UNIDIRECTIONAL: 7
- O.USER_DATA: 2
- OE:
- OE.NO_SPECIAL: 1
- OE.NO_SPECIAL_ANALOG: 1
- OE.NO_TEMPEST: 2
- OE.NO_WIRELESS: 1
- OE.NO_WIRELESS_DEVICES: 1
- OE.PHYSICAL: 3
- OE.TRUSTED: 2
- OE.TRUSTED_ADMIN: 1
- OE.TRUSTED_CONFIG: 1
- T:
- T.DATA_LEAK: 2
- T.FAILED: 2
- T.LOGICAL: 1
- T.LOGICAL_TAMPER: 1
- T.PHYSICAL: 1
- T.PHYSICAL_TAMPER: 1
- T.REPLACEMENT: 2
- T.RESIDUAL: 1
- T.RESIDUAL_LEAK: 1
- T.SIGNAL_LEAK: 2
- T.UNAUTHORIZED: 1
- T.UNAUTHORIZED_DEVICES: 1
- T.UNINTENDED: 1
- T.UNINTENDED_USE: 1
|
- A:
- A.ADMIN: 3
- A.NETWORK: 4
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.AUTH-CAPABILITY: 10
- O.CHECK-CF: 4
- O.CHECK-HDD: 7
- O.CONFIG: 11
- O.CRYPT-KEY: 5
- O.CRYPTO-CAPABILITY: 4
- O.CRYPTO-MAIL: 4
- O.GROUP-BOX: 5
- O.LOCK-CF-CAPABILITY: 4
- O.LOCK-HDD-CAPABILITY: 7
- O.OVERWRITE-ALL: 7
- O.PRIVATE-BOX: 5
- O.PUBLIC-BOX: 8
- O.REGISTERED-USER: 14
- O.SECURE-PRINT: 8
- O.TRUSTED-PASS: 7
- OE:
- OE.ADMIN: 2
- OE.CRYPT: 3
- OE.CRYPTO: 1
- OE.FEED-BACK: 10
- OE.LOCK-CF: 3
- OE.LOCK-HDD: 3
- OE.NETWORK: 2
- OE.SECRET: 2
- OE.SERVER: 5
- OE.SERVICE: 2
- OE.SESSION: 2
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS-GROUP-BOX: 3
- T.ACCESS-PRIVATE-BOX: 3
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-CF: 2
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTED-TRANSMISSION: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186: 1
- FIPS 186-1: 1
- FIPS 186-2: 4
- FIPS PUB 197: 3
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- INC., All Rights Reserved. 7 / 110 TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in: 1
|
pdf_data/st_metadata |
|
- /Author: m-izumi
- /CreationDate: D:20090410164324+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20090410164324+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title: Microsoft Word - C0205_ST_en.doc
- pdf_file_size_bytes: 683223
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 110
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |