Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C352P / ineo+ 351P / magicolor 8460CK Control Software 9J06-0100-GM0-11-000
JISEC-CC-CRP-C0104
Infoblox Trinzic Appliances with NIOS v6.3
CCEVS-VR-VID-10465-2012
name bizhub C352P / ineo+ 351P / magicolor 8460CK Control Software 9J06-0100-GM0-11-000 Infoblox Trinzic Appliances with NIOS v6.3
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme JP US
not_valid_after 07.10.2013 31.12.2014
not_valid_before 27.06.2007 17.12.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0104_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10465-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0104_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10465-st.pdf
manufacturer Konica Minolta Business Technologies, Inc Infoblox Incorporated
manufacturer_web https://www.konicaminolta.com/ https://www.infoblox.com/
security_level EAL3 EAL2+, ALC_DVS.1, ALC_FLR.2
dgst 3533def3f2fee8a3 dace4f90d0d3acff
heuristics/cert_id JISEC-CC-CRP-C0104 CCEVS-VR-VID-10465-2012
heuristics/cert_lab [] US
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 ALC_DVS.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_DEL.1, ALC_CMC.2, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1
heuristics/extracted_versions 11, 000, 0100 6.3
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0104
  • certification_date: 01.06.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0104_eimg.pdf
    • description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. network printer ( bizhub C352P / ineo+ 351P / magicolor 8460CK )( Hereinafter referred to as “ printer ” ) . This software is on the flash memory on the printer controller carried in printer, and this controls the whole operation of printer such as the operation control processing and the image data management received from the panel of printer body or the network. This product offers the protection from exposure of the highly confidential document stored in the printer, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD (option part) unjustly which is a medium for storing image data in printer. If the encryption board, an option product, is installed in the printer controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: bizhub C352P / ineo+ 351P / magicolor 8460CK Control Software
    • product_type: IT Product (data protection function in printer systems)
    • report_link: https://www.ipa.go.jp/en/security/c0104_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0104_est.pdf
    • toe_version: 9J06-0100-GM0-11-000
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.10.2013
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C352P / ineo+ 351P / magicolor 8460CK Control Software 9J06-0100-GM0-11-000
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0104_it6080.html
  • toe_overseas_name: bizhub C352P / ineo+ 351P / magicolor 8460CK Control Software 9J06-0100-GM0-11-000
  • category: Network Device
  • certification_date: 17.12.2012
  • evaluation_facility: DXC.technology
  • expiration_date: 17.12.2014
  • id: CCEVS-VR-VID10465
  • product: Infoblox Trinzic Appliances with NIOS v6.3
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10465
  • vendor: Infoblox Inc.
pdf_data/report_filename c0104_erpt.pdf st_vid10465-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10465-2012
    • cert_item: Infoblox Trinzic Appliances with NIOS v6.3 (Models: IB-810, IB-820, IB-1400, IB-1410, IB-1420, IB-2200, IB-2210, IB-2220, IB-4000 and IB-4010
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0104-01: 1
    • Certification No. C0104: 1
  • US:
    • CCEVS-VR-VID10465-2012: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 2
  • EAL:
    • EAL 2: 4
    • EAL 2 augmented: 2
    • EAL 4: 1
    • EAL2: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.1: 4
    • ALC_FLR.2: 4
  • ATE:
    • ATE_IND: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS: 1
    • T.ACCESS-BOX: 1
    • T.ACCESS-NET: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.BRING-OUT: 1
    • T.DISCARD-PRINTER: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 180-1: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • panel of Printer body or the network. This TOE offers the protection from exposure of the highly confidential document stored in the Printer, and aims at protecting the data which may be exposed against a user’s: 1
pdf_data/report_metadata
  • /CreationDate: D:20070906134713+09'00'
  • /ModDate: D:20070906134713+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 338872
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
  • /Author: Evaluation Team
  • /CreationDate: D:20121226131335
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: VR
  • /ModDate: D:20121226131335
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Validator Report
  • /Title: Validation Report for IronPort Messaging Gateway
  • pdf_file_size_bytes: 363166
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename c0104_est.pdf st_vid10465-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 6
    • EAL4: 1
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 5
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 5
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 5
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.1: 1
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 8
    • ALC_FLR.2: 8
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_COP: 2
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 6
    • FDP_ACC.1: 34
    • FDP_ACC.1.1: 3
    • FDP_ACF: 3
    • FDP_ACF.1: 42
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ITC.1: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 62
    • FIA_AFL.1.1: 7
    • FIA_AFL.1.2: 7
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 12
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 47
    • FIA_SOS.1.1: 5
    • FIA_SOS.2: 10
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU: 9
    • FIA_UAU.1: 13
    • FIA_UAU.2: 64
    • FIA_UAU.2.1: 5
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 2
    • FIA_UID: 11
    • FIA_UID.1: 13
    • FIA_UID.2: 34
    • FIA_UID.2.1: 4
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MOF.1: 69
    • FMT_MOF.1.1: 3
    • FMT_MSA: 9
    • FMT_MSA.2: 2
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 81
    • FMT_MTD.1.1: 6
    • FMT_SMF: 18
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 51
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_RVM.1: 17
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FAU:
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 7
    • FAU_STG.3.1: 2
    • FAU_STG_EXT.1: 2
    • FAU_STG_EXT.3: 2
    • FAU_UID.1: 1
  • FCS:
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 8
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 27
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 35
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 5
    • FCS_TLS_EXT: 7
    • FCS_TLS_EXT.1: 11
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT: 1
    • FIA_PMG_EXT.1: 10
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU.1: 8
    • FIA_UAU.5: 1
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 1
    • FIA_UAU_EXT.5: 10
    • FIA_UAU_EXT.5.1: 2
    • FIA_UAU_EXT.5.2: 2
    • FIA_UIA.1: 1
    • FIA_UIA_EXT: 1
    • FIA_UIA_EXT.1: 13
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID.1: 5
  • FMT:
    • FMT_MTD: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 8
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 12
    • FPT_ITT.1.1: 2
    • FPT_PTD: 1
    • FPT_PTD.1: 19
    • FPT_PTD.1.1: 4
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TRP.1: 2
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 9
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD: 1
    • FPT_TUD_EXT.1: 5
  • FRU:
    • FRU_RSA.1: 6
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
    • FTA_SSL_EXT: 1
    • FTA_SSL_EXT.1: 10
    • FTA_SSL_EXT.1.1: 2
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 20
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 3
    • FTP_ITC.1.3: 3
    • FTP_TRP.1: 10
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SETTING: 1
  • O:
    • O.BOX: 5
    • O.CHECK-HDD: 2
    • O.CONFIG: 9
    • O.CRYPT-KEY: 3
    • O.OVERWRITE-ALL: 2
    • O.SECURE-PRINT: 3
  • OE:
    • OE.CRYPT: 4
    • OE.FEED-BACK: 8
    • OE.LOCK-HDD: 1
  • T:
    • T.ACCESS-BOX: 1
    • T.ACCESS-NET-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.DISCARD-PRINTER: 1
  • A:
    • A.ACCESS: 3
    • A.NO_GENERAL_PUR: 1
    • A.NO_GENERAL_PURPOSE: 2
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 3
  • O:
    • O.DISPLAY_BANNER: 4
    • O.PROTECTED_COM: 1
    • O.PROTECTED_COMMUNICATI: 1
    • O.PROTECTED_COMMUNICATIONS: 5
    • O.RESIDUAL_INFOR: 1
    • O.RESIDUAL_INFORMATION_C: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.RESOURCE_AVAIL: 1
    • O.RESOURCE_AVAILABILITY: 6
    • O.SESSION_LOCK: 3
    • O.SYSTEM_MONITO: 1
    • O.SYSTEM_MONITORING: 6
    • O.TOE_ADMINISTRA: 1
    • O.TOE_ADMINISTRATION: 7
    • O.TSF_SELF_TEST: 7
    • O.VERIFIABLE_UPDA: 1
    • O.VERIFIABLE_UPDATES: 2
  • OE:
    • OE.NO_GENERAL_PURPOSE: 4
    • OE.PHYSICAL: 2
    • OE.TRUSTED_ADMIN: 4
    • OE.TRUSTED_REMOTE_AUTH: 2
    • OE.USER_AUTHENTICATION: 4
  • T:
    • T.ADMIN_ERROR: 3
    • T.RESOURCE_EXHAU: 1
    • T.RESOURCE_EXHAUSTION: 2
    • T.TSF_FAILURE: 3
    • T.UNAUTHORIZED_AC: 1
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_UP: 1
    • T.UNAUTHORIZED_UPDATE: 2
    • T.UNDETECTED_ACTI: 1
    • T.UNDETECTED_ACTIONS: 2
    • T.USER_DATA_REUSE: 3
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 15
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 2048: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 2
    • SHA2:
      • SHA-256: 2
      • SHA-384: 3
      • SHA-512: 4
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 9
  • TLS:
    • TLS:
      • TLS: 35
      • TLS 1.0: 5
      • TLS 1.1: 1
      • TLS 1.2: 1
  • VPN:
    • VPN: 8
pdf_data/st_keywords/randomness
  • RNG:
    • RBG: 20
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • GCM:
    • GCM: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS PUB 197: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 186-3: 2
    • FIPS PUB 186-2: 1
    • FIPS PUB 186-3: 4
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-38B: 2
    • NIST SP 800-90: 1
  • RFC:
    • RFC 2246: 4
    • RFC 2402: 1
    • RFC 2406: 1
    • RFC 2818: 3
    • RFC 2845: 1
    • RFC 3645: 1
    • RFC 4033: 1
    • RFC 4035: 1
    • RFC 4346: 1
    • RFC 5246: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the printer. Moreover, TOE can encrypt the image data written in HDD for the danger of: 1
pdf_data/st_metadata
  • /CreationDate: D:20070904142335+09'00'
  • /Creator: クセロPDF v1.14 Rev0495
  • /ModDate: D:20070904142335+09'00'
  • /Producer: Xelo PDF Library
  • pdf_file_size_bytes: 1755408
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /CreationDate: D:20121114133113-08'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20121120111814-05'00'
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 985051
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 67
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different