Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Enterasys Netsight/Network Access Control v3.2.2
383-4-105
bizhub C650 / ineo+ 650 Control Software v A00J0Y0-0100-GM0-00
JISEC-CC-CRP-C0121
name Enterasys Netsight/Network Access Control v3.2.2 bizhub C650 / ineo+ 650 Control Software v A00J0Y0-0100-GM0-00
category Access Control Devices and Systems Multi-Function Devices
scheme CA JP
not_valid_after 15.05.2017 28.12.2010
not_valid_before 11.04.2011 29.10.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/enterasys-net-v322-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080303_c0121_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/enterasys-net-v322-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080303_c0121_est.pdf
manufacturer Enterasys Networks, Inc Konica Minolta Business Technologies, Inc
manufacturer_web https://www.enterasys.com/ https://www.konicaminolta.com/
security_level EAL2+, ALC_FLR.1 EAL3
dgst 3c06875a1a68c5e2 88fe5bedb1982f39
heuristics/cert_id 383-4-105 JISEC-CC-CRP-C0121
heuristics/cert_lab CANADA []
heuristics/extracted_sars ALC_CMS.2, ALC_FLR.1, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1
heuristics/extracted_versions 3.2.2 00, 650, 0100
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0121
  • certification_date: 01.10.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0121_eimg.pdf
    • description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C650 / ineo+ 650)(Hereinafter referred to as “MFP”). This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: bizhub C650 / ineo+ 650 Control Software
    • product_type: IT Product (data protection function in digital MFD)
    • report_link: https://www.ipa.go.jp/en/security/c0121_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0121_est.pdf
    • toe_version: A00H0Y0-0100-GM0-00
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.01.2011
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C650 / ineo+ 650 Control Software A00H0Y0-0100-GM0-00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0121_it7132.html
  • toe_overseas_name: bizhub C650 / ineo+ 650 Control Software A00H0Y0-0100-GM0-00
pdf_data/report_filename enterasys-net-v322-cert-eng.pdf 20080303_c0121_erpt.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-105-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-105-CR: 1
  • JP:
    • CRP-C0121-01: 1
    • Certification No. C0121: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 5
    • EAL 2 augmented: 2
    • EAL 2+: 1
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVER: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-NET: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.BACKUP: 1
    • T.BRING-OUT: 1
    • T.DISCARD-MFP: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 186: 1
    • FIPS 186-1: 1
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 650)(Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
pdf_data/report_metadata
  • /Author: User
  • /CCEF: DOMUS ITSL
  • /CR date: 20 April 2011
  • /CR version: 0.1
  • /Certificate date: 20 April 2011
  • /Comments:
  • /Company: Microsoft
  • /CreationDate: D:20110707081718-04'00'
  • /Creator: Acrobat PDFMaker 10.0 for Word
  • /Developer name: Enterasys
  • /Document number: 383-4-105-CR
  • /ETR title, version, date: Evaluation Technical Report Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 , v1.0, 11 April 2011
  • /Evaluation completion date: 01 April 2010
  • /Keywords:
  • /ModDate: D:20110707081806-04'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /ST Title: Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2
  • /ST date: 06 July 2010
  • /ST version: 0.6
  • /SourceModified: D:20110707121555
  • /Sponsor: Enterasys
  • /Subject:
  • /TOE Version: 3.2.2
  • /TOE name and version: Enterasys Netsight/Network Access Control v3.2.2
  • /TOE short name: Enterasys Netsight/NAC
  • /Title: EAL 2 Evaluation of <TOE name and version>
  • /_AdHocReviewCycleID: -1272630275
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Reade, Rick A.
  • /_EmailSubject: Current PCR templates ... rick
  • /_ReviewingToolsShownOnce:
  • pdf_file_size_bytes: 70633
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 12
  • /CreationDate: D:20080222184444+09'00'
  • /ModDate: D:20080222184444+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 289639
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
pdf_data/st_filename enterasys-net-v322-sec-eng.pdf 20080303_c0121_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 4
  • EAL:
    • EAL3: 6
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
  • FDP:
    • FDP_ACC.1: 39
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 33
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 16
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 50
    • FDP_ACC.1.1: 3
    • FDP_ACF: 3
    • FDP_ACF.1: 48
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 3
    • FDP_IFC.1: 3
    • FDP_ITC: 1
    • FDP_ITC.1: 5
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 87
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 12
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 67
    • FIA_SOS.1.1: 7
    • FIA_SOS.2: 11
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU: 11
    • FIA_UAU.1: 17
    • FIA_UAU.2: 119
    • FIA_UAU.2.1: 7
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 17
    • FIA_UAU.7.1: 2
    • FIA_UID: 16
    • FIA_UID.1: 21
    • FIA_UID.2: 62
    • FIA_UID.2.1: 7
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MAS.1: 1
    • FMT_MOF.1: 111
    • FMT_MOF.1.1: 3
    • FMT_MSA: 12
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 191
    • FMT_MTD.1.1: 13
    • FMT_SMF: 19
    • FMT_SMF.1: 41
    • FMT_SMF.1.1: 1
    • FMT_SMR: 23
    • FMT_SMR.1: 112
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
  • FPT:
    • FPT_RVM.1: 19
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.LOCATE: 2
    • A.NOEVIL: 2
    • A.PROTECT: 2
  • O:
    • O.ADMIN: 8
    • O.AUDIT: 6
    • O.NETACCESS: 6
    • O.USERAUTH: 8
  • OE:
    • OE.ADMINAUTH: 10
    • OE.PROTECT: 3
    • OE.RADIUS: 7
    • OE.SECURECOMMUNICATION: 3
    • OE.TIMESTAMP: 4
  • T:
    • T.DATALOSS: 2
    • T.IA: 2
    • T.INFO_CAPTURE: 2
    • T.INT_CONF: 2
    • T.MASQUERADE: 2
    • T.NO_AUDIT: 2
    • T.UNAUTH: 2
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 2
    • A.SERVER: 1
    • A.SETTING: 1
  • O:
    • O.CHECK-HDD: 5
    • O.CONFIG: 9
    • O.CRYPT-KEY: 1
    • O.CRYPTO-MAIL: 6
    • O.GROUP-BOX: 4
    • O.OVERWRITE-ALL: 5
    • O.PRIVATE-BOX: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED-USER: 12
    • O.SECURE-PRINT: 6
    • O.TRUSTED-PASS: 3
  • OE:
    • OE.CRYPT: 5
    • OE.FEED-BACK: 12
    • OE.LOCK-HDD: 1
    • OE.SESSION: 1
  • T:
    • T.ACCESS-GROUP-BOX: 2
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.DISCARD-MFP: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 13
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 2
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 1
    • FIPS 186: 4
    • FIPS 186-1: 2
    • FIPS PUB 197: 5
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
pdf_data/st_metadata
  • /Author: Corsec Security, Inc.
  • /CreationDate: D:20110308160411-05'00'
  • /Creator: PDFCreator Version 1.1.0
  • /Keywords:
  • /ModDate: D:20110531105808-04'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: Enterasys Network Access Control v3.2 ST v0.7
  • pdf_file_size_bytes: 507233
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 49
  • /Author:
  • /Company:
  • /CreationDate: D:20080221211757+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20080221211844+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - 【C0121】Mosel1_英文ST-1.06-080221.doc
  • /_AdHocReviewCycleID: -1264862075
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: megumi tanabe
  • /_EmailSubject: 【Mosel ISO15408】 ST翻訳確認のお願い
  • pdf_file_size_bytes: 923581
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 131
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different