Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Tarantella Enterprise 3 Version 3.40.911 with Tarantella Security Pack, Version 3.41.211
CRP214
bizhub C353/ ineo+ 353 Control Software
JISEC-CC-CRP-C0127
name Tarantella Enterprise 3 Version 3.40.911 with Tarantella Security Pack, Version 3.41.211 bizhub C353/ ineo+ 353 Control Software
category Access Control Devices and Systems Multi-Function Devices
scheme UK JP
not_valid_after 05.03.2013 28.12.2010
not_valid_before 13.05.2005 26.11.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP214.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0127_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Tarantella_V2.4.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0127_est.pdf
manufacturer Tarantella LTD Konica Minolta Business Technologies, Inc
manufacturer_web https://www.tarantella.com https://www.konicaminolta.com/
security_level EAL2 EAL3
dgst 3db22e4de890393a 185fc5d6d2f97fda
heuristics/cert_id CRP214 JISEC-CC-CRP-C0127
heuristics/extracted_sars ALC_DVS.1, ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1
heuristics/extracted_versions 3.40.911, 3.41.211 353
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0127
  • certification_date: 01.11.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0127_eimg.pdf
    • description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C353/ ineo+ 353)(Hereinafter referred to as “MFP”). This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: bizhub C353/ ineo+ 353 Control Software(Japanese Name) bizhub C353/ ineo+ 353 Control Software(English Name)
    • product_type: IT Product (data protection function in digital MFD)
    • report_link: https://www.ipa.go.jp/en/security/c0127_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0127_est.pdf
    • toe_version: A02E0Y0-0100-GM0-02
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.01.2011
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C353/ ineo+ 353 Control Software A02E0Y0-0100-GM0-02
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0127_it7142.html
  • toe_overseas_name: bizhub C353/ ineo+ 353 Control Software A02E0Y0-0100-GM0-02
pdf_data/report_filename CRP214.pdf 20080306_c0127_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • UK:
    • CERTIFICATION REPORT No. P214: 1
  • JP:
    • CRP-C0127-01: 1
    • Certification No. C0127: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 1
    • EAL2: 16
    • EAL7: 1
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ACC.2: 1
    • FDP_ACF.1: 1
  • FMT:
    • FMT_MSA.1: 1
  • FTP:
    • FTP_ITC: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVER: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-NET: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.BACKUP: 1
    • T.BRING-OUT: 1
    • T.DISCARD-MFP: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 1
    • Microsoft Corporation: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA-1: 4
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 5
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-2004-01-001: 1
    • CCIMB-2004-01-002: 1
    • CCIMB-2004-01-003: 1
  • FIPS:
    • FIPS 140-2: 1
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 180-1: 1
    • FIPS 186: 1
    • FIPS 186-1: 1
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Solaris 8. Users should note that these Application Servers and the communications with them are out of scope of the evaluation. 6. Users login to the Tarantella Server via a web browser and are then presented: 1
    • The evaluated configuration is as illustrated in the diagram above although the firewall shown is out of scope. The product can be used in more complex network environments. These network configurations, which: 1
    • out of scope: 2
  • ConfidentialDocument:
    • 353)(Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
pdf_data/report_metadata
  • /Author: racook
  • /CreationDate: D:20050526142837Z
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20131204151607Z
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • /Title: Microsoft Word - LFL_T206_Tarantella_CertRep_10.doc
  • pdf_file_size_bytes: 667201
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
  • /CreationDate: D:20080305165156+09'00'
  • /ModDate: D:20080305165156+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 309678
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
pdf_data/st_filename Tarantella_V2.4.pdf 20080306_c0127_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 6
  • EAL:
    • EAL3: 6
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.1: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 1
    • AVA_VLA.1: 2
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 2
    • FAU_SAR.1: 2
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 2
    • FAU_SAR.3: 3
    • FAU_SAR.3.1: 2
    • FAU_STG.1: 4
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
  • FCS:
    • FCS_COP.1: 3
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 2
    • FDP_ACC.2: 6
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 2
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_ITC.1: 3
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.2: 2
    • FDP_RIP.2.1: 4
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 2
    • FIA_UID.1: 2
    • FIA_UID.2: 7
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 3
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 1
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_ITC: 3
    • FPT_ITC.2: 1
    • FPT_ITT.1: 3
    • FPT_ITT.1.1: 2
    • FPT_ITT.3: 2
    • FPT_ITT.3.1: 2
    • FPT_ITT.3.2: 2
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC: 6
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 50
    • FDP_ACC.1.1: 3
    • FDP_ACF: 3
    • FDP_ACF.1: 48
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 3
    • FDP_IFC.1: 3
    • FDP_ITC: 1
    • FDP_ITC.1: 5
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 87
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 12
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 67
    • FIA_SOS.1.1: 7
    • FIA_SOS.2: 11
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU: 11
    • FIA_UAU.1: 17
    • FIA_UAU.2: 119
    • FIA_UAU.2.1: 7
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 17
    • FIA_UAU.7.1: 2
    • FIA_UID: 16
    • FIA_UID.1: 21
    • FIA_UID.2: 62
    • FIA_UID.2.1: 7
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MAS.1: 1
    • FMT_MOF.1: 111
    • FMT_MOF.1.1: 3
    • FMT_MSA: 12
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 191
    • FMT_MTD.1.1: 13
    • FMT_SMF: 19
    • FMT_SMF.1: 41
    • FMT_SMF.1.1: 1
    • FMT_SMR: 23
    • FMT_SMR.1: 112
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
  • FPT:
    • FPT_RVM.1: 19
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.AUTH: 2
    • A.CERTIFICATE: 3
    • A.CONFIG: 2
    • A.CONNECT: 2
    • A.PHYSICAL: 2
    • A.USER: 2
  • O:
    • O.ADMIN: 4
    • O.AUDIT: 5
    • O.AUTH_SERVER: 4
    • O.DAC: 8
    • O.SECURE_ENCRYPTION: 4
    • O.TPATH: 8
  • OE:
    • OE.ACCOUNT: 5
    • OE.AUDMAN: 3
    • OE.AUDREC: 4
    • OE.AUTHDATA: 4
    • OE.INSTALL: 9
    • OE.KEYMGMT: 9
    • OE.OSAUTH: 4
    • OE.OSCONFIG: 3
    • OE.OSKEYS: 10
  • OSP:
    • OSP.CRYPTO: 2
  • T:
    • T.CHANNEL: 3
    • T.EXCEED: 3
    • T.MISDIRECT: 3
    • T.UNAUTH: 3
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 2
    • A.SERVER: 1
    • A.SETTING: 1
  • O:
    • O.CHECK-HDD: 5
    • O.CONFIG: 9
    • O.CRYPT-KEY: 1
    • O.CRYPTO-MAIL: 6
    • O.GROUP-BOX: 4
    • O.OVERWRITE-ALL: 5
    • O.PRIVATE-BOX: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED-USER: 12
    • O.SECURE-PRINT: 6
    • O.TRUSTED-PASS: 3
  • OE:
    • OE.CRYPT: 5
    • OE.FEED-BACK: 12
    • OE.LOCK-HDD: 1
    • OE.SESSION: 1
  • T:
    • T.ACCESS-GROUP-BOX: 2
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.DISCARD-MFP: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 1
  • AES_competition:
    • AES:
      • AES: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 8
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2004-01-001: 1
    • CCIMB-2004-01-002: 1
    • CCIMB-2004-01-003: 1
  • FIPS:
    • FIPS 140-2: 2
    • FIPS140-2: 2
  • RFC:
    • RFC 2246: 2
  • X509:
    • X.509: 6
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS 186: 4
    • FIPS 186-1: 2
    • FIPS PUB 197: 5
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Note that these application servers and the communications with them (RDP/SSH/X11) are out of scope: 1
    • out of scope: 1
    • server. (Note that these application servers and the communications with them (RDP/SSH/X11) are out of scope). Evaluation of Tarantella Enterprise 3 Tarantella Enterprise 3 Security Target/Issue 2.4 11 April: 1
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
pdf_data/st_metadata
  • /Author: griffinh@griffinh
  • /CreationDate: D:20050411140335+00'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20050411141010
  • /Producer: Jaws PDF Creator v2.11.1164
  • /Title: Microsoft Word - T206-ST.doc
  • pdf_file_size_bytes: 384411
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
  • /Author:
  • /Company:
  • /CreationDate: D:20080304170621+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20080304171340+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - 【C0127】Thames1_英文ST-1.03-080304.doc
  • /_AdHocReviewCycleID: -1264862075
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: megumi tanabe
  • /_EmailSubject: 【Mosel ISO15408】 ST翻訳確認のお願い
  • pdf_file_size_bytes: 922218
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 131
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different