Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belden Hirschmann IT MTS Series Ethernet Switchesv9.7.202.3 (for box switch), v9.7.202.3 (for chassis switch)
None
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software Version: A1UD0Y0-0100-GM0-04
JISEC-CC-CRP-C0314
name Belden Hirschmann IT MTS Series Ethernet Switchesv9.7.202.3 (for box switch), v9.7.202.3 (for chassis switch) bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software Version: A1UD0Y0-0100-GM0-04
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme SG JP
status active archived
not_valid_after 20.04.2028 01.09.2016
not_valid_before 20.04.2023 31.08.2011
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20Belden%20Hirschmann%20IT%20MTS%20Series%20CC%20Certificate.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20Belden%20Hirschmann%20IT%20MTS%20Series%20Certificate%20Report.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0314_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[DD]%20MTS_Security%20target%20v2.4.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0314_est.pdf
manufacturer Belden Hirschmann Industries (Suzhou) Ltd Konica Minolta Business Technologies, Inc
manufacturer_web https://hirschmann.com/en/index.phtml https://www.konicaminolta.com/
security_level EAL2+, ALC_FLR.2 EAL3
dgst 3dc6ace2d6cd57c2 0d9377a538b9186d
heuristics/cert_id JISEC-CC-CRP-C0314
heuristics/extracted_sars ALC_FLR.2 ALC_CMC.3, ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ALC_DVS.1, ASE_REQ.2, ADV_TDS.2, ALC_CMS.3, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_FSP.3, ASE_OBJ.2, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_LCD.1
heuristics/extracted_versions 9.7.202.3 04, 7828, 223, 363, 283, 423, 0100
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0314
  • certification_date: 01.08.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0314_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification and Authentication, and Access Control Function The function to identify and authenticate user, and to control access to highly confidential image data stored in MFP - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Safety transmitting and receiving function of image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0314_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0314_est.pdf
    • toe_version: A1UD0Y0-0100-GM0-04
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.09.2016
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Zentai Seigyo Software A1UD0Y0-0100-GM0-04
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0314_it1347.html
  • toe_overseas_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software A1UD0Y0-0100-GM0-04
pdf_data/report_filename c0314_erpt.pdf
pdf_data/report_frontpage
      pdf_data/report_keywords/cc_cert_id
      • JP:
        • CRP-C0314-01: 1
        • Certification No. C0314: 1
      pdf_data/report_keywords/cc_protection_profile_id
      pdf_data/report_keywords/cc_security_level
      • EAL:
        • EAL3: 4
      pdf_data/report_keywords/cc_sar
      pdf_data/report_keywords/cc_sfr
      pdf_data/report_keywords/cc_claims
      • A:
        • A.ADMIN: 1
        • A.NETWORK: 1
        • A.SECRET: 1
        • A.SERVICE: 1
        • A.SETTING: 1
      • T:
        • T.ACCESS-GROUP-: 1
        • T.ACCESS-GROUP-BOX: 1
        • T.ACCESS-PRIVATE-B: 1
        • T.ACCESS-PRIVATE-BOX: 1
        • T.ACCESS-PUBLIC-B: 1
        • T.ACCESS-PUBLIC-BOX: 1
        • T.ACCESS-SECURE-P: 1
        • T.ACCESS-SECURE-PRINT: 1
        • T.ACCESS-SETTING: 2
        • T.BRING-OUT-STORA: 1
        • T.BRING-OUT-STORAGE: 1
        • T.DISCARD-MFP: 2
        • T.UNEXPECTED-TRA: 1
        • T.UNEXPECTED-TRANSMISSION: 1
      pdf_data/report_keywords/vendor
      pdf_data/report_keywords/eval_facility
      pdf_data/report_keywords/symmetric_crypto
      pdf_data/report_keywords/asymmetric_crypto
      pdf_data/report_keywords/pq_crypto
      pdf_data/report_keywords/hash_function
      pdf_data/report_keywords/crypto_scheme
      pdf_data/report_keywords/crypto_protocol
      • TLS:
        • SSL:
          • SSL: 7
      pdf_data/report_keywords/randomness
      pdf_data/report_keywords/cipher_mode
      pdf_data/report_keywords/ecc_curve
      pdf_data/report_keywords/crypto_engine
      pdf_data/report_keywords/tls_cipher_suite
      pdf_data/report_keywords/crypto_library
      pdf_data/report_keywords/vulnerability
      pdf_data/report_keywords/side_channel_analysis
      pdf_data/report_keywords/technical_report_id
      pdf_data/report_keywords/device_model
      pdf_data/report_keywords/tee_name
      pdf_data/report_keywords/os_name
      pdf_data/report_keywords/cplc_data
      pdf_data/report_keywords/ic_data_group
      pdf_data/report_keywords/standard_id
      • CC:
        • CCMB-2009-07-001: 2
        • CCMB-2009-07-002: 2
        • CCMB-2009-07-003: 2
        • CCMB-2009-07-004: 2
      pdf_data/report_keywords/javacard_version
      pdf_data/report_keywords/javacard_api_const
      pdf_data/report_keywords/javacard_packages
      pdf_data/report_keywords/certification_process
      • ConfidentialDocument:
        • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD that is a medium to: 1
      pdf_data/report_metadata
      • /Author: IPA/JISEC
      • /Company: IPA
      • /CreationDate: D:20111005175043+09'00'
      • /Creator: Word 用 Acrobat PDFMaker 8.1
      • /Manager: IPA
      • /ModDate: D:20111013102302+09'00'
      • /Producer: Acrobat Distiller 8.2.0 (Windows)
      • /SourceModified: D:20111005085003
      • /Title: CRP-e
      • pdf_file_size_bytes: 637447
      • pdf_hyperlinks: {}
      • pdf_is_encrypted: True
      • pdf_number_of_pages: 40
      pdf_data/st_filename [DD] MTS_Security target v2.4.pdf c0314_est.pdf
      pdf_data/st_keywords/cc_security_level
      • EAL:
        • EAL2: 2
        • EAL2 augmented: 1
      • EAL:
        • EAL3: 3
      pdf_data/st_keywords/cc_sar
      • ALC:
        • ALC_FLR.2: 3
      • ADV:
        • ADV_ARC.1: 1
        • ADV_FSP.3: 1
        • ADV_TDS.2: 1
      • AGD:
        • AGD_OPE.1: 1
        • AGD_PRE.1: 1
      • ALC:
        • ALC_CMC.3: 1
        • ALC_CMS.3: 1
        • ALC_DVS.1: 1
        • ALC_LCD.1: 1
      • ASE:
        • ASE_CCL.1: 1
        • ASE_ECD.1: 1
        • ASE_INT.1: 1
        • ASE_OBJ.2: 1
        • ASE_REQ.2: 1
        • ASE_SPD.1: 1
        • ASE_TSS.1: 1
      • ATE:
        • ATE_COV.2: 1
        • ATE_DPT.1: 1
        • ATE_FUN.1: 1
        • ATE_IND.2: 1
      • AVA:
        • AVA_VAN.2: 1
      pdf_data/st_keywords/cc_sfr
      • FAU:
        • FAU_GEN.1: 12
        • FAU_GEN.1.1: 1
        • FAU_GEN.1.2: 1
        • FAU_GEN.2: 5
        • FAU_GEN.2.1: 1
        • FAU_SAR.1: 7
        • FAU_SAR.1.1: 1
        • FAU_SAR.1.2: 1
        • FAU_SAR.3: 4
        • FAU_SAR.3.1: 1
        • FAU_STG.1: 7
        • FAU_STG.1.1: 1
        • FAU_STG.1.2: 1
        • FAU_STG.3: 4
        • FAU_STG.3.1: 2
      • FCS:
        • FCS_CKM: 17
        • FCS_CKM.1: 11
        • FCS_CKM.2: 6
        • FCS_CKM.4: 20
        • FCS_CKM.4.1: 1
        • FCS_COP: 12
        • FCS_COP.1: 9
      • FDP:
        • FDP_ACC.1: 9
        • FDP_ACC.1.1: 1
        • FDP_ACF.1: 6
        • FDP_ACF.1.1: 1
        • FDP_ACF.1.2: 1
        • FDP_ACF.1.3: 1
        • FDP_ACF.1.4: 1
        • FDP_IFC.1: 10
        • FDP_IFC.1.1: 1
        • FDP_IFF.1: 5
        • FDP_IFF.1.1: 1
        • FDP_IFF.1.2: 1
        • FDP_IFF.1.3: 1
        • FDP_IFF.1.4: 1
        • FDP_IFF.1.5: 1
        • FDP_ITC.1: 9
        • FDP_ITC.1.1: 1
        • FDP_ITC.1.2: 1
        • FDP_ITC.1.3: 1
        • FDP_ITC.2: 4
      • FIA:
        • FIA_AFL.1: 6
        • FIA_AFL.1.1: 2
        • FIA_AFL.1.2: 2
        • FIA_ATD.1: 4
        • FIA_ATD.1.1: 1
        • FIA_SOS.1: 1
        • FIA_SOS.1.1: 1
        • FIA_UAU.1: 7
        • FIA_UAU.1.1: 1
        • FIA_UAU.1.2: 1
        • FIA_UID.1: 12
        • FIA_UID.1.1: 1
        • FIA_UID.1.2: 1
      • FMT:
        • FMT_MOF.1: 4
        • FMT_MOF.1.1: 2
        • FMT_MSA.1: 1
        • FMT_MSA.3: 10
        • FMT_SMF.1: 9
        • FMT_SMF.1.1: 1
        • FMT_SMR.1: 7
        • FMT_SMR.1.1: 1
        • FMT_SMR.1.2: 1
      • FPT:
        • FPT_STM.1: 3
      • FTA:
        • FTA_SSL.3: 5
        • FTA_SSL.3.1: 1
        • FTA_TSE.1: 5
        • FTA_TSE.1.1: 1
      • FTP:
        • FTP_TRP.1: 7
        • FTP_TRP.1.1: 1
        • FTP_TRP.1.2: 1
        • FTP_TRP.1.3: 1
      • FAU:
        • FAU_GEN: 1
      • FCS:
        • FCS_CAP.1: 2
        • FCS_CKM: 2
        • FCS_CKM.1: 10
        • FCS_CKM.1.1: 1
        • FCS_CKM.2: 2
        • FCS_CKM.4: 4
        • FCS_COP: 1
        • FCS_COP.1: 10
        • FCS_COP.1.1: 1
      • FDP:
        • FDP_ACC.1: 72
        • FDP_ACC.1.1: 4
        • FDP_ACF.1: 55
        • FDP_ACF.1.1: 4
        • FDP_ACF.1.2: 4
        • FDP_ACF.1.3: 4
        • FDP_ACF.1.4: 4
        • FDP_ACP.1: 1
        • FDP_IFC.1: 14
        • FDP_IFC.1.1: 1
        • FDP_IFF.1: 6
        • FDP_IFF.1.1: 1
        • FDP_IFF.1.2: 1
        • FDP_IFF.1.3: 1
        • FDP_IFF.1.4: 1
        • FDP_IFF.1.5: 1
        • FDP_ITC: 1
        • FDP_ITC.1: 4
        • FDP_ITC.2: 2
        • FDP_RIP.1: 1
        • FDP_UAU.7: 1
      • FIA:
        • FIA_AFL.1: 71
        • FIA_AFL.1.1: 9
        • FIA_AFL.1.2: 9
        • FIA_ATD.1: 29
        • FIA_ATD.1.1: 1
        • FIA_MSA.3: 1
        • FIA_SOS: 1
        • FIA_SOS.1: 44
        • FIA_SOS.1.1: 5
        • FIA_SOS.2: 9
        • FIA_SOS.2.1: 1
        • FIA_SOS.2.2: 1
        • FIA_SSL.3: 1
        • FIA_UAU: 2
        • FIA_UAU.1: 43
        • FIA_UAU.1.1: 2
        • FIA_UAU.1.2: 2
        • FIA_UAU.2: 44
        • FIA_UAU.2.1: 4
        • FIA_UAU.6: 11
        • FIA_UAU.6.1: 1
        • FIA_UAU.7: 19
        • FIA_UAU.7.1: 1
        • FIA_UID.1: 31
        • FIA_UID.2: 48
        • FIA_UID.2.1: 7
        • FIA_USB.1: 26
        • FIA_USB.1.1: 1
        • FIA_USB.1.2: 1
        • FIA_USB.1.3: 1
      • FMT:
        • FMT_MAS.1: 1
        • FMT_MOF.1: 31
        • FMT_MOF.1.1: 3
        • FMT_MSA: 5
        • FMT_MSA.1: 34
        • FMT_MSA.1.1: 3
        • FMT_MSA.3: 42
        • FMT_MSA.3.1: 8
        • FMT_MSA.3.2: 7
        • FMT_MTD.1: 119
        • FMT_MTD.1.1: 13
        • FMT_SMF.1: 112
        • FMT_SMF.1.1: 1
        • FMT_SMR.1: 171
        • FMT_SMR.1.1: 6
        • FMT_SMR.1.2: 6
        • FMT_SOS.1: 1
      • FTA:
        • FTA_SSL.3: 6
        • FTA_SSL.3.1: 1
      • FTP:
        • FTP_ITC.1: 5
        • FTP_ITC.1.1: 1
        • FTP_ITC.1.2: 1
        • FTP_ITC.1.3: 1
      pdf_data/st_keywords/cc_claims
      • A:
        • A.NOEVIL: 2
      • A:
        • A.ADMIN: 5
        • A.NETWORK: 6
        • A.SECRET: 3
        • A.SERVICE: 4
        • A.SETTING: 5
      • O:
        • O.AUTH: 2
        • O.AUTH-CAPABILITY: 5
        • O.CONFIG: 12
        • O.CRYPT: 4
        • O.CRYPTO: 4
        • O.CRYPTO-CAPABILITY: 5
        • O.CRYPTO-KEY: 2
        • O.CRYPTO-MAIL: 2
        • O.FAX: 2
        • O.FAX-CONTROL: 6
        • O.GROUP: 3
        • O.GROUP-BOX: 3
        • O.OVERWRITE: 3
        • O.OVERWRITE-ALL: 5
        • O.PRIVATE: 3
        • O.PRIVATE-BOX: 3
        • O.PUBLIC: 3
        • O.PUBLIC-BOX: 6
        • O.REGISTERED: 3
        • O.REGISTERED-USER: 12
        • O.SECURE: 4
        • O.SECURE-PRINT: 6
        • O.TRUSTED: 3
        • O.TRUSTED-PASS: 5
      • OE:
        • OE.ADMIN: 3
        • OE.FAX: 2
        • OE.FAX-UNIT: 2
        • OE.FEED: 2
        • OE.FEED-BACK: 9
        • OE.NETWORK: 4
        • OE.S: 1
        • OE.SECRET: 3
        • OE.SERVER: 5
        • OE.SERVICE: 3
        • OE.SESSION: 10
        • OE.SETTING: 2
        • OE.SETTING-SECURITY: 2
      • T:
        • T.ACCESS: 19
        • T.ACCESS-GROUP-BOX: 1
        • T.ACCESS-PRIVATE-BOX: 1
        • T.BACKUP: 3
        • T.BACKUP-RESTORE: 1
        • T.BRING: 3
        • T.D: 1
        • T.DISCARD: 2
        • T.DISCARD-MFP: 1
        • T.UNEXPECTED: 2
        • T.UNEXPECTED-TRANSMISSION: 1
      pdf_data/st_keywords/symmetric_crypto
      • AES_competition:
        • AES:
          • AES: 12
      • AES_competition:
        • AES:
          • AES: 5
      • DES:
        • 3DES:
          • 3DES: 1
        • DES:
          • DES: 2
      pdf_data/st_keywords/hash_function
      • SHA:
        • SHA2:
          • SHA256: 7
      pdf_data/st_keywords/crypto_scheme
      • MAC:
        • MAC: 2
      pdf_data/st_keywords/crypto_protocol
      • SSH:
        • SSH: 21
        • SSHv2: 3
      • TLS:
        • SSL:
          • SSL: 7
      pdf_data/st_keywords/cipher_mode
      • CTR:
        • CTR: 1
      pdf_data/st_keywords/standard_id
      • FIPS:
        • FIPS 197: 1
      • RFC:
        • RFC 2104: 1
        • RFC 4253: 1
        • RFC 4344: 1
        • RFC 4716: 2
      • CC:
        • CCMB-2009-07-001: 1
        • CCMB-2009-07-002: 1
        • CCMB-2009-07-003: 1
        • CCMB-2009-07-004: 1
      • FIPS:
        • FIPS 186: 2
        • FIPS 186-2: 4
        • FIPS PUB 197: 2
      • X509:
        • X.509: 1
      pdf_data/st_keywords/certification_process
      • ConfidentialDocument:
        • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
      pdf_data/st_metadata
      • /Author: Belden Hirschmann © 2020
      • /CreationDate: D:20230411152414+08'00'
      • /Creator: Microsoft® Word for Microsoft 365
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_ActionId: 14c29ab4-45a5-47eb-906a-0d5a47261c5c
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_ContentBits: 0
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_Enabled: true
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_Method: Privileged
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_Name: Official (Open)
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_SetDate: 2023-04-27T08:44:35Z
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
      • /ModDate: D:20230426095156+08'00'
      • /Producer: Microsoft® Word for Microsoft 365
      • /Title: security target for MTS serial switch v2.2
      • pdf_file_size_bytes: 683425
      • pdf_hyperlinks: {}
      • pdf_is_encrypted: False
      • pdf_number_of_pages: 43
      • /Author:
      • /CreationDate: D:20111004150943+09'00'
      • /Creator: CubePDF
      • /Keywords:
      • /ModDate: D:20111004150947+09'00'
      • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
      • /Subject:
      • /Title:
      • pdf_file_size_bytes: 1144816
      • pdf_hyperlinks: {}
      • pdf_is_encrypted: False
      • pdf_number_of_pages: 111
      state/report/convert_ok False True
      state/report/download_ok False True
      state/report/extract_ok False True
      state/report/pdf_hash Different Different
      state/report/txt_hash Different Different
      state/st/pdf_hash Different Different
      state/st/txt_hash Different Different