Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version: A0P00Y0-0100-GM0-24
JISEC-CC-CRP-C0312
EROAD System
SERTIT-059
name bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version: A0P00Y0-0100-GM0-24 EROAD System
scheme JP NO
not_valid_after 01.09.2016 25.06.2020
not_valid_before 31.08.2011 25.06.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0312_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20150625_SERTIT-059_CR_v10.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0312_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_EROAD_v1.3_FINAL.pdf
manufacturer Konica Minolta Business Technologies, Inc EROAD
manufacturer_web https://www.konicaminolta.com/ https://www.eroad.com/
security_level EAL3 EAL2+, ALC_FLR.1
dgst 49e78f2ac0541c3b 69552df11adc055e
heuristics/cert_id JISEC-CC-CRP-C0312 SERTIT-059
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 0100, 452, 552, 652, 24 -
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0312
  • certification_date: 01.08.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0312_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification and Authentication, and Access Control Function The function to identify and authenticate user, and to control access to highly confidential image data stored in MFP - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Safety transmitting and receiving function of image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese : bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Zentai Seigyo Software English : bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0312_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0312_est.pdf
    • toe_version: A0P00Y0-0100-GM0-24
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.09.2016
  • revalidations: [frozendict({'date': '2012-02', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0312_it1345_01.html'})]
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Zentai Seigyo Software A0P00Y0-0100-GM0-24
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0312_it1345.html
  • toe_overseas_name: bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c / D700 / D701 / D705 / D706 Control Software A0P00Y0-0100-GM0-24
  • category: Other Devices and Systems
  • certification_date: 25.06.2015
  • developer: EROAD
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-059
    • certification_date: 25.06.2015
    • description: EROAD is a fully integrated technology, tolling and services provider. EROAD is the first company in the world to implement a GPS/cellular based road charging platform across an entire country. EROAD's advanced technology provides road charging, compliance and commercial services with the same platform to lower overall client and delivery costs. EROAD's goal is to offer flexible and powerful solutions based on our innovative technology platform to assist in the creation of a transport sector that is responsive to the evolving needs of business, government and the wider community. The core element of EROAD's satellite-based solution is the secure Ehubo unit which reliably and accurately measures distance and location using multiple sensors. Data is transmitted via a secure cellular link to a back office facility that supports a wide range of regulatory and value-added applications, allowing clients to manage their vehicles and assets in the same web browser. The EROAD Depot is the secure web services and payment gateway, where customers manage their tax and compliance obligations, oversee their fleets, and access a wide range of EROAD services. It provides a comprehensive and evolving suite of reports that can be viewed, saved, exported and downloaded. Within the Depot, users are assigned - roles' which give them access to different functions and, depending on their role, allow them to create and filter fleets to focus on critical information.
    • developer: EROAD
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/134947-1607951850/SERTIT/Sertifikater/2015/59/20150626_Sertit-059_C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/134944-1607951845/SERTIT/Sertifikater/2015/59/ST_EROAD_v1.3_FINAL.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134941-1607951842/SERTIT/Sertifikater/2015/59/20150625_SERTIT-059_CR_v10.pdf'})]})
    • evaluation_facility: Advanced Data Security
    • expiration_date: 25.06.2020
    • level: EAL 2, ALC_FLR.1
    • mutual_recognition: CCRA
    • product: TOE versions of EROAD OBU:Hardware version: 03Firmware version: 1.18.05;TOE versions of EROAD Application:Software version: 11-11-2014-0239
    • sponsor: EROAD
  • product: EROAD System
  • url: https://sertit.no/certified-products/product-archive/eroad-system
pdf_data/report_filename c0312_erpt.pdf 20150625_SERTIT-059_CR_v10.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0312-01: 1
    • Certification No. C0312: 1
  • NO:
    • SERTIT-059: 17
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 2: 18
    • EAL 2 augmented: 18
    • EAL 4: 1
    • EAL1: 1
    • EAL2: 1
    • EAL7: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 19
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_ITT_EXP.1: 1
    • FPT_PHP.2: 1
    • FPT_STM.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-B: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-B: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-P: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BRING-OUT-STORA: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRA: 1
    • T.UNEXPECTED-TRANSMISSION: 1
  • A:
    • A.AREA: 1
    • A.MANAGE: 1
  • O:
    • O.ACCESS: 1
    • O.ADMINISTRATION: 1
    • O.AUDIT: 1
    • O.CRYPTOGRAPHY: 1
    • O.CRYPTO_VALIDATED: 1
    • O.ID_AUTH: 1
    • O.INTEGRITY: 1
    • O.PROTECT: 1
    • O.TAMPER_RESISTANCE: 1
  • OE:
    • OE.PERSON: 1
    • OE.PROTECTION: 1
pdf_data/report_keywords/eval_facility
  • ADS:
    • Advanced Data Security: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
    • physical tampering: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 15408: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD that is a medium to: 1
  • OutOfScope:
    • 1 SERTIT-059 CR Issue 1.0 25 June 2015 Page 15 of 16 these underlying environmental components are out of scope insofar as the TOE is concerned. TOE Documentation The supporting guidance documents evaluated in: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20111005174550+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20111013102822+09'00'
  • /Producer: Acrobat Distiller 8.2.0 (Windows)
  • /SourceModified: D:20111005032324
  • /Title: CRP-e
  • pdf_file_size_bytes: 743788
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 40
  • /Author: Arne
  • /CreationDate: D:20150626141410+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20150626141544+02'00'
  • /Producer: Acrobat Distiller 9.5.5 (Windows)
  • /Title: Microsoft Word - 20150625 SERTIT-059 CR v.1.0
  • pdf_file_size_bytes: 561714
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename c0312_est.pdf ST_EROAD_v1.3_FINAL.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL2: 5
    • EAL2 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 6
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 72
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 55
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 71
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 29
    • FIA_ATD.1.1: 1
    • FIA_MSA.3: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 44
    • FIA_SOS.1.1: 5
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 43
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 44
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 48
    • FIA_UID.2.1: 7
    • FIA_USB.1: 26
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 31
    • FMT_MOF.1.1: 3
    • FMT_MSA: 5
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 42
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 119
    • FMT_MTD.1.1: 13
    • FMT_SMF.1: 112
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 171
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 12
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 22
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 20
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 12
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT_EXP.1: 11
    • FPT_ITT_EXP.1.1: 2
    • FPT_PHP.2: 8
    • FPT_PHP.2.1: 1
    • FPT_PHP.2.2: 1
    • FPT_PHP.2.3: 1
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 5
    • A.NETWORK: 6
    • A.SECRET: 3
    • A.SERVICE: 4
    • A.SETTING: 5
  • O:
    • O.AUTH: 2
    • O.AUTH-CAPABILITY: 5
    • O.CONFIG: 12
    • O.CRYPT: 4
    • O.CRYPTO: 4
    • O.CRYPTO-CAPABILITY: 5
    • O.CRYPTO-KEY: 2
    • O.CRYPTO-MAIL: 2
    • O.FAX: 2
    • O.FAX-CONTROL: 6
    • O.GROUP: 3
    • O.GROUP-BOX: 3
    • O.OVERWRITE: 3
    • O.OVERWRITE-ALL: 5
    • O.P: 2
    • O.PRIVATE: 1
    • O.PRIVATE-BOX: 3
    • O.PUBLIC: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED: 3
    • O.REGISTERED-USER: 12
    • O.SECURE: 4
    • O.SECURE-PRINT: 6
    • O.TRUSTED: 3
    • O.TRUSTED-PASS: 5
  • OE:
    • OE.ADMIN: 3
    • OE.FAX: 2
    • OE.FAX-UNIT: 2
    • OE.FEED: 2
    • OE.FEED-BACK: 9
    • OE.NETWORK: 4
    • OE.S: 1
    • OE.SECRET: 3
    • OE.SERVER: 5
    • OE.SERVICE: 3
    • OE.SESSION: 9
    • OE.SETTING: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS: 19
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.BACKUP: 3
    • T.BACKUP-RESTORE: 1
    • T.BRING: 3
    • T.DISCARD: 3
    • T.DISCARD-MFP: 1
    • T.UNEXPECTED: 2
    • T.UNEXPECTED-TRANSMISSION: 1
  • A:
    • A.AREA: 2
    • A.MANAGE: 2
  • O:
    • O.ACCESS: 7
    • O.ADMINISTRATION: 10
    • O.AUDIT: 9
    • O.CRYPTOGRAPHY: 10
    • O.CRYPTO_VALIDATED: 6
    • O.ID_AUTH: 5
    • O.INTEGRITY: 8
    • O.PROTECT: 10
    • O.TAMPER_RESISTANCE: 6
  • OE:
    • OE.PERSON: 9
    • OE.PROTECTION: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
  • TLS:
    • TLS:
      • TLS: 5
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 6
    • physical tampering: 9
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186: 2
    • FIPS 186-2: 4
    • FIPS PUB 197: 2
  • X509:
    • X.509: 1
  • FIPS:
    • FIPS 140-2: 7
    • FIPS 186-4: 1
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 2
    • FIPS PUB 198: 2
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
  • OutOfScope:
    • out of scope: 2
    • private, secure, and not exposed. Therefore, these underlying environmental components are out of scope insofar as the TOE is concerned. Further, EROAD security is stand alone, isolated, self-contained: 1
    • protects and secures the OBU Gateway and communications with it, but that environment is out of scope insofar as the TOE is concerned. ESP Server The ESP server and associated protocol (Ebox to Server: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20111004144740+09'00'
  • /Creator: CubePDF
  • /Keywords:
  • /ModDate: D:20111004144745+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1155878
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 111
  • /Author: Admin
  • /CreationDate: D:20150618214315-07'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20150618214315-07'00'
  • /Producer: GPL Ghostscript 8.64
  • /Title: Microsoft Word - ST EROAD v1.3 - FINAL.docx
  • pdf_file_size_bytes: 1236897
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different