name |
ECOSYS M3860idnf, ECOSYS M3860idnfG(KYOCERA), P-6038ifMFP(TA Triumph-Adler/UTAX), with HDD |
bizhub C353P / ineo+ 353P Control Software version A02E0Y0-100_GM012 |
category |
Multi-Function Devices |
Other Devices and Systems |
scheme |
SE |
JP |
status |
active |
archived |
not_valid_after |
26.05.2025 |
07.10.2013 |
not_valid_before |
26.05.2020 |
26.03.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kyocera%20ECOSYS%20with%20HDD%20-%20Certifikat%20CCRA_signerat.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kyocera%20ECOSYS%20with%20HDD%20-%20Certification%20Report.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kyocera%20ECOSYS%20with%20HDD%20-%20ST%20v.%20104.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_est.pdf |
manufacturer |
KYOCERA Document Solutions Inc. |
Konica Minolta Business Technologies, Inc |
manufacturer_web |
https://www.kyoceradocumentsolutions.com/ |
https://www.konicaminolta.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL3 |
dgst |
52f7856d28ac37d9 |
b41c1858c9432c46 |
heuristics/cert_id |
CSEC2019007 |
JISEC-CC-CRP-C0148 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0148
- certification_date: 01.03.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0148_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. network printer (bizhub C353P / ineo+ 353P). This product offers the protection from exposure of the highly confidential document stored in the printer, and aims at protecting the data which may be exposed against a user's intention. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions. - All area overwrite deletion function - HDD encryption key generation function - HDD verification function - Public box authentication function - Secure print authentication function - Trusted channel function - Administrator identification and authentication functions - Service engineer identification and authentication functions
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: Japanese name:bizhub C353P / ineo+ 353P Control Software English name:bizhub C353P / ineo+ 353P Control Software
- product_type: IT Product (Data protection function in printer systems)
- report_link: https://www.ipa.go.jp/en/security/c0148_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0148_est.pdf
- toe_version: A02E0Y0-0100-GM0-12
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.10.2013
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0148_it7166.html
- toe_overseas_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
Kyocera ECOSYS with HDD - Certifikat CCRA_signerat.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20200528153116+02'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20200528154528+02'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 718478
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
Kyocera ECOSYS with HDD - Certification Report.pdf |
c0148_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0148-01: 1
- Certification No. C0148: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.DADMIN_TRUST: 1
- A.NETWORK: 1
- A.USER_EDUCATION: 1
- T:
- T.IMAGE_DATA: 1
- T.NETWORK: 1
- T.SETTING_DATA: 1
|
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-NET-SETTING: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 1
- T.BACKUP-RESTORE: 1
- T.BRING-OUT-STORAGE: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Hereinafter referred to as”printer”). This TOE offers the protection from exposure of the highly confidential document CRP-C0148-01 2 stored in the printer. Moreover, TOE can encrypt the image data written in HDD for: 1
|
pdf_data/report_metadata |
- /Author: Ulf Noring
- /CreationDate: D:20200601165831+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20200601165831+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 19FMV3559-50:1
- /Title: Certification Report - KYOCERA ECOSYS M3860idnf, ECOSYS M3860idnfG, TA Tri-umph-Adler/UTAX P-6038if MFP, with HDD
- pdf_file_size_bytes: 474806
- pdf_hyperlinks: http://www.nmap.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /CreationDate: D:20080617154414+09'00'
- /ModDate: D:20080617154414+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 218797
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
Kyocera ECOSYS with HDD - ST v. 104.pdf |
c0148_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 7
- EAL2 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 28
- FCS_CKM.1.1: 3
- FCS_CKM.2: 3
- FCS_CKM.4: 13
- FCS_COP.1: 27
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 18
- FMT_MSA.1.1: 2
- FMT_MSA.3: 18
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 14
- FMT_MTD.1.1: 2
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 6
- FCS_COP.1: 8
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 41
- FDP_ACC.1.1: 3
- FDP_ACF.1: 47
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ITC.1: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 65
- FIA_AFL.1.1: 7
- FIA_AFL.1.2: 7
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_NEW.1: 14
- FIA_NEW.1.1: 1
- FIA_NEW.1.2: 1
- FIA_SOS: 1
- FIA_SOS.1: 58
- FIA_SOS.1.1: 6
- FIA_SOS.2: 11
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 22
- FIA_UAU.2: 76
- FIA_UAU.2.1: 5
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UAU.7: 15
- FIA_UAU.7.1: 2
- FIA_UID: 3
- FIA_UID.1: 21
- FIA_UID.2: 34
- FIA_UID.2.1: 4
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_CKM.1: 1
- FMT_MOF.1: 136
- FMT_MOF.1.1: 4
- FMT_MSA: 5
- FMT_MSA.1: 3
- FMT_MSA.2: 4
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD.1: 86
- FMT_MTD.1.1: 6
- FMT_SMF.1: 31
- FMT_SMF.1.1: 1
- FMT_SMR.1: 73
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 3
- FPT:
- FPT_ITC.1: 2
- FPT_RVM.1: 17
- FPT_RVM.1.1: 1
- FPT_SEP.1: 13
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 5
- A.DADMIN_TRUST: 4
- A.NETWORK: 3
- A.NETWROK: 1
- A.USER_EDUCATION: 5
- O:
- O.ACCESS_CONTROL: 6
- O.DOC_OVERWRITE: 4
- O.FAX_CONTROL: 5
- O.HDD_ENCRYPTION: 7
- O.NETWORK_ENCRYPTION: 7
- O.SETTING_DATA: 7
- OE:
- OE.ACCESS: 4
- OE.DADMIN_TRUST: 3
- OE.NETWORK_PROTECTION: 3
- OE.USER_EDUCATION: 3
- T:
- T.IMAGE_DATA: 3
- T.NETWORK: 4
- T.SETTING_DATA: 4
|
- A:
- A.ADMIN: 3
- A.NETWORK: 3
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.CHECK-HDD: 4
- O.CONFIG: 13
- O.CRYPT-KEY: 6
- O.OVERWRITE-ALL: 4
- O.PUBLIC-BOX: 7
- O.SECURE-PRINT: 5
- O.TRUSTED-PASS: 5
- OE:
- OE.CRYPT: 5
- OE.CRYPTO: 1
- OE.FEED-BACK: 11
- OE.LOCK-HDD: 4
- OE.SESSION: 1
- T:
- T.ACCESS-NET-SETTING: 3
- T.ACCESS-PUBLIC-BOX: 3
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-PRINTER: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 1
- DHE: 2
- Diffie-Hellman: 4
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 3
- SHA-512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- TLS:
- SSL:
- SSL: 1
- SSLv1.0: 1
- SSLv2.0: 1
- SSLv3.0: 1
- TLS:
- TLS: 17
- TLS 1.2: 1
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 2
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 2
- FIPS 197: 4
- FIPS 46-3: 1
- FIPS PUB 180-4: 3
- FIPS PUB 197: 3
- NIST:
- SP 800-135: 3
- SP 800-67: 1
- PKCS:
- RFC:
- RFC 2104: 2
- RFC 2409: 2
- RFC 5114: 1
- RFC2409: 2
- RFC5246: 11
- RFC5288: 4
- RFC5289: 4
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 180-1: 2
- FIPS PUB 197: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- in case forwarding to the internal network fails, the TOE would prints the data. In this case it is out of scope of forwarding to the internal network and the security objective is fulfilled. FMT_MSA.1 (b: 1
- out of scope: 1
|
- ConfidentialDocument:
- functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the printer. Moreover, TOE can encrypt the image data written in HDD for the danger of: 1
|
pdf_data/st_metadata |
|
- /Author:
- /Company:
- /CreationDate: D:20080602193009+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20080602193041+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - 【C0148】bizhub353P_英文ST-106-080118_080530.doc
- pdf_file_size_bytes: 641424
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 97
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |