Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco Intrusion Detection System Module (IDSM2) V4.1 (3)
CCEVS-VR-0065-2004
bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c / D407 / D406 / D405 Control Software Version: A0ED0Y0-0100-GM0-24
JISEC-CC-CRP-C0313
name Cisco Intrusion Detection System Module (IDSM2) V4.1 (3) bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c / D407 / D406 / D405 Control Software Version: A0ED0Y0-0100-GM0-24
category Data Protection Other Devices and Systems
scheme US JP
not_valid_after 06.09.2012 01.09.2016
not_valid_before 28.05.2004 31.08.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid9500-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0313_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid9500-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0313_est.pdf
manufacturer Cisco Systems, Inc. Konica Minolta Business Technologies, Inc
manufacturer_web https://www.cisco.com https://www.konicaminolta.com/
security_level EAL2+, ALC_FLR.1 EAL3
dgst 5bc028625adefec4 be83f4c1a7a82110
heuristics/cert_id CCEVS-VR-0065-2004 JISEC-CC-CRP-C0313
heuristics/cert_lab US []
heuristics/extracted_sars ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 4.1 0100, 280, 220, 24, 360
heuristics/scheme_data
  • category: Wireless Monitoring
  • certification_date: 28.05.2004
  • evaluation_facility: Arca CCTL
  • expiration_date:
  • id: CCEVS-VR-VID9500
  • product: Cisco Intrusion Detection System Module (IDSM2) V4.1 (3)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/9500
  • vendor: Cisco Systems, Inc.
  • cert_id: JISEC-CC-CRP-C0313
  • certification_date: 01.08.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0313_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification and Authentication, and Access Control Function The function to identify and authenticate user, and to control access to highly confidential image data stored in MFP - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Safety transmitting and receiving function of image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese : bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c / D407 / D406 / D405 Zentai Seigyo Software English : bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c / D407 / D406 / D405 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0313_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0313_est.pdf
    • toe_version: A0ED0Y0-0100-GM0-24
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.09.2016
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c / D407 / D406 / D405 Zentai Seigyo Software A0ED0Y0-0100-GM0-24
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0313_it1346.html
  • toe_overseas_name: bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c / D407 / D406 / D405 Control Software A0ED0Y0-0100-GM0-24
heuristics/protection_profiles 809ce30fff5c61f3 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_v1.4.pdf {}
pdf_data/report_filename st_vid9500-vr.pdf c0313_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-04-0065
    • cert_item: Cisco Intrusion Detection System Module (IDSM2) Version 4.1(3
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-04-0065: 1
  • JP:
    • CRP-C0313-01: 1
    • Certification No. C0313: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 10
    • EAL 2 augmented: 1
    • EAL 4: 1
    • EAL2: 2
    • EAL2 augmented: 1
  • EAL:
    • EAL3: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
pdf_data/report_keywords/cc_sfr
  • FMT:
    • FMT_MOF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_SEP.1: 1
    • FPT_STM.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-B: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-B: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-P: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BRING-OUT-STORA: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRA: 1
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 68
    • Cisco Systems, Inc: 6
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 5
  • TLS:
    • TLS:
      • TLS: 3
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD that is a medium to: 1
pdf_data/report_metadata
  • /Author: Jandria Alexander
  • /CreationDate: D:20040728124529-04'00'
  • /Creator: Acrobat PDFMaker 5.0 for Word
  • /ModDate: D:20040728124553-03'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Validators Report
  • pdf_file_size_bytes: 362518
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20111005174439+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20111013102647+09'00'
  • /Producer: Acrobat Distiller 8.2.0 (Windows)
  • /SourceModified: D:20111005031040
  • /Title: CRP-e
  • pdf_file_size_bytes: 727239
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 40
pdf_data/st_filename st_vid9500-st.pdf c0313_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 10
    • EAL2 augmented: 6
  • EAL:
    • EAL3: 3
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 12
  • ADO:
    • ADO_DEL.1: 6
    • ADO_IGS.1: 6
  • ADV:
    • ADV_FSP.1: 9
    • ADV_HLD.1: 12
    • ADV_RCR.1: 5
  • AGD:
    • AGD_ADM.1: 13
    • AGD_USR.1: 10
  • ALC:
    • ALC_FLR.1: 15
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 10
    • ATE_IND.2: 8
  • AVA:
    • AVA_SOF.1: 7
    • AVA_VLA.1: 7
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 3
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 11
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_SEL: 1
    • FAU_SEL.1: 10
    • FAU_SEL.1.1: 1
    • FAU_STG: 2
    • FAU_STG.2: 12
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MDT.1: 1
    • FMT_MOF.1: 19
    • FMT_MOF.1.1: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITA: 1
    • FPT_ITA.1: 7
    • FPT_ITA.1.1: 1
    • FPT_ITC: 1
    • FPT_ITC.1: 8
    • FPT_ITC.1.1: 1
    • FPT_ITI: 1
    • FPT_ITI.1: 10
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_RVM: 3
    • FPT_RVM.1: 9
    • FPT_RVM.1.1: 1
    • FPT_SEP: 3
    • FPT_SEP.1: 3
    • FPT_SEP_ENV: 1
    • FPT_SEP_ENV.1: 5
    • FPT_SEP_EXP.1: 11
    • FPT_STM: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 72
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 55
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 71
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 29
    • FIA_ATD.1.1: 1
    • FIA_MSA.3: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 44
    • FIA_SOS.1.1: 5
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 43
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 44
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 48
    • FIA_UID.2.1: 7
    • FIA_USB.1: 26
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 31
    • FMT_MOF.1.1: 3
    • FMT_MSA: 5
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 42
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 119
    • FMT_MTD.1.1: 13
    • FMT_SMF.1: 112
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 171
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ASCOPE: 3
    • A.DYNMIC: 3
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.NOEVIL: 3
    • A.NOTRST: 3
    • A.PROTCT: 3
  • O:
    • O.ACCESS: 11
    • O.AUDITS: 9
    • O.CREDEN: 5
    • O.EADMIN: 6
    • O.EIDAUTH: 3
    • O.EPROTCT: 3
    • O.EXPORT: 4
    • O.IDANLZ: 6
    • O.IDAUTH: 21
    • O.IDSCAN: 8
    • O.IDSENS: 9
    • O.INSTAL: 5
    • O.INTEGR: 7
    • O.INTROP: 5
    • O.OFLOWS: 5
    • O.PERSON: 5
    • O.PHYCAL: 6
    • O.PROTCT: 6
    • O.PTPROTC: 1
    • O.PTPROTCT: 2
    • O.RESPON: 4
    • O.TIME: 4
  • T:
    • T.COMDIS: 3
    • T.COMINT: 3
    • T.ENOHALT: 1
    • T.FACCNT: 3
    • T.FALACT: 3
    • T.FALASC: 3
    • T.FALREC: 3
    • T.IMPCON: 3
    • T.INADVE: 3
    • T.INFLUX: 3
    • T.LOSSOF: 3
    • T.MISACT: 3
    • T.MISUSE: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
    • T.SCNCFG: 3
    • T.SCNMLC: 3
    • T.SCNVUL: 3
    • T.TIME: 3
  • A:
    • A.ADMIN: 5
    • A.NETWORK: 6
    • A.SECRET: 3
    • A.SERVICE: 4
    • A.SETTING: 5
  • O:
    • O.AUTH: 2
    • O.AUTH-CAPABILITY: 5
    • O.CONFIG: 12
    • O.CRYPT: 4
    • O.CRYPTO: 4
    • O.CRYPTO-CAPABILITY: 5
    • O.CRYPTO-KEY: 2
    • O.CRYPTO-MAIL: 2
    • O.FAX: 2
    • O.FAX-CONTROL: 6
    • O.GROUP: 3
    • O.GROUP-BOX: 3
    • O.OVERWRITE: 3
    • O.OVERWRITE-ALL: 5
    • O.PRIVATE: 3
    • O.PRIVATE-BOX: 3
    • O.PUBLIC: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED: 3
    • O.REGISTERED-USER: 12
    • O.SECURE: 4
    • O.SECURE-PRINT: 6
    • O.TRUSTED: 3
    • O.TRUSTED-PASS: 5
  • OE:
    • OE.ADMIN: 3
    • OE.FAX: 2
    • OE.FAX-UNIT: 2
    • OE.FEED: 2
    • OE.FEED-BACK: 9
    • OE.NETWORK: 4
    • OE.S: 1
    • OE.SECRET: 3
    • OE.SERVER: 5
    • OE.SERVICE: 3
    • OE.SESSION: 10
    • OE.SETTING: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS: 19
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.BACKUP: 3
    • T.BACKUP-RESTORE: 1
    • T.BRING: 3
    • T.DISCARD: 3
    • T.DISCARD-MFP: 1
    • T.UNEXPECTED: 2
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 36
    • Cisco Systems, Inc: 104
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 14
  • TLS:
    • TLS:
      • TLS: 9
      • TLS v1.0: 1
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/standard_id
  • ISO:
    • ISO/IEC 15408:1999: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186: 2
    • FIPS 186-2: 4
    • FIPS PUB 197: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • of MFP or through the network. The TOE supports the protection against the exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
pdf_data/st_metadata
  • /Author: Preferred Customer
  • /CreationDate: D:20040728125110-04'00'
  • /Creator: Acrobat PDFMaker 5.0 for Word
  • /ModDate: D:20040728125513-03'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Cisco Systems, Inc
  • pdf_file_size_bytes: 1702503
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 84
  • /Author:
  • /CreationDate: D:20111004145524+09'00'
  • /Creator: CubePDF
  • /Keywords:
  • /ModDate: D:20111004145528+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1156360
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 112
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different