name |
Keyper Hardware Security Module (HSM) v2.0:a) Enterprise (Hardware: 9720, Software: 011126)b) Professional (Hardware: 9720, Software: 010405) |
Data Security Kit (E) Software Type II V1.00E |
category |
Key Management Systems |
Other Devices and Systems |
scheme |
MY |
JP |
status |
archived |
archived |
not_valid_after |
04.01.2018 |
01.10.2015 |
not_valid_before |
04.01.2013 |
28.09.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr-ISCB-5-RPT-C037-v1a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0269_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-AEP_Keyper_EAL4_ASE_1_3.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0269_est.pdf |
manufacturer |
AEP Networks Ltd. |
KYOCERA MITA Corporation |
manufacturer_web |
https://www.aepnetworks.com/ |
https://www.kyoceramita.com/ |
security_level |
EAL4+, AVA_VAN.5 |
EAL3 |
dgst |
5f49aadb6b4baf28 |
50f5a711b2731f99 |
heuristics/cert_id |
ISCB-5-RPT-C037-CR-v1a |
JISEC-CC-CRP-C0269 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_DPT.1, ATE_COV.2, AGD_OPE.1, ALC_DEL.1, ASE_INT.1, ADV_TDS.3, ALC_DVS.1, ADV_ARC.1, ALC_CMS.4, AVA_VAN.5, ASE_ECD.1, ALC_LCD.1, ASE_REQ.2, ADV_IMP.1, ADV_FSP.4, ASE_OBJ.2, ATE_IND.2, ATE_FUN.1, ALC_CMC.4, ALC_TAT.1, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1 |
ATE_DPT.1, ATE_COV.2, AGD_OPE.1, ALC_DEL.1, ASE_INT.1, AVA_VAN.2, ALC_DVS.1, ADV_ARC.1, ASE_ECD.1, ALC_LCD.1, ASE_REQ.2, ASE_OBJ.2, ATE_IND.2, ATE_FUN.1, ALC_CMS.3, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ADV_TDS.2, ADV_FSP.3, ASE_CCL.1, ALC_CMC.3 |
heuristics/extracted_versions |
2.0 |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0269
- certification_date: 01.09.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0269_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 520i - TASKalfa 420i - TASKalfa 520iG - TASKalfa 420iG - CS 520i - CS 420i - CD 1252/DC 2252 - CD 1242/DC 2242 This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Data Security Kit (E) Software Type II
- product_type: Data protection function in digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0269_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0269_est.pdf
- toe_version: V1.00E
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.10.2015
- supplier: KYOCERA MITA Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0269_it9266.html
- toe_overseas_name: Data Security Kit (E) Software Type II V1.00E
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
cr-ISCB-5-RPT-C037-v1a.pdf |
c0269_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C037-CR-v1a: 30
|
- JP:
- CRP-C0269-01: 1
- Certification No. C0269: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 1
- FCS_COP: 3
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACF: 7
- FDP_RIP.1: 1
- FDP_SDI.2: 1
- FIA:
- FIA_SOS.1: 1
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD: 2
- FMT_SMF.1: 1
- FMT_SMF.1.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITC.1: 1
- FPT_ITI.1: 1
- FPT_PHP.2: 1
- FPT_PHP.3: 1
- FPT_RCV.1: 1
- FPT_STM.1: 1
- FPT_TST.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CE: 1
- A.LOCATION: 1
- A.NETWORK: 2
- T:
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 140-2: 2
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
- PKCS:
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: ISCB Department
- /Category: PUBLIC
- /Caveat: FINAL
- /Classification: PUBLIC
- /Company: CyberSecurity Malaysia
- /CreationDate: D:20130109091227+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Developer: AEP Networks
- /Document Type: REPORT
- /Identifier: ISCB-5-RPT-C037-CR-v1a
- /Index: MyCB_TMP_011
- /Keywords: Keyper
- /ModDate: D:20130109091238+08'00'
- /Phase: Release
- /Producer: Adobe PDF Library 10.0
- /Project Code: C037
- /Released: 4 January 2013
- /ST Title: Security Target for the Keyper Hardware Security Module (HSM) v2.0
- /ST Version: v1.3
- /SourceModified: D:20130109011207
- /Sponsor: AEP Networks
- /Subject: Keyper Hardware Security Module (HSM) v2.0
- /TOE Name: Keyper Hardware Security Module (HSM) v2.0
- /TOE Version: version 2.0
- /Title: C037 Certification Report
- /Version: v1a
- pdf_file_size_bytes: 442113
- pdf_hyperlinks: http://www.cybersecurity.my/mycc, mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 30
|
- /CreationDate: D:20101215173644+09'00'
- /ModDate: D:20101215173644+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 188436
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
pdf_data/st_filename |
st-AEP_Keyper_EAL4_ASE_1_3.pdf |
c0269_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 3
- ASE_CCL.1: 1
- ASE_ECD: 3
- ASE_ECD.1: 1
- ASE_INT: 3
- ASE_INT.1: 1
- ASE_OBJ: 3
- ASE_OBJ.2: 1
- ASE_REQ: 8
- ASE_REQ.2: 1
- ASE_SPD: 3
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FCS:
- FCS_CKM.1: 24
- FCS_CKM.1.1: 1
- FCS_CKM.2: 20
- FCS_CKM.2.1: 1
- FCS_CKM.4: 24
- FCS_CKM.4.1: 1
- FCS_COP: 37
- FCS_COP.1: 4
- FCS_RND: 2
- FCS_RND.1: 15
- FCS_RND.1.1: 2
- FCS_RND.1.2: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 6
- FDP_ACF: 22
- FDP_ACF.1: 4
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 17
- FDP_IFC.1: 6
- FDP_IFF: 21
- FDP_IFF.1: 3
- FDP_IFF.3: 2
- FDP_IFF.4: 2
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MSA.3: 3
- FMT_MTD: 20
- FMT_MTD.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITC: 1
- FPT_ITC.1: 7
- FPT_ITC.1.1: 1
- FPT_ITI.1: 9
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_PHP.1: 1
- FPT_PHP.2: 13
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_RCV.1: 8
- FPT_RCV.1.1: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST.1: 21
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CE: 4
- A.LOCATION: 5
- A.NETWORK: 5
- O:
- OE:
- OE.CE: 3
- OE.LOCATION: 3
- OE.NETWORK: 3
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- malfunction: 3
- physical tampering: 7
- SCA:
- Side-channel: 5
- Side-channels: 2
- side channel: 1
- side-channel: 3
- side-channels: 4
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS 140-2: 2
- FIPS PUB 140-2: 2
- FIPS PUB 186-2: 5
- NIST:
- PKCS:
- RFC:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Doug Stuart
- /Category: ASE
- /Company: stratsec
- /CreationDate: D:20121218144137+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /DEV_Fullname: AEP Networks
- /DEV_Shortname: AEP
- /DEV_Sponsor: David Miller
- /DOC_Classification: COMMERCIAL-IN-CONFIDENCE
- /DOC_Id: KPR_EAL4_ASE
- /DOC_Phase: DRAFT
- /DOC_Released: 13-DEC-2012
- /DOC_Title: Keyper HSM EAL4 Security Target
- /DOC_Version: 1.3
- /EVAL_CC: 3.1 (Rev 3)
- /EVAL_EAL: EAL4
- /ModDate: D:20121218144151+08'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20121213065300
- /Subject: Security Target
- /TOE_Fullname: Keyper Hardware Security Module Version 2.0
- /TOE_Shortname: Keyper HSM
- /TOE_Version: 2.0
- /Title: Keyper Hardware Security Module (HSM) v2.0
- pdf_file_size_bytes: 737530
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 77
|
- /Author: KYOCERA MITA Corporation
- /CreationDate: D:20101129104543+09'00'
- /Creator: CubePDF
- /ModDate: D:20101129104543+09'00'
- /Producer: CubePDF
- /Title: Data Security Kit (E) Software Type II Overseas Security Target
- pdf_file_size_bytes: 326562
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |