Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub 958/bizhub PRO 958/bizhub 808/bizhub 758/ineo 958/ineo 758 G00-14
JISEC-CC-CRP-C0515
EnterpriseDB Postgres Plus Advanced Server 8.4
CCEVS-VR-VID-10412-2011
name bizhub 958/bizhub PRO 958/bizhub 808/bizhub 758/ineo 958/ineo 758 G00-14 EnterpriseDB Postgres Plus Advanced Server 8.4
category Multi-Function Devices Databases
scheme JP US
not_valid_after 29.06.2021 01.11.2014
not_valid_before 29.06.2016 29.07.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0515_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10412-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0515_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10412-st.pdf
manufacturer KONICA MINOLTA, INC. EnterpriseDB Corporation
manufacturer_web https://www.konicaminolta.com/index.html https://www.enterprisedb.com/
dgst 6147b68ac576bf82 711c094f140cc311
heuristics/cert_id JISEC-CC-CRP-C0515 CCEVS-VR-VID-10412-2011
heuristics/cert_lab [] US
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_808:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_758:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_958:-:*:*:*:*:*:*:* {}
heuristics/extracted_versions 758, 958, 14, 808 8.4
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0515
  • certification_date: 01.06.2016
  • claim: EAL2+ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0515_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is an MFP (Multi-Function Printer) that offers Copy, Scan, Print, Fax, and Document storage and retrieval functions. The TOE provides security functions that conform to U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std 2600.2™-2009) which is the MFP security requirement specification, to prevent unauthorized disclosure and alteration of user’s document data. TOE Security functions The TOE provides the following security functions. - Identification and authentication Function to identify and authenticate users. - User restriction control function Function to restrict available functions of users and to control the access to document data other than accumulated documents only to the authorized users. - Accumulated documents access control function Function to control the access to accumulated documents only to the authorized users. - HDD encryption function Function to encrypt the data that is stored in HDD. - Residual information deletion function Function to overwrite and delete the data stored in HDD, so that they cannot be reused. - Audit log function Function to record audit log related to security functions. - Network communication protection function Function to encrypt communication data on the LAN. - Self-test function Function to verify the integrity of executable codes of HDD encryption function and security functions. - Security management function Function to control the management of security functions only to the authorized users. - External interface separation function Function to prevent unauthorized transfer to LAN from external interface like public phone etc.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: bizhub 958/bizhub PRO 958/bizhub 808/bizhub 758/ineo 958/ineo 758
    • product_type: Multi-Function Printer
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0515_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0515_est.pdf
    • toe_version: G00-14
    • vendor: KONICA MINOLTA, INC.
  • expiration_date: 01.07.2021
  • revalidations: [frozendict({'date': '2017-11', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0515_it5586_01.html'})]
  • supplier: KONICA MINOLTA,INC.
  • toe_japan_name: bizhub 958/bizhub PRO 958/bizhub 808/bizhub 758/ineo 958/ineo 758G00-14
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0515_it5586.html
  • toe_overseas_name: bizhub 958/bizhub PRO 958/bizhub 808/bizhub 758/ineo 958/ineo 758/Sindoh N911/Sindoh N910/Sindoh MF9141/Sindoh MF7121G00-14
  • category: DBMS
  • certification_date: 29.07.2011
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10412
  • product: EnterpriseDB Postgres Plus Advanced Server 8.4
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10412
  • vendor: EnterpriseDB Corporation
heuristics/protection_profiles 43ce79b420f23a00 110f0820b080edc2
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_DBMS_BR_V1.2.pdf
pdf_data/report_filename c0515_erpt.pdf st_vid10412-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10412-2011
    • cert_item: Postgres Plus Advanced Server v8.4
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0515-01: 1
    • Certification No. C0515: 1
  • US:
    • CCEVS-VR-VID10412-2011: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 2
    • EAL2: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ALC:
    • ALC_FLR.2: 3
  • ATE:
    • ATE_FUN.1: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FMT:
    • FMT_REV.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
  • A:
    • A.NO_EVIL: 1
    • A.NO_GENERAL_PURPOSE: 1
    • A.OS_PP_VALIDATED: 1
    • A.PHYSICAL: 1
  • T:
    • T.DENIAL_OF_SERVICE: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNIDENTIFIED_ACTIONS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 5
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 1
  • TLS:
    • SSL:
      • SSL: 5
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2007-09-003: 2
  • RFC:
    • RFC 1321: 2
    • RFC 1413: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • TOE within its Operational Environment. 5.2. Clarification of Scope Configuration Options that are Out of Scope: “Trust” authentication option (not in TOE) When the trust authentication option is specified: 1
pdf_data/report_metadata
  • /CreationDate: D:20160712093056+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160712093348+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 425288
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
pdf_data/st_filename c0515_est.pdf st_vid10412-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 1
  • EAL:
    • EAL2: 3
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • APE:
    • APE_ECD: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.1: 2
    • ADV_FSP.2: 6
    • ADV_TDS.1: 7
  • AGD:
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 8
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 4
    • ALC_DEL.1: 4
    • ALC_FLR.2: 9
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 6
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.2: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 2
    • FAU_STG.4: 13
    • FAU_STG.4.1: 2
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 18
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 20
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 10
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 12
    • FAU_GEN.1: 4
    • FAU_GEN.2: 1
    • FAU_SEL: 10
    • FAU_SEL.1: 2
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF: 7
    • FDP_ACF.1: 5
    • FDP_ITC: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 14
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 1
    • FIA_UID_EXT: 2
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 3
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 19
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITA.1: 2
    • FPT_ITT.1: 2
    • FPT_OVR_EXT.1: 1
    • FPT_STM.1: 2
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 8
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 2
  • FTP:
    • FTP_ITC: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 7
    • D.DOC: 37
    • D.FUNC: 21
    • D.PROT: 8
  • O:
    • O.AUDIT: 6
    • O.CONF: 12
    • O.DOC: 13
    • O.FUNC: 6
    • O.HDD: 9
    • O.INTERFACE: 6
    • O.PROT: 6
    • O.SOFTWARE: 6
    • O.USER: 11
    • O.USER_AUTHORIZED: 1
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_: 1
    • A.NO_GENERAL_PURPOSE: 2
    • A.OS_PP_VALIDA: 1
    • A.OS_PP_VALIDATED: 2
    • A.PHYSICAL: 3
  • O:
    • O.ACCESS_: 2
    • O.ACCESS_HISTORY: 4
    • O.ADMIN_: 3
    • O.ADMIN_GUIDANCE: 11
    • O.ADMIN_ROLE: 3
    • O.AUDIT_: 4
    • O.AUDIT_GENERATION: 4
    • O.AUTH: 8
    • O.AVAIL: 7
    • O.CONFIGURATION_IDEN: 1
    • O.CONFIGURATION_IDENTIFICATI: 4
    • O.CONFIGURATION_IDENTIFICATION: 4
    • O.DOCUMENTED_DESIGN: 9
    • O.INTERNAL_: 2
    • O.INTERNAL_TOE_DOMAINS: 4
    • O.MANAGE: 15
    • O.MEDIATE: 8
    • O.PARTIAL_: 5
    • O.PARTIAL_FUNCTIONAL_TEST: 6
    • O.PARTIAL_SELF_PROTECTION: 6
    • O.PROTCOMM: 7
    • O.RESIDUAL_INFORMATIO: 1
    • O.RESIDUAL_INFORMATION: 7
    • O.TOE_ACCESS: 10
    • O.VULNERABILITY_ANALY: 1
    • O.VULNERABILITY_ANALYSIS: 9
  • OE:
    • OE.AUTH: 7
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.OS_PP_VALIDATED: 5
    • OE.PHYSICAL: 4
    • OE.PROTCOMM: 8
  • T:
    • T.ACCIDENTAL_ADMIN_ERR: 1
    • T.DENIAL_OF_SERVICE: 5
    • T.MASQUERADE: 3
    • T.POOR_DESIGN: 5
    • T.POOR_IMPLEMENTATION: 3
    • T.POOR_TEST: 3
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 7
    • T.UNAUTHORIZED_ACCESS: 4
    • T.UNIDENTIFIED_ACTIONS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 4
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 11
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • SSL:
      • SSL: 40
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1321: 4
    • RFC 1413: 2
    • RFC 1964: 1
    • RFC 2743: 1
    • RFC 4510: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • PostGIS Spatial Extensions EDB*Plus Slony Replication PG Agent Update Monitor 1.4.7.2 Out of Scope The following components of the PPAS 8.4 product are not included in the TOE: Infinite Cache: 1
    • Bouncer Procedural Language Debugger StackBuilder Plus 1.4.7.3 Configuration Options that are Out of Scope. 1.4.7.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is: 1
    • Out of Scope: 2
    • out of scope: 1
    • platforms are included in the TOE. In addition, the following components in the IT environment are out of scope. Postgres Plus Advanced Server v8.4 Security Target 15 Authenticator servers, if configured : 1
pdf_data/st_metadata
  • /Author: e08884
  • /CreationDate: D:20160707134105+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20160707134105+09'00'
  • /Producer: Acrobat Distiller 15.0 (Windows)
  • /Title: Microsoft Word - 【C0515】英文_ASE_MinervaSBK-2.00-160622.docx
  • pdf_file_size_bytes: 547422
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 79
  • /CreationDate: D:20110812120756
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110812120756
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1153309
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 94
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different