name |
bizhub PRO 1050P zentai seigyo software Overseas: bizhub PRO 1050P control software |
Check Point IPSO 4.2 Build 051c05 (formerly Nokia) with Check Point VPN-1 Power/UTM NGX R65 HFA 30 running on the following platforms: IP150, IP260, IP290, IP390, IP560, IP1220, IP1260, IP1280 and IP2450 |
category |
Other Devices and Systems |
Boundary Protection Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
20.07.2012 |
not_valid_before |
21.02.2005 |
25.03.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0021_it4030_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10137-vr.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10137-st.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Nokia Corporation |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.nokia.com/ |
security_level |
EAL3 |
EAL4+, ALC_FLR.3 |
dgst |
6cf4c2cf7687f4e8 |
07737ae3202e927a |
heuristics/cert_id |
JISEC-CC-CRP-C0021 |
CCEVS-VR-VID-10137-2009 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_RCR.1, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ALC_FLR.3, ATE_FUN.1, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
heuristics/extracted_versions |
- |
4.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0282
- certification_date: 01.02.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0282_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is the software which is installed in a digital Multi Function Peripheral (hereinafter referred to as "mfp") consisting of a copier, printer, scanner, and fax function, and controls the overall operation of the mfp. TOE security functionality This TOE offers a security function against disclosure of highly-confidential information stored in an mfp. In compliance with all sorts of overwritting standards, this TOE also offers an overwritting function to completely erase data on recording media such as HDD. This function is used when discarding an mfp or returning a leased one in order to prevent information leakage of an organization using the mfp.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Japanese : bizhub C35 Zentai Seigyo Software English : bizhub C35 Control Software
- product_type: Control Software for digital mfp
- toe_version: A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.03.2016
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C35 Zentai Seigyo Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0282_it0301.html
- toe_overseas_name: bizhub C35 Control Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
3af2791847aec55b |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_v1.6.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0021_it4030_ecvr.pdf |
st_vid10137-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10137-2009
- cert_item: Nokia, Inc. Nokia Firewall/VPN Appliances with Check Point VPN-1 R65 with HFA 30
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0021: 1
|
- US:
- CCEVS-VR-VID10137-2009: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 9
- EAL4: 5
- EAL4 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FDP:
- FDP_UCT.1.1: 1
- FDP_UIT.1: 1
- FIA:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.DIRECT: 1
- A.GENPUR: 1
- A.MODEXP: 1
- A.NOEVIL: 1
- A.NOREMO: 1
- A.PHYSEC: 1
- A.PUBLIC: 1
- A.REMACC: 1
- A.SINGEN: 1
- O:
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20050222184150+09'00'
- /ModDate: D:20050222184150+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 16296
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: Daniel P. Faigin
- /CreationDate: D:20090406140619
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20090406140619
- /Producer: Microsoft® Office Word 2007
- /Title: Validators Report
- pdf_file_size_bytes: 503065
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
|
st_vid10137-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL 3: 1
- EAL 4: 28
- EAL 5: 1
- EAL 9: 1
- EAL2: 2
- EAL4: 1
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_AUT.1: 3
- ACM_CAP.3: 1
- ACM_CAP.4: 4
- ACM_SCP.2: 3
- ADO:
- ADO_DEL.2: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 8
- ADV_FSP.2: 8
- ADV_HLD.1: 2
- ADV_HLD.2: 8
- ADV_IMP.1: 9
- ADV_LLD.1: 7
- ADV_RCR.1: 10
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 10
- AGD_USR.1: 8
- ALC:
- ALC_DVS.1: 4
- ALC_FLR.3: 9
- ALC_LCD.1: 2
- ALC_TAT.1: 6
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 9
- ATE_IND.2: 2
- AVA:
- AVA_MSU.2: 3
- AVA_SOF.1: 2
- AVA_VLA: 1
- AVA_VLA.2: 2
- AVA_VLA.3: 8
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 26
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 10
- FAU_GEN.2.1: 1
- FAU_SAA.3: 12
- FAU_SAA.3.1: 1
- FAU_SAA.3.2: 1
- FAU_SAA.3.3: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_SEL.1: 10
- FAU_SEL.1.1: 1
- FAU_STG.1: 4
- FAU_STG.2: 15
- FAU_STG.2.1: 1
- FAU_STG.2.2: 2
- FAU_STG.2.3: 1
- FAU_STG.3: 9
- FAU_STG.3.1: 1
- FAU_STG.4: 14
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.2: 27
- FCS_CKM.2.1: 3
- FCS_CKM.4: 4
- FCS_COP.1: 87
- FCS_COP.1.1: 8
- FCS_ITC.1: 4
- FDP:
- FDP_ACC.1: 3
- FDP_IFC.1: 43
- FDP_IFC.1.1: 3
- FDP_IFF.1: 47
- FDP_IFF.1.1: 5
- FDP_IFF.1.2: 4
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.6: 3
- FDP_RIP.1: 4
- FDP_RIP.2: 10
- FDP_RIP.2.1: 1
- FDP_UCT.1: 17
- FDP_UCT.1.1: 2
- FDP_UIT.1: 16
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 2
- FIA:
- FIA_AFL.1: 6
- FIA_ATD.1: 12
- FIA_ATD.1.1: 2
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 42
- FIA_UAU.5.1: 4
- FIA_UAU.5.2: 3
- FIA_UID.1: 5
- FIA_UID.2: 17
- FIA_UID.2.1: 1
- FIA_USB.1: 14
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 53
- FMT_MOF.1.1: 5
- FMT_MSA.1: 58
- FMT_MSA.1.1: 7
- FMT_MSA.2: 4
- FMT_MSA.3: 18
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 1
- FMT_MTD.1: 39
- FMT_MTD.1.1: 4
- FMT_MTD.2: 3
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 13
- FPT_AMT.1.1: 2
- FPT_ITA.1: 1
- FPT_ITC.1: 1
- FPT_ITI.1: 1
- FPT_ITT.1: 10
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 3
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 19
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 2
- FTP_TRP.1: 14
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ACCESS: 1
- A.DIRECT: 2
- A.GENPUR: 2
- A.MODEXP: 1
- A.NOEVIL: 2
- A.NOREMO: 1
- A.PHYSEC: 2
- A.PUBLIC: 1
- A.REMACC: 2
- A.SINGEN: 1
- O:
- O.ACCESS: 3
- O.ACCESS-: 1
- O.ACCOUN: 4
- O.AUDITS: 4
- O.AUDREC: 10
- O.CREDEN: 1
- O.EADMIN: 5
- O.EAL: 10
- O.ENCRYP: 7
- O.EXPORT: 3
- O.GENPUR: 1
- O.IDANLZ: 11
- O.IDAUTH: 17
- O.IDSCAN: 2
- O.IDSENS: 8
- O.INSTAL: 2
- O.INTEGR: 4
- O.INTROP: 2
- O.LIMEXT: 3
- O.MEDIAT: 8
- O.MEDIATE: 1
- O.NOREMO: 1
- O.OFLOWS: 7
- O.PERSON: 2
- O.PHYCAL: 2
- O.PROTCT: 3
- O.RESPON: 8
- O.SECFUN: 13
- O.SECSTA: 4
- O.SELPRO: 6
- O.SINUSE: 3
- O.VPN: 8
- OE:
- T:
- T.ASPOOF: 1
- T.AUDACC: 1
- T.AUDFUL: 1
- T.INADVE: 2
- T.MEDIAT: 4
- T.MISACT: 3
- T.MISUSE: 4
- T.MODEXP: 2
- T.NACCESS: 2
- T.NMODIFY: 2
- T.NOAUTH: 5
- T.OLDINF: 1
- T.PROCOM: 2
- T.REPEAT: 1
- T.REPLAY: 2
- T.SELPRO: 2
- T.TUSAGE: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 28
- TLS v1.0: 1
- TLSv1.0: 7
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCIMB-2004-01-001: 2
- CCIMB-2004-01-003: 1
- FIPS:
- FIPS 140-1: 1
- FIPS 140-2: 13
- FIPS 180-2: 1
- FIPS 46-3: 1
- FIPS PUB 140-1: 3
- FIPS PUB 140-2: 5
- FIPS PUB 180-2: 1
- FIPS PUB 197: 3
- FIPS PUB 198: 3
- FIPS PUB 46-3: 8
- FIPS140: 1
- FIPS197: 1
- FIPS198: 1
- FIPS46-3: 1
- PKCS:
- PKCS #1: 1
- PKCS#1: 4
- PKCS#12: 1
- RFC:
- RFC 0854: 1
- RFC 0959: 1
- RFC 1777: 2
- RFC 1778: 1
- RFC 2104: 3
- RFC 2138: 1
- RFC 2246: 3
- RFC 2401: 1
- RFC 2404: 3
- RFC 2406: 3
- RFC 2409: 5
- RFC 2616: 1
- RFC 2818: 1
- RFC 2821: 1
- RFC 2865: 1
- RFC 3947: 1
- RFC 3948: 1
- RFC 792: 1
- RFC0854: 1
- RFC0959: 2
- RFC1777: 1
- RFC1778: 1
- RFC2104: 1
- RFC2138: 1
- RFC2246: 3
- RFC2401: 2
- RFC2404: 1
- RFC2406: 1
- RFC2409: 1
- RFC2616: 1
- RFC2818: 1
- RFC2821: 2
- RFC2865: 1
- RFC3947: 1
- RFC3948: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Nir Naaman
- /Build: 051c05
- /Company: Nokia Inc.
- /CreationDate: D:20090304213809+02'00'
- /Creator: Acrobat PDFMaker 7.0.5 for Word
- /Keywords: Information flow control, firewall, proxy server, traffic filter, VPN, TLS, IPSec, IDS/IPS, intrusion detection, Medium Robustness Environments
- /Manager: Jeffrey Ward
- /ModDate: D:20090304213918+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Revision: 1.0
- /SC_HFA: 01
- /Software: Nokia IPSO 4.2
- /Subject: Security Target
- /TOE: Nokia Firewall/VPN Appliances
- /Take: 224
- /Title: Nokia Firewall/VPN Appliances with Check Point VPN-1 NGX R65
- /cp_HFA: HFA 30
- /cp_HFA_Take: 124
- /cp_Take: 224
- /cp_os: Check Point SecurePlatform
- /cp_software: Check Point VPN-1 Power/UTM
- /cp_version: NGX R65
- /documentDate: 3/4/2008
- /longDate: March 4, 2009
- pdf_file_size_bytes: 1431821
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 164
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |