name |
bizhub PRO 1050P zentai seigyo software Overseas: bizhub PRO 1050P control software |
Juniper Networks IDP 4.0 & NSM 2006.1 |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
06.09.2012 |
not_valid_before |
21.02.2005 |
23.10.2006 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0021_it4030_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10045-vr.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10045-st.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Juniper Networks, Inc. |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.juniper.net/ |
security_level |
EAL3 |
EAL2 |
dgst |
6cf4c2cf7687f4e8 |
269fe84a0f9bf6f4 |
heuristics/cert_id |
JISEC-CC-CRP-C0021 |
CCEVS-VR-0043-2006 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
heuristics/extracted_versions |
- |
2006.1, 4.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0282
- certification_date: 01.02.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0282_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is the software which is installed in a digital Multi Function Peripheral (hereinafter referred to as "mfp") consisting of a copier, printer, scanner, and fax function, and controls the overall operation of the mfp. TOE security functionality This TOE offers a security function against disclosure of highly-confidential information stored in an mfp. In compliance with all sorts of overwritting standards, this TOE also offers an overwritting function to completely erase data on recording media such as HDD. This function is used when discarding an mfp or returning a leased one in order to prevent information leakage of an organization using the mfp.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Japanese : bizhub C35 Zentai Seigyo Software English : bizhub C35 Control Software
- product_type: Control Software for digital mfp
- toe_version: A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.03.2016
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C35 Zentai Seigyo Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0282_it0301.html
- toe_overseas_name: bizhub C35 Control Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
|
- category: Wireless Monitoring
- certification_date: 23.10.2006
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10045
- product: Juniper Networks IDP 4.0 and NSM 2006.1
- scheme: US
- url: https://www.niap-ccevs.org/product/10045
- vendor: Juniper Networks, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0021_it4030_ecvr.pdf |
st_vid10045-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-06-0043
- cert_item: Juniper Networks JUNIPER NETWORKS IDP 4.0 & NSM 2006.1
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0021: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ACCESS: 1
- A.ASCOPE: 1
- A.DYNMIC: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.PROTCT: 1
- T:
- T.COMDIS: 1
- T.COMINT: 1
- T.FACCNT: 1
- T.FALACT: 1
- T.FALASC: 1
- T.FALREC: 1
- T.IMPCON: 1
- T.INADVE: 1
- T.INFLUX: 1
- T.LOSSOF: 1
- T.MISACT: 1
- T.MISUSE: 1
- T.NOHALT: 1
- T.PRIVIL: 1
- T.SCNCFG: 1
- T.SCNMLC: 1
- T.SCNVUL: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20050222184150+09'00'
- /ModDate: D:20050222184150+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 16296
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: Validation Team
- /Company: MITRE and NSA
- /CreationDate: D:20061101093929-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20061101093947-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20061101143832
- /Title: Validation Report for Juniper Networks
- /_AdHocReviewCycleID: 508012059
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Ashby,Victoria A.
- /_EmailSubject: VR
- pdf_file_size_bytes: 129187
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
|
st_vid10045-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ADO:
- ADO_DEL: 5
- ADO_DEL.1: 5
- ADO_IGS: 6
- ADO_IGS.1: 5
- ADV:
- ADV_FSP: 6
- ADV_FSP.1: 8
- ADV_HLD: 6
- ADV_HLD.1: 11
- ADV_RCR: 6
- ADV_RCR.1: 4
- AGD:
- AGD_ADM: 6
- AGD_ADM.1: 11
- AGD_USR: 6
- AGD_USR.1: 9
- ATE:
- ATE_COV: 7
- ATE_COV.1: 4
- ATE_FUN: 7
- ATE_FUN.1: 9
- ATE_IND: 7
- ATE_IND.2: 7
- AVA:
- AVA_SOF: 6
- AVA_SOF.1: 6
- AVA_VLA: 6
- AVA_VLA.1: 8
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 11
- FAU_SAR.2.1: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_SEL.1: 10
- FAU_SEL.1.1: 1
- FAU_STG.2: 14
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.4: 10
- FAU_STG.4.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MDT.1: 1
- FMT_MOF.1: 13
- FMT_MOF.1.1: 2
- FMT_MTD: 30
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITA.1: 1
- FPT_ITC.1: 1
- FPT_ITI.1: 1
- FPT_ITT.1: 10
- FPT_ITT.1.1: 1
- FPT_RVM.1: 14
- FPT_RVM.1.1: 1
- FPT_SEP.1: 14
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A: 1
- A.ACCESS: 4
- A.ASCOPE: 3
- A.DYNMIC: 4
- A.LOCATE: 3
- A.MANAGE: 4
- A.NOEVIL: 3
- A.NOTRST: 4
- A.PROTCT: 3
- O:
- O.ACCESS: 14
- O.AUDITS: 9
- O.CREDEN: 8
- O.EADMIN: 7
- O.EXPORT: 1
- O.IDANLZ: 6
- O.IDAUTH: 22
- O.IDSCAN: 8
- O.IDSENS: 10
- O.INSTAL: 4
- O.INTEGR: 6
- O.INTROP: 8
- O.OFLOWS: 7
- O.PERSON: 5
- O.PHYCAL: 10
- O.PROTCT: 9
- O.RESPON: 6
- OE:
- OE.AUDIT_PROTECTION: 7
- OE.PROTECT: 5
- OE.TIME: 8
- T:
- T.COMDIS: 4
- T.COMINT: 3
- T.FACCNT: 4
- T.FALACT: 3
- T.FALASC: 4
- T.FALREC: 3
- T.IMPCON: 4
- T.INADVE: 3
- T.INFLUX: 4
- T.LOSSOF: 3
- T.MISACT: 4
- T.MISUSE: 3
- T.NOHALT: 4
- T.PRIVIL: 3
- T.SCNCFG: 4
- T.SCNMLC: 3
- T.SCNVUL: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author:
- /CC Version: 2.2
- /CreationDate: D:20061101102236-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /EAL: EAL2
- /Keywords: Intrusion Detection System (IDS), Intrusion Detection & Prevention system (IDP), IDP Sensor™, the IDP Management Server™, IDP User Interface™
- /ModDate: D:20061101103840-05'00'
- /PPs: Intrusion Detection System System Protection Profile, version 1.5
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20061101151653
- /Status: FINAL
- /TOE: IDP 4.0 & NSM 2006.1
- /Title: Security Target
- /Vendor: Juniper Networks
- /Version: 1.0
- pdf_file_size_bytes: 1029993
- pdf_hyperlinks: http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0r1_QS_HA.pdf, http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci283994,00.html, http://cio.nist.gov/esd/emaildir/lists/cc-cmt/msg00019.html, http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_650_HG.pdf, http://www.niap.nist.gov/cc-scheme/pm02_14_aq_ia_it_products.pdf, http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_RAID_1750.pdf, http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_1650_HG.pdf, http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_1750_HG.pdf, http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0r1_QS.pdf, http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0_UG.pdf, http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0_CG.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |