name |
bizhub PRO 1050P zentai seigyo software Overseas: bizhub PRO 1050P control software |
EMC® Avamar® v6.1 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
JP |
CA |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
19.04.2018 |
not_valid_before |
21.02.2005 |
12.10.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0021_it4030_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-212%20CR_v1.0e.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-avamar-v61-sec-eng.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
EMC Corporation |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.emc.com/ |
security_level |
EAL3 |
EAL2+, ALC_FLR.2 |
dgst |
6cf4c2cf7687f4e8 |
2dc22d7cc7e5bc94 |
heuristics/cert_id |
JISEC-CC-CRP-C0021 |
383-4-212 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
cpe:2.3:a:emc:avamar_plugin:6.1:-:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2012-2291 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
6.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0282
- certification_date: 01.02.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0282_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is the software which is installed in a digital Multi Function Peripheral (hereinafter referred to as "mfp") consisting of a copier, printer, scanner, and fax function, and controls the overall operation of the mfp. TOE security functionality This TOE offers a security function against disclosure of highly-confidential information stored in an mfp. In compliance with all sorts of overwritting standards, this TOE also offers an overwritting function to completely erase data on recording media such as HDD. This function is used when discarding an mfp or returning a leased one in order to prevent information leakage of an organization using the mfp.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Japanese : bizhub C35 Zentai Seigyo Software English : bizhub C35 Control Software
- product_type: Control Software for digital mfp
- toe_version: A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.03.2016
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C35 Zentai Seigyo Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0282_it0301.html
- toe_overseas_name: bizhub C35 Control Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0021_it4030_ecvr.pdf |
383-4-212 CR_v1.0e.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-212-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0021: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 4
- EAL 2 augmented: 2
- EAL 2+: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20050222184150+09'00'
- /ModDate: D:20050222184150+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 16296
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: User
- /CCEF: EWA-Canada
- /CR date: 12 October 2012
- /CR version: 1.0
- /Certificate date: 12 October 2012
- /CreationDate: D:20121024072842-04'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /Developer name: EMC
- /Document number: 383-4-212-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of EMC® Avamar® v6.1, Version 0.3, 31 August 2012.
- /Evaluation completion date: 31 August 2012
- /ModDate: D:20121024072846-04'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /ST Title: EMC Corporation EMC® Avamar® v6.1 Security Target
- /ST date: 20 August 2012
- /ST version: Version 1.0
- /SourceModified: D:20121024112805
- /Sponsor: EMC
- /TOE Version: 6.1
- /TOE name and version: EMC® Avamar® v6.1
- /TOE short name: Avamar® v6.1
- /Title: EAL 2 Evaluation of <TOE name and version>
- pdf_file_size_bytes: 67375
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
pdf_data/st_filename |
|
emc-avamar-v61-sec-eng.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.2: 20
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 16
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ETC.1: 6
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ITC.1: 6
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 6
- FDP_ITT.1.1: 1
- FDP_SDI.1: 2
- FDP_SDI.2: 11
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 15
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB: 1
- FIA_USB.1: 8
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.INSTALL: 2
- A.LOCATE: 2
- A.MANAGE: 2
- A.NOEVIL: 2
- A.PROTECT: 2
- A.SCONNECT: 2
- A.TIMESTAMP: 2
- O:
- O.ADMIN: 10
- O.AUDIT: 6
- O.AUTHENTICATE: 6
- O.DATA: 4
- O.PROTECT: 7
- O.TIMESTAMP: 4
- OE:
- OE.MANAGE: 7
- OE.PHYSICAL: 5
- OE.PLATFORM: 3
- OE.PROTECT: 5
- OE.SCONNCET: 1
- OE.SCONNECT: 2
- OE.TIME: 3
- T:
- T.FAILED: 2
- T.MASQUERADE: 2
- T.TAMPERING: 2
- T.UNAUTH: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Kathleen Moyer
- /CreationDate: D:20120820113311-04'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20121105105910-05'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Avamar® v6.1
- /Title: Security Target EMC® Avamar® v6.1
- pdf_file_size_bytes: 1216716
- pdf_hyperlinks: mailto:[email protected], http://www.corsec.com/, http://www.emc.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |