Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CA Access Control for Windows r8
CCEVS-VR-0041-2007
System Software for e-STUDIO202L/232/282, e-STUDIO203L/233/283 V2.0
JISEC-CC-CRP-C0180
name CA Access Control for Windows r8 System Software for e-STUDIO202L/232/282, e-STUDIO203L/233/283 V2.0
category Access Control Devices and Systems Multi-Function Devices
scheme US JP
not_valid_after 06.09.2012 10.12.2010
not_valid_before 20.06.2007 12.08.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3036-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0180_erpt2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3036-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0180_est.pdf
manufacturer CA Technologies Toshiba TEC Corporation
manufacturer_web https://www.ca.com https://www.toshibatec.co.jp/en/
dgst 6dabe13f26dc9845 3411a2fe1fe78110
heuristics/cert_id CCEVS-VR-0041-2007 JISEC-CC-CRP-C0180
heuristics/cert_lab US []
heuristics/extracted_versions - 2.0
heuristics/scheme_data
  • category: System Access Control
  • certification_date: 20.06.2007
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date:
  • id: CCEVS-VR-VID3036
  • product: CA Access Control for Windows r8
  • scheme: US
  • url: https://www.niap-ccevs.org/product/3036
  • vendor: CA Technologies
  • cert_id: JISEC-CC-CRP-C0180
  • certification_date:
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the system software of the digital multi function device "e-STUDIO202L/232/282, e-STUDIO203L/233/283" manufactured by TOSHIBA TEC CORPORATION. The TOE controls general functions as a digital multi function device (Copy, Scan, Print and Fax), and provides functions of e-Filing Box and Shared folder. TOE security functions The TOE provides function of data overwrite and complete deletion on the user document data deleted from HDD in the "e-STUDIO202L/232/282, e-STUDIO203L/233/283" (except following data: fax reception; expired user document data stored in e-Filing Box and Shared folder after such data's effective period). The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: System Software for e-STUDIO202L/232/282, e-STUDIO203L/233/283
    • product_type: IT product (data protection function in Multi Function Device)
    • toe_version: V2.0
    • vendor: TOSHIBA TEC CORPORATION
  • expiration_date: 01.01.2011
  • supplier: TOSHIBA TEC CORPORATION
  • toe_japan_name: e-STUDIO202L/232/282, e-STUDIO203L/233/283 System Software V2.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0180_it8198.html
  • toe_overseas_name: System Software for e-STUDIO 202L/232/282, e-STUDIO203L/233/283 V2.0
pdf_data/report_filename st_vid3036-vr.pdf c0180_erpt2.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-07-0041
    • cert_item: CA CA Access Control for Windows r8
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-07-0041: 1
  • JP:
    • CRP-C0180-01: 1
    • Certification No. C0180: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 3
    • EAL3: 7
  • EAL:
    • EAL3: 4
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.2: 1
    • FAU_SAR.3: 1
    • FAU_STG.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.2: 2
    • FIA_UID.2: 2
    • FIA_USB: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 1
    • FMT_MTD.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_RVM_ENV.1: 1
    • FPT_RVM_EXP.1: 1
    • FPT_SEP_ENV.1: 1
    • FPT_SEP_EXP.1: 1
    • FPT_STM.1: 1
  • FTA:
    • FTA_TSE.1: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.STOREDATA_ACCESS: 1
    • T.TEMPDATA_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 5
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2000-0762: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • reverse engineering: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_metadata
  • /CreationDate: D:20120817152338+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20120817152458+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 457114
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 23
pdf_data/st_filename st_vid3036-st.pdf c0180_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 19
  • EAL:
    • EAL 3: 1
    • EAL3: 4
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 3
    • ADV_HLD.2: 3
    • ADV_RCR.1: 3
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 3
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF: 1
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 3
    • ADV_HLD.2: 1
    • ADV_RCR.1: 3
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF.1: 2
    • AVA_VLA.1: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR: 3
    • FAU_SAR.1: 13
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_SEL: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACC.2: 2
    • FDP_ACF: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 4
    • FIA_UID: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 3
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA: 15
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 6
    • FMT_MTD: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM: 2
    • FPT_RVM.1: 1
    • FPT_RVM_ENV: 1
    • FPT_RVM_ENV.1: 6
    • FPT_RVM_ENV.1.1: 1
    • FPT_RVM_EXP: 2
    • FPT_RVM_EXP.1: 10
    • FPT_RVM_EXP.1.1: 1
    • FPT_SEP: 2
    • FPT_SEP.1: 1
    • FPT_SEP_ENV: 1
    • FPT_SEP_ENV.1: 6
    • FPT_SEP_ENV.1.1: 1
    • FPT_SEP_ENV.1.2: 1
    • FPT_SEP_EXP: 2
    • FPT_SEP_EXP.1: 10
    • FPT_SEP_EXP.1.1: 1
    • FPT_SEP_EXP.1.2: 1
    • FPT_STM: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_TSE: 1
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 1
  • FDP:
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_RIP.2: 8
  • FPT:
    • FPT_RVM.1: 12
    • FPT_RVM.1.1: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.STOREDATA_OVERWRITE: 4
    • O.TEMPDATA_OVERWRITE: 6
  • OE:
    • OE.HDD_ERASE: 3
    • OE.OVERWRITE_COMPLETE: 3
  • T:
    • T.STOREDATA_ACCESS: 3
    • T.TEMPDATA_ACCESS: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 1
pdf_data/st_metadata
  • /Author: krogers
  • /Company: CygnaCom Solutions, Inc.
  • /CreationDate: D:20070713143933-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070713145128-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070713183619
  • /Title: APPENDIX E (CERTIFICATE POLICY TAXONOMY)
  • /_AdHocReviewCycleID: -996863536
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Kris Rogers
  • /_EmailSubject: Saffire Systems CygnaCom TSA
  • /_PreviousAdHocReviewCycleID: -1060010886
  • pdf_file_size_bytes: 508860
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
  • /Author:
  • /CreationDate: D:20090428113531+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /Keywords:
  • /ModDate: D:20090428113531+09'00'
  • /Producer: Adobe LiveCycle PDFG 7.2
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 184192
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different