name |
XTS-400/STOP 6.4 U4 |
Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit User Interface: 4030-20G0-05-00 Network Module: 4030-A0G0-03-00 |
category |
Operating Systems |
Multi-Function Devices |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
20.07.2012 |
28.12.2010 |
not_valid_before |
03.07.2008 |
03.08.2004 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10293-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0011_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10293-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0011_est.pdf |
manufacturer |
BAE Systems, Inc. |
Konica Minolta Business Technologies, Inc |
manufacturer_web |
https://www.baesystems.com/ |
https://www.konicaminolta.com/ |
security_level |
ATE_IND.3, EAL5+, ALC_FLR.3 |
EAL3 |
dgst |
7134d26654a96430 |
f7d41e1f69ac3e28 |
heuristics/cert_id |
CCEVS-VR-VID-10293-2008 |
JISEC-CC-CRP-C0011-01 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_LCD.2, AGD_USR.1, AVA_SOF.1, ATE_COV.2, AVA_MSU.2, ATE_DPT.2, AGD_ADM.1, ALC_FLR.3, ADV_INT.1, ADV_RCR.2, ATE_IND.3, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, AVA_VLA.3, ADV_HLD.3, ALC_DVS.1, ADV_SPM.3, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
6.4 |
00, 05, 03, 4030 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Operating System
- certification_date: 03.07.2008
- evaluation_facility: Arca CCTL
- expiration_date:
- id: CCEVS-VR-VID10293
- product: XTS-400 / STOP 6.4 U4
- scheme: US
- url: https://www.niap-ccevs.org/product/10293
- vendor: BAE Systems Information and Electronic Systems, Inc.
|
- cert_id: JISEC-CC-CRP-C0011
- certification_date: 01.08.2004
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0011_eimg.pdf
- description: PRODUCT DESCRIPTION Multi Function Peripheral (MFP) is IT machine for office work which is composed by selecting and combining each function such as copy, print, scan, FAX. This TOE* consists of "User Interface" and "Network Module" which are the software components carrying out the operation control processing, from the operation panel and a client PC in the control software of Di3510 series/Di3510f series MFP. This security function protects the high confidential document data that is spooled in MFP from exposing by using the specific function. That specific function is the Locked Print function which accepts printing only when the set-up password and input password from the panel are matched and the User Box function which controls the access to the user box. * Japan: Di3510 shirizu/ Di3510f shirizu Multi Function Peripheral Security Kit, Aboard:Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit are the same products with different name.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: Japan :Di3510 shirizu / Di3510f shirizu Multi Function Peripheral Security Kit Abroad:Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit
- product_type: IT Product (data protection function in digital MFD)
- protection_profile: Not available
- report_link: https://www.ipa.go.jp/en/security/c0011_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0011_est.pdf
- toe_version: User Interface : 4030-20G0-05-00 Network Module : 4030-A0G0-03-00
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.01.2011
- supplier: Konica Minolta business technologies,inc.
- toe_japan_name: Di3510 shirizu / Di3510f shirizu Multi Function Peripheral Security Kit (User Interface : 4030-20G0-05-00 Network Module : 4030-A0G0-03-00)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0011_it4021.html
- toe_overseas_name: Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit (User Interface : 4030-20G0-05-00 Network Module : 4030-A0G0-03-00)
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
CCEVS-VR-0094-2005 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
CCEVS-VR-0094-2005 |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10293-vr.pdf |
c0011_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10293-2008
- cert_item: BAE Systems Information Technology, Inc. XTS-400 Version 6.4.U4
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10293-2008: 1
|
- JP:
- CRP-C0011-01: 1
- Certification No. C011: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 5: 6
- EAL 5 augmented: 3
- EAL5+: 2
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ACCESS-CHECK: 1
- A.ADMIN: 1
- A.AUTH: 1
- A.HDD: 1
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.SERVICE: 1
- A.SESSION: 1
- T:
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-USER-BOX: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20080730140420-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20080730140438-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20080730180338
- /Subject: CCEVS Validation Report - Cisco Routers EAL3
- /Title: VID6014-VR-0001 DRAFT
- pdf_file_size_bytes: 220277
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
- /CreationDate: D:20050823120725+09'00'
- /ModDate: D:20050823120725+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 197148
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
pdf_data/st_filename |
st_vid10293-st.pdf |
c0011_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- US:
- CCEVS-VR-04-0058: 1
- CCEVS-VR-05-0094: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL1: 1
- EAL3: 3
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL5: 12
- EAL5 augmented: 3
- EAL5+: 4
- EAL6: 3
- EAL7: 1
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 1
- ACM_CAP.4: 2
- ACM_SCP: 1
- ACM_SCP.3: 2
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 3
- ADV:
- ADV_FSP: 1
- ADV_FSP.3: 1
- ADV_HLD: 1
- ADV_HLD.3: 2
- ADV_IMP: 2
- ADV_IMP.2: 2
- ADV_INT: 2
- ADV_INT.1: 1
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 1
- ADV_RCR.2: 1
- ADV_SPM: 3
- ADV_SPM.1: 2
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 3
- AGD_USR: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_FLR: 3
- ALC_FLR.3: 8
- ALC_LCD: 2
- ALC_LCD.2: 1
- ALC_TAT: 2
- ALC_TAT.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 2
- ATE_DPT: 1
- ATE_DPT.2: 2
- ATE_FUN: 1
- ATE_FUN.1: 2
- ATE_IND: 1
- ATE_IND.3: 6
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 3
- AVA_MSU: 1
- AVA_MSU.2: 2
- AVA_SOF: 1
- AVA_SOF.1: 4
- AVA_VLA: 1
- AVA_VLA.3: 3
|
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAA: 1
- FAU_SAA.1: 13
- FAU_SAA.1.1: 1
- FAU_SAR: 3
- FAU_SAR.1: 9
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 4
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_SEL: 8
- FAU_SEL.1: 2
- FAU_STG: 13
- FAU_STG.1: 3
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.3: 6
- FAU_STG.3.1: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 2
- FDP_ACC.2: 11
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 11
- FDP_ACF.1: 5
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 4
- FDP_ETC: 2
- FDP_ETC.1: 10
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 4
- FDP_ETC.2: 12
- FDP_ETC.2.1: 4
- FDP_ETC.2.2: 3
- FDP_ETC.2.3: 4
- FDP_ETC.2.4: 5
- FDP_ICF: 1
- FDP_IFC: 6
- FDP_IFC.1: 2
- FDP_IFC.2: 17
- FDP_IFC.2.1: 5
- FDP_IFC.2.2: 2
- FDP_IFF: 3
- FDP_IFF.1: 1
- FDP_IFF.2: 18
- FDP_IFF.2.1: 4
- FDP_IFF.2.2: 8
- FDP_IFF.2.5: 8
- FDP_IFF.2.7: 10
- FDP_ITC: 12
- FDP_ITC.1: 13
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 2
- FDP_ITC.2: 6
- FDP_ITC.2.1: 4
- FDP_ITC.2.2: 4
- FDP_ITC.2.3: 4
- FDP_ITC.2.4: 4
- FDP_RIP: 1
- FDP_RIP.1: 2
- FDP_RIP.2: 9
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 11
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 2
- FIA_ATD: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 3
- FIA_SOS.1: 10
- FIA_SOS.1.1: 2
- FIA_UAU: 2
- FIA_UAU.1: 4
- FIA_UAU.2: 14
- FIA_UAU.2.1: 1
- FIA_UAU.4: 11
- FIA_UAU.4.1: 1
- FIA_UAU.6: 1
- FIA_UAU.6.1: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 3
- FIA_UID.2: 11
- FIA_UID.2.2: 1
- FIA_USB: 2
- FIA_USB.1: 11
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 17
- FMT_MOF.1.1: 10
- FMT_MSA: 2
- FMT_MSA.1: 21
- FMT_MSA.1.1: 16
- FMT_MSA.2: 8
- FMT_MSA.2.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 16
- FMT_MTD.1.1: 9
- FMT_MTD.2: 10
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_REV: 1
- FMT_REV.1: 12
- FMT_REV.1.1: 3
- FMT_REV.1.2: 2
- FMT_SAE.1: 9
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 15
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FMT_SMR.3: 10
- FMT_SMR.3.1: 1
- FPT:
- FPT_AMT: 1
- FPT_AMT.1: 6
- FPT_AMT.1.1: 5
- FPT_RCV.1: 7
- FPT_RCV.1.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 7
- FPT_RVM.1.1: 2
- FPT_SEP: 1
- FPT_SEP.1: 7
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 3
- FPT_TDC: 1
- FPT_TRP.1: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 4
- FPT_TST.1.3: 4
- FTA:
- FTA_SSL.1: 8
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 8
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTA_SSL.3: 8
- FTA_SSL.3.1: 2
- FTA_TAB: 1
- FTA_TAB.1: 8
- FTA_TAB.1.1: 4
- FTA_TAH: 1
- FTA_TAH.1: 8
- FTA_TAH.1.1: 4
- FTA_TAH.1.2: 1
- FTA_TAH.1.3: 1
- FTA_TSE: 1
- FTA_TSE.1: 8
- FTA_TSE.1.1: 1
- FTP:
- FTP_TRP: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FDP:
- FDP_ACC.1: 26
- FDP_ACC.1.1: 2
- FDP_ACF.1: 22
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 2
- FIA:
- FIA_AFL.1: 47
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_SOS.1: 39
- FIA_SOS.1.1: 4
- FIA_UAU.1: 16
- FIA_UAU.2: 68
- FIA_UAU.2.1: 4
- FIA_UAU.6: 13
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 28
- FIA_UID.2: 57
- FIA_UID.2.1: 4
- FMT:
- FMT_MOF.1: 15
- FMT_MOF.1.1: 1
- FMT_MSA.1: 16
- FMT_MSA.1.1: 1
- FMT_MSA.3: 23
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 52
- FMT_MTD.1.1: 5
- FMT_RVM.1.1: 1
- FMT_SMF.1: 39
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 73
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 4
- FMT_SMT.1: 1
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 23
- FPT_SEP: 1
- FPT_SEP.1: 28
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AUDITING: 1
- O.AUTHORIZATION: 1
- O.CREDEN: 1
- O.DISCRETIONARY_ACCESS: 1
- O.ENFORCEMENT: 1
- O.INSTALL: 1
- O.MANAGE: 1
- O.MANDATORY_ACCESS: 1
- O.PHYSICAL: 1
- O.RESIDUAL_INFORMATION: 1
|
- A:
- A.ACCESS-CHECK: 3
- A.ADMIN: 2
- A.AUTH: 3
- A.HDD: 2
- A.NETWORK: 3
- A.PHYSICAL: 2
- A.SERVICE: 3
- A.SESSION: 2
- O:
- O.ACCESS-ADMIN: 8
- O.ACCESS-SERVICE: 7
- O.ACCESS-USE-BOX: 1
- O.ACCESS-USER-BOX: 3
- O.ACESS-ADMIN: 2
- OE:
- OE.ACCESS-: 1
- OE.ACCESS-SECURE-PRINT: 5
- OE.SECURE-PRINT-QUALITY: 5
- T:
- T.ACCESS-SECURE-PRINT: 3
- T.ACCESS-USER-BOX: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCIMB-99-032: 2
- CCIMB-99-033: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- the MFP is considered temporary data that is stored to maintain security during the printing of a confidential document. In other words, this data is not intended to be stored in the MFP for a long period of time, and: 1
|
pdf_data/st_metadata |
- /Author: John.Ata
- /CreationDate: 6/18/2008 10:40:20
- /CreationDate--Text: 6/18/2008 10:40:20
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20080725135833-04'00'
- /Producer: GNU Ghostscript 7.05
- /Title: Microsoft Word - Security Target.savvis22.doc
- pdf_file_size_bytes: 620808
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 161
|
- /CreationDate: D:20050823121328+09'00'
- /ModDate: D:20050823121328+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 409164
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |