name |
McAfee Endpoint Encryption for Devices version 5.0 |
Fuji Xerox ApeosPort-IV C7780/C6680/C5580 DocuCentre-IV C7780/C6680/C5580 Series Controller Software Controller ROM Ver. 1.0.7 |
category |
Data Protection |
Other Devices and Systems |
scheme |
UK |
JP |
status |
archived |
archived |
not_valid_after |
05.03.2013 |
04.07.2016 |
not_valid_before |
23.05.2006 |
23.06.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP227.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0296_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SafeBoot5.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0296_est.pdf |
manufacturer |
McAfee, Inc. |
Fuji Xerox Co., Ltd. |
manufacturer_web |
https://www.mcafee.com/ |
https://www.fujixerox.co.jp/eng/ |
security_level |
EAL4 |
EAL3 |
dgst |
72feecf18621c759 |
67431400efc64534 |
heuristics/cert_id |
CRP227 |
JISEC-CC-CRP-C0296 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_IMP.1, ADV_FSP.2, AGD_ADM.1, ATE_COV.2, AVA_VLA.2, ATE_DPT.1, ALC_DVS.1, ALC_TAT.1, AGD_USR.1, ATE_IND.2, AVA_SOF.1, ADV_SPM.1, AVA_MSU.2, ADV_RCR.1, ALC_LCD.1, ATE_FUN.1, ADV_LLD.1, ADV_HLD.2 |
ALC_CMC.3, ADV_ARC.1, ADV_TDS.2, ATE_IND.2, ADV_FSP.3, AGD_PRE.1, AGD_OPE.1, ALC_CMS.3, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ATE_COV.2, ASE_OBJ.2, ASE_SPD.1, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ALC_DVS.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1 |
heuristics/extracted_versions |
5.0 |
1.0.7 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0296
- certification_date: 01.06.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0296_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Device (MFD) that provides copy, print, scan, fax ,etc functions as basic functions. The MFD is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFD via internal network, and general user client which is directly linked to the MFD. TOE security functions To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Fuji Xerox ApeosPort-IV C7780/C6680/C5580 DocuCentre-IV C7780/C6680/C5580 Series Controller Software
- product_type: Control Software for Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0296_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0296_est.pdf
- toe_version: Controller ROM Ver. 1.0.7
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.07.2016
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0296_it0319.html
- toe_japan_name: Fuji Xerox ApeosPort-IV C7780/C6680/C5580 DocuCentre-IV C7780/C6680/C5580 Series Controller Software Controller ROM Ver. 1.0.7
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP227.pdf |
c0296_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- UK:
- CERTIFICATION REPORT No. P227: 1
|
- JP:
- CRP-C0296-01: 1
- Certification No. C0296: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- T:
- T.COMM_TAP: 2
- T.CONFDATA: 2
- T.CONSUME: 2
- T.DATA_SEC: 2
- T.RECOVER: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2005-08-003: 1
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- AES, SHA-1 and DSA) used in the TOE are out of scope and were not considered during the evaluation: 1
- implementation of the cryptographic algorithms used by the TOE to encrypt data on the hard disk are out of scope of this evaluation, although the calls to these algorithms are considered. 11. An overview of the: 1
- of the EAL4 evaluation. 37. The cryptographic functions (AES, SHA-1 and DSA) used in the TOE are out of scope and were not considered during the evaluation. TOE Configuration 38. The TOE should be configured: 1
- out of scope: 2
|
|
pdf_data/report_metadata |
- /Author: racook
- /CreationDate: D:20060531102509Z
- /Creator: T493 Safeboot CR v1.0 - Microsoft Word
- /ModDate: D:20131204150401Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: T493 Safeboot CR v1.0.doc
- pdf_file_size_bytes: 976093
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /CreationDate: D:20111005135538+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20111005135622+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 387262
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
pdf_data/st_filename |
SafeBoot5.pdf |
c0296_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.2: 2
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_LLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 10
- AGD_USR.1: 6
- ALC:
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.2: 2
- AVA_SOF.1: 3
- AVA_VLA.2: 2
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 3
- FAU_SAR.3.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 6
- FAU_STG.3.1: 1
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 2
- FCS_CKM.4: 10
- FCS_CKM.4.1: 1
- FCS_COP.1: 23
- FCS_COP.1.1: 4
- FDP:
- FDP_ACC.2: 5
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.4: 18
- FIA_UAU.4.1: 2
- FIA_UAU.7: 10
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 9
- FMT_MSA.1.1: 2
- FMT_MSA.2: 6
- FMT_MSA.2.1: 2
- FMT_MSA.3: 6
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 20
- FMT_MTD.1.1: 4
- FMT_MTD.2: 6
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_REV.1: 8
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SAE.1: 8
- FMT_SAE.1.1: 2
- FMT_SAE.1.2: 2
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 1
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_RCV.1: 5
- FPT_RCV.1.1: 1
- FPT_RVM.1: 11
- FPT_RVM.1.1: 1
- FPT_SEP.1: 3
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM: 1
- FPT_STM.1.1: 1
- FRU:
- FRU_FLT.1: 5
- FRU_FLT.1.1: 1
- FTA:
- FTA_SSL.2: 5
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTA_TSE.1: 6
- FTA_TSE.1.1: 1
- FTP:
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 30
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 18
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UIA.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FTP:
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMINISTRATION_SERVER: 4
- A.ADMINSTRATIVE_SERVE: 1
- A.AUTHENTICATION_DATA_PRIVATE: 4
- A.AVAILABLE_BACKUP: 4
- A.DOMAIN_SEPARATION: 4
- A.MANAGEMENT: 4
- A.NON_TECHNICAL_IDENTITY_VERIFICATION: 4
- A.NO_MALEVOLENCE: 3
- A.PROFICIENT_USERS: 6
- A.SECURE_BACKUP: 4
- A.TIME_SOURCE: 5
- A.TRUSTED_SOFTWARE: 4
- O:
- O.ACCESS_CONTROL: 7
- O.AUDIT: 13
- O.AUTHORISATION: 16
- O.AUTHORISED: 1
- O.CRYPOTOGRAPHIC_KEYS: 3
- O.CRYPTOGRAPHIC_KEYS: 8
- O.CRYPTOGRAPHIC_OPERATIONS: 9
- O.DATA_TRANSFER: 10
- O.EASE_OF_USE_USER: 7
- O.EFFECTIVE_ADMINISTRATION: 7
- O.ENCRYPTED: 1
- O.ENCRYPTED_MEDIA: 8
- O.FAULT_TOLERANCE: 7
- O.NO_OBJECT_REUSE: 9
- O.PROTECT: 9
- O.SECURE: 1
- O.SECURE_RECOVERY: 6
- O.TRUSTED_PATH: 8
- O.UNATHORISED_MODIFICATION: 1
- OE:
- OE.ADMINISTRATION: 1
- OE.ADMINISTRATION_SERVER: 7
- OE.AUTH: 6
- OE.AVAILABLE_BACKUP: 6
- OE.DOMAIN_SEPARATION: 4
- OE.EASE_OF_USE_ADMIN: 8
- OE.EASE_OF_USE_USER: 6
- OE.MANAGED: 10
- OE.NON_TECHNICAL_IDENTITY_VERIFICATION: 6
- OE.SECURE_BACKUP: 6
- OE.TIME_SOURCE: 8
- OE.TRUSTED_SOFTWARE: 4
- T:
- T.ACCESS: 8
- T.ALTERNATE_BOOT_PROCESS: 4
- T.AUTHENTICATION_DATA_PRIVATE: 2
- T.CONFIG: 3
- T.CONFIG_MODIFICATION: 1
- T.CORRUPT_AUDIT: 4
- T.EASE_OF_USE_ADMIN: 4
- T.EASE_OF_USE_USER: 4
- T.EAVESDROP_TRANSIT: 4
- T.OBJECT_REUSE: 5
- T.PASSWORD_LOSS: 6
- T.RECORD_ACTIONS: 6
- T.RECOVERY_MASQUERADE: 4
- T.RECOVERY_PROCEDURE_INTERCEPT: 3
- T.REMOVE_DISK: 3
- T.SPOOF: 3
- T.SYSTEM_ACCESS: 8
- T.UNAUTHORISED_MODIFICATION: 9
|
- A:
- O:
- O.AUDITS: 8
- O.CIPHER: 6
- O.COMM_SEC: 7
- O.FAX_SEC: 5
- O.MANAGE: 9
- O.RESIDUAL: 6
- O.RESTRICT: 7
- O.USER: 7
- OE:
- T:
- T.COMM_TAP: 5
- T.CONFDATA: 3
- T.CONSUME: 5
- T.DATA_SEC: 3
- T.RECOVER: 5
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 4
- FIPS 140-2: 16
- FIPS 180: 1
- FIPS 186: 1
- FIPS 186-2: 3
- FIPS 197: 7
- ISO:
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 15408:2005: 1
- ISO/IEC 18405:2005: 1
- RFC:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: racook
- /CreationDate: D:20060531102131
- /Creator: SafeBoot 5 Security Target v1.0 - Microsoft Word
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: SafeBoot 5 Security Target v1.0.doc
- pdf_file_size_bytes: 206656
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 50
|
- /Author:
- /CreationDate: D:20110818155916+09'00'
- /Creator: eDocument Library version 2.5.4
- /ModDate: D:20110818155916+09'00'
- /Producer: eDocument Library version 2.5.4 PDF Filter
- /Title:
- pdf_file_size_bytes: 726815
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |