name |
IPGARD Secure KVM Switch (DPMST models) |
Data Security Kit(D) Software V1.00J |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
21.07.2022 |
31.01.2013 |
not_valid_before |
21.07.2020 |
31.10.2006 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11039-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11039-vr.pdf |
https://www.commoncriteriaportal.org/files/epfiles/c0056_ecvr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11039-st.pdf |
https://www.commoncriteriaportal.org/files/epfiles/ |
manufacturer |
IPGARD, Inc. |
KYOCERA MITA Corporation |
manufacturer_web |
https://www.smartavi.com |
|
security_level |
{} |
EAL3 |
dgst |
7c272b9fc325be52 |
28a5dbecb883b240 |
heuristics/cert_id |
CCEVS-VR-VID-11039-2020 |
JISEC-CC-CRP-C0056 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, ASE_OBJ.1, ALC_TSU_EXT.1, ATE_IND.1, ASE_REQ.1, ALC_CMS.1, AGD_OPE.1, ASE_INT.1, ALC_CMC.1 |
{} |
heuristics/extracted_versions |
- |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0056
- certification_date: 01.10.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0056_eimg.pdf
- description: PRODUCT DESCRIPTION This TOE is a software module that is installed on the MFPs "KM-C2520/KM-C3225/KM-C3232" of KYOCERA MITA Corporation, and which provides the ordinary functions, and also security functions for protecting residue data. This TOE is installed on the above-mentioned MFPs and protects image data remaining on the HDDs from unjust exposure, after various copying, printing, and network scanning processings, by providing an HDD overwriting function. And it has the administrator authentication function that identifies and authenticates a TOE machine administrator who sets the HDD overwrite deletion method and operates it.
- evaluation_facility: Japan Electronics & Information Technology Industries Association, Information Technology Security Center
- product: Data Security Kit(D) Software
- product_type: IT Product (data protection function in digital Multi Function Device)
- toe_version: V1.00J
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.03.2013
- revalidations: [frozendict({'date': '2007-10', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0056_it5064_02.html'})]
- supplier: KYOCERA MITA Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0056_it5064.html
- toe_japan_name: Data Security Kit(D) Software V1.00J
- toe_overseas_link: None
- toe_overseas_name: Data Security Kit(D) Software V2.10J
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
da2e45c9b3fbb700 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf |
{} |
pdf_data/cert_filename |
st_vid11039-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11039-2020: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20200723090200-04'00'
- /ModDate: D:20200723090200-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181023
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11039-vr.pdf |
c0056_ecvr.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11039-2020
- cert_item: for the Red Hat Enterprise Linux Version 7.6, Version 1.0
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11039-2020: 1
|
- JP:
- Certification No. C0056: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.2: 2
- FCS_COP.1: 7
- FCS_DRBG_EXT.1: 1
- FCS_SSHC_EXT.1: 5
- FCS_SSHS_EXT.1: 2
- FCS_TLSC_EXT.1: 4
- FCS_TLSC_EXT.4: 1
- FPT:
- FPT_TST_EXT.1: 1
- FPT_TUD_EXT.1: 1
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- T:
- T.LIMITED_PHYSICAL_ACCESS: 1
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 3
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 2
- SHA-512: 2
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
- NIST:
- P-256: 16
- P-384: 16
- P-521: 12
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20061102201015+09'00'
- /ModDate: D:20061102201015+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12181
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/st_filename |
st_vid11039-st.pdf |
|
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ALC_TSU_EXT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 3
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 4
- FCS_CKM_EXT.4.1: 1
- FCS_CKM_EXT.4.2: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 6
- FCS_DRBG_EXT.1: 1
- FCS_RBG_EXT.1: 3
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 7
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHC_EXT.1.2: 1
- FCS_SSHC_EXT.1.3: 1
- FCS_SSHC_EXT.1.4: 1
- FCS_SSHC_EXT.1.5: 1
- FCS_SSHC_EXT.1.6: 1
- FCS_SSHC_EXT.1.7: 1
- FCS_SSHC_EXT.1.8: 1
- FCS_SSHS_EXT.1: 7
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSH_EXT.1: 3
- FCS_SSH_EXT.1.1: 1
- FCS_STO_EXT.1: 3
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.2: 2
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.4: 1
- FDP:
- FDP_ACF_EXT.1: 4
- FDP_ACF_EXT.1.1: 1
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT.1: 3
- FMT_MOF_EXT.1.1: 1
- FMT_SMF_EXT.1: 4
- FMT_SMF_EXT.1.1: 2
- FPT:
- FPT_ACF_EXT.1: 3
- FPT_ACF_EXT.1.1: 1
- FPT_ACF_EXT.1.2: 1
- FPT_ASLR_EXT.1: 3
- FPT_ASLR_EXT.1.1: 1
- FPT_SBOP_EXT.1: 3
- FPT_SBOP_EXT.1.1: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.2: 2
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_TAB.1: 3
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 3
- FTP_ITC_EXT.1.1: 1
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.LIMITED_PHYSICAL_ACCESS: 1
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 9
- AES-: 1
- AES-128: 1
- AES-256: 1
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 4
- HMAC-SHA-384: 3
- HMAC-SHA-512: 2
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- RSA:
- RSA 2048: 4
- RSA 4096: 2
- RSA2048: 1
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 9
- SHA-384: 7
- SHA-512: 7
- SHA2: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- TLS:
- TLS: 32
- TLS 1.2: 1
- TLSv1.2: 3
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 34
- P-384: 36
- P-521: 22
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 3
- FIPS 197: 1
- FIPS 198-1: 1
- FIPS PUB 186-4: 4
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-57: 1
- NIST SP 800-90A: 1
- SP 800-56A: 2
- SP 800-56B: 1
- RFC:
- RFC 3526: 1
- RFC 4251: 1
- RFC 4253: 2
- RFC 5246: 13
- RFC 5280: 4
- RFC 5288: 8
- RFC 5289: 16
- RFC 5759: 1
- RFC 6125: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Acumen Security, LLC.
- /CreationDate: D:20200621230909-07'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20200621230909-07'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 875497
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_tds.cfm, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=246, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=375, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0446, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0496, mailto:[email protected], https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12206, https://access.redhat.com/security/updates/classification, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=430, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=338, https://access.redhat.com/security/security-updates/#/cve, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0493, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0441, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=396, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0463, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=337, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=11838
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
False |
state/st/download_ok |
True |
False |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |