name |
SHARP MX-M6071 / M5071 / M4071 / M3571 / M3071 fax option model with MX-FR64U; MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD standard model with MX-FR64U and MX-PK13; and MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD option model with MX-FR64U, MX-HD16 and MX-PK130210zd00 |
IBM Tivoli Netcool OMNIbus v7.1 with Tivoli Netcool Webtop v2.0 |
category |
Multi-Function Devices |
Network and Network-Related Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
03.06.2024 |
20.07.2012 |
not_valid_before |
27.07.2020 |
31.07.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0678_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0678_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10055-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0678_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10055-st.pdf |
manufacturer |
Sharp Corporation |
IBM Corporation |
manufacturer_web |
https://sharp-world.com/ |
https://www.ibm.com |
security_level |
{} |
EAL2 |
dgst |
7fb1cc56d893f3ac |
217a610530fdc3fa |
heuristics/cert_id |
JISEC-CC-CRP-C0678 |
CCEVS-VR-VID-10055-2008 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
cpe:2.3:h:sharp:mx-m5051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m6071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m3571:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m4071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m5071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m4051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m6051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m2651:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m3051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m3071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m3551:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
heuristics/extracted_versions |
- |
7.1, 2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0678
- certification_date: 01.07.2020
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0678
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000wfu-att/c0678_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device (MFD) that has the functions, such as copy, print, scan and filing. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: Identification and Authentication Function Access Control Function Stored Data Encryption Function Network Protection Function Security Management Function Audit Function Software Verification Function Self-testing Function Residual Data Overwrite Function Data Purging Function
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: SHARP MX-M6071 / M5071 / M4071 / M3571 / M3071 fax option model with MX-FR64U; MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD standard model with MX-FR64U and MX-PK13; and MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD option model with MX-FR64U, MX-HD16 and MX-PK13
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000wfu-att/c0678_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000wfu-att/c0678_est.pdf
- toe_version: 0210zd00
- vendor: SHARP CORPORATION
- expiration_date: 01.06.2024
- supplier: SHARP CORPORATION
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0678_it9720.html
- toe_overseas_name: SHARP MX-M6071 / M5071 / M4071 / M3571 / M3071 fax option model with MX-FR64U; MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD standard model with MX-FR64U and MX-PK13; and MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD option model with MX-FR64U, MX-HD16 and MX-PK130210zd00
|
- category: Network Management
- certification_date: 31.07.2008
- evaluation_facility: Arca CCTL
- expiration_date:
- id: CCEVS-VR-VID10055
- product: IBM Tivoli Netcool OMNIbus v7.1 with Tivoli Netcool Webtop v2.0
- scheme: US
- url: https://www.niap-ccevs.org/product/10055
- vendor: IBM Corporation
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
{} |
pdf_data/cert_filename |
c0678_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0678-01-2020: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20200817104926+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /Keywords:
- /ModDate: D:20200817105556+09'00'
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20200817012930
- /Subject:
- /Title:
- pdf_file_size_bytes: 113768
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0678_est.pdf |
st_vid10055-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10055-2008
- cert_item: IBM Tivoli Netcool OMNIbus v7.1 with IBM Tivoli Netcool WebTop v2.0
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10055-2008: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 4: 1
- EAL2: 4
- EAL3: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ADO:
- ADO_DEL.1: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.1: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_SOF.1: 1
- AVA_VLA.1: 1
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN: 14
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 40
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 27
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 101
- FCS_COP.1.1: 6
- FCS_KDF_EXT.1: 4
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 9
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 25
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 4
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 3
- FCS_TLS_EXT.1: 26
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 3
- FDP_DSK_EXT.1: 9
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP.1: 8
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 16
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 3
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 20
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS_CONTROL: 7
- O.ADMIN_ROLES: 4
- O.AUDIT: 4
- O.COMMS_PROTECTION: 11
- O.IMAGE_OVERWRITE: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 3
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.INSTALL: 1
- A.LOWEXP: 1
- A.OSLOGIN: 1
- A.PHYSEC: 1
- A.PROBE: 1
- A.SEL_PRO: 1
- A.SOLARIS: 1
- A.TRUSTED: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 18
- AES-128: 1
- AES-256: 2
- Rijndael:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 5
- SHA256: 2
- SHA384: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 40
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 7
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197: 2
- FIPS PUB 198-1: 2
- ISO:
- ISO/IEC 10116: 6
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 3
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- NIST SP 800-90A: 5
- RFC:
- RFC 2246: 1
- RFC 2818: 4
- RFC 4346: 1
- RFC 5246: 3
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20201015095811+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /ModDate: D:20201015095846+09'00'
- /Producer: Adobe PDF Library 20.9.95
- /Title:
- pdf_file_size_bytes: 911294
- pdf_hyperlinks: http://csrc.nist.gov/archive/aes/katmct/katmct.htm
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
- /Author: dmhale1
- /CreationDate: D:20081020142813-04'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20081020142813-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - VID10055-VR-final.doc
- pdf_file_size_bytes: 379398
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
c0678_est.pdf |
st_vid10055-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 14
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 40
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 27
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 101
- FCS_COP.1.1: 6
- FCS_KDF_EXT.1: 4
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 9
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 25
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 4
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 3
- FCS_TLS_EXT.1: 26
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 3
- FDP_DSK_EXT.1: 9
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP.1: 8
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 16
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 3
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 20
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN_EXP.1: 9
- FAU_GEN_EXP.1.2: 1
- FAU_SAR.1: 9
- FAU_SAR.1.2: 1
- FAU_STG.1: 19
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.4: 2
- FCS_COP.1: 17
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 14
- FDP_ACF.1: 11
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 11
- FDP_IFF.1: 13
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FIA:
- FIA_AFL.1: 13
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 8
- FIA_SOS.1: 13
- FIA_SOS.1.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 13
- FIA_UAU.1.2: 1
- FIA_UID.1: 12
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MSA.1: 21
- FMT_MSA.1.1: 2
- FMT_MSA.2: 1
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 7
- FMT_SMR.1: 8
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_RVM.1: 2
- FPT_RVM_EXP.1: 8
- FPT_SEP.1: 2
- FPT_SEP_EXP.1: 6
- FPT_SEP_EXP.1.2: 1
- FPT_STM.1: 6
- FPT_TRC.1: 7
- FPT_TRC.1.2: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS_CONTROL: 7
- O.ADMIN_ROLES: 4
- O.AUDIT: 4
- O.COMMS_PROTECTION: 11
- O.IMAGE_OVERWRITE: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 3
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.INSTALL: 4
- A.LOWEXP: 2
- A.OSLOGIN: 2
- A.PHYSEC: 2
- A.PROBE: 2
- A.SEL_PRO: 4
- A.SOLARIS: 2
- A.TRUSTED: 3
- O:
- O.AUDITING: 4
- O.AUDITPROTECT: 4
- O.AUTHORIZATION: 4
- O.DISCRETIONARY_ACCESS: 4
- O.MANAGE: 4
- O.REPLICATION: 4
- O.SECURECOMMS: 4
- O.SEL_PRO: 6
- OE:
- OE.CREDEN: 3
- OE.INSTALL: 5
- OE.LOWEXP: 3
- OE.OSLOGIN: 6
- OE.PAM: 5
- OE.PHYSICAL: 3
- OE.PROBE: 3
- OE.SEL_PRO: 7
- T:
- T.AUD: 3
- T.COMPDATA: 3
- T.DATABASEFAIL: 4
- T.DATABSEFAIL: 1
- T.INSECURE: 4
- T.LOWEXP: 5
- T.NETSEC: 9
- T.SEL_PRO: 2
- T.UNAUTH: 5
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 18
- AES-128: 1
- AES-256: 2
- Rijndael:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 5
- SHA256: 2
- SHA384: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 40
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 7
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197: 2
- FIPS PUB 198-1: 2
- ISO:
- ISO/IEC 10116: 6
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 3
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- NIST SP 800-90A: 5
- RFC:
- RFC 2246: 1
- RFC 2818: 4
- RFC 4346: 1
- RFC 5246: 3
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 2
- these dependencies are addressed by the correct implementation of the standard protocols, which is out of scope of the evaluation of this TOE. Ultimately the validity of the key management for these protocols is: 1
- to a platform needing to communicate. The destruction of the TOE public/private key pair is also out of scope of the evaluation as once the keys are created they are data files controlled by operating systems: 1
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20201015095811+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /ModDate: D:20201015095846+09'00'
- /Producer: Adobe PDF Library 20.9.95
- /Title:
- pdf_file_size_bytes: 911294
- pdf_hyperlinks: http://csrc.nist.gov/archive/aes/katmct/katmct.htm
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
- /Author:
- /CreationDate: D:20081017125000+0500
- /CreationDate--Text: D:20081017125000+0500
- /Creator: Windows NT 4.0
- /ModDate: D:20081020144551-04'00'
- /Producer: 5D PDF Creator
- /Title: Microsoft Word - IBM_Netcool-OMNIbus-v7.1_with_Webtop-v2.0_EAL2_ASE_ST_v2.9_Sanitized IBM.doc
- pdf_file_size_bytes: 838811
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |