Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TASKalfa 6500i, TASKalfa 8000i, TASKalfa 6500iG, TASKalfa 8000iG, CS 6500i, CS 8000i, CD 1465, CD 1480, DC 2465, DC 2480 Data Security Kit (E) V1.00E
JISEC-CC-CRP-C0311
HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
ISCB-5-RPT-C055-CR-v1
name TASKalfa 6500i, TASKalfa 8000i, TASKalfa 6500iG, TASKalfa 8000iG, CS 6500i, CS 8000i, CD 1465, CD 1480, DC 2465, DC 2480 Data Security Kit (E) V1.00E HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme JP MY
not_valid_after 01.09.2016 18.03.2020
not_valid_before 31.08.2011 18.03.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0311_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055-CR-v1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0311_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%201-0.pdf
manufacturer KYOCERA MITA Corporation HP TippingPoint
manufacturer_web https://www.kyoceramita.com/ https://www.hp.com/
security_level EAL3 ALC_FLR.2, EAL3+
dgst 8f0bcc5a8da905aa 2cfde4db66d5e375
heuristics/cert_id JISEC-CC-CRP-C0311 ISCB-5-RPT-C055-CR-v1
heuristics/cpe_matches cpe:2.3:h:kyocera:taskalfa_6500i:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_8000i:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 1.00 3.7.2
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0311
  • certification_date: 01.08.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0311_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 6500i, TASKalfa 8000i - TASKalfa 6500iG, TASKalfa 8000iG - CS 6500i, CS 8000i - CD 1465, CD 1480 - DC 2465, DC 2480 This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: TASKalfa 6500i, TASKalfa 8000i, TASKalfa 6500iG, TASKalfa 8000iG, CS 6500i, CS 8000i, CD 1465, CD 1480, DC 2465, DC 2480 Data Security Kit (E)
    • product_type: Data protection function in digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0311_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0311_est.pdf
    • toe_version: V1.00E
    • vendor: KYOCERA MITA Corporation
  • expiration_date: 01.09.2016
  • supplier: KYOCERA MITA Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0311_it0329.html
  • toe_overseas_name: TASKalfa 6500i, TASKalfa 8000i, TASKalfa 6500iG, TASKalfa 8000iG, CS 6500i, CS 8000i, CD 1465, CD 1480, DC 2465, DC 2480 Data Security Kit (E) V1.00E
  • cert_no: 2015-001-C055
  • certification_date: 18.03.2015
  • developer: Trend Micro TippingPoint
  • enhanced:
    • assurance_level: EAL3+ALC_FLR.2
    • category: Network and Network-Related Devices and Systems
    • cert_id: C055
    • certification_date: 18.03.2015
    • developer: Freddy MercadoGlobal Compliance EngineerTrend Micro - TippingPointTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 – USA URL:http://www.trendmicro.com/
    • expiration_date: 18.03.2020
    • mutual_recognition: CCRA
    • product: Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/ISCB-5-RPT-C055-CR-v1.pdf
    • scope: The TOE is a hardware and software appliance that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols. The primary function of the TOE is to protect networks from intrusion attempts by scanning network traffic, detecting intrusion attempts, and reacting to detected intrusion attempts according to the filters and action sets with which the device is configured. The scope of evaluation covers major security features as follows: Security Audit: The TOE is able to generate auditable events for the basic level of audit. Identification and authentication: The TOE identifies and authenticates all administrative users of the TOE before granting them access to the TOE. Intrusion Detection and Prevention: The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters. Traffic Management: The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port. Security Management: The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and IDS data collection, analysis, and reaction. TSF Protection: The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored IDS data. Trusted Path: The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/TippingPointST%201-0.pdf
    • type: Hardware-based intrusion prevention systems
  • expiration_date: 18.03.2020
  • level: EAL3+ALC_FLR.2
  • product: Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/120
maintenance_updates

pdf_data/report_filename c0311_erpt.pdf ISCB-5-RPT-C055-CR-v1.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0311-01: 1
    • Certification No. C0311: 1
  • MY:
    • ISCB-5-RPT-C055-CR-v1: 28
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL2: 1
    • EAL3: 8
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SEL.1.1: 1
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4.1: 1
  • FMT:
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.CE: 1
    • A.LOCATION: 1
    • A.NETWORK: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
    • SSHv2: 4
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 2
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_metadata
  • /CreationDate: D:20111017145226+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20111017145323+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 239623
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
  • /Author: ISCB Department
  • /CreationDate: D:20150318142844+08'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: HP TippingPoint Intrusion Prevention System
  • /ModDate: D:20150318142844+08'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
  • /Title: C055 Certification Report
  • pdf_file_size_bytes: 733406
  • pdf_hyperlinks: mailto:[email protected], http://www.commoncriteriaportal.org/, http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
pdf_data/st_filename c0311_est.pdf TippingPointST 1-0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 5
  • EAL:
    • EAL 3: 5
    • EAL 3 augmented: 4
    • EAL3: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.3: 12
    • ADV_TDS: 1
    • ADV_TDS.2: 13
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.3: 13
    • ALC_CMS: 1
    • ALC_CMS.3: 6
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_DVS: 1
    • ALC_DVS.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 18
    • ALC_LCD: 1
    • ALC_LCD.1: 6
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 14
    • ASE_ECD: 1
    • ASE_ECD.1: 10
    • ASE_INT: 1
    • ASE_INT.1: 12
    • ASE_OBJ: 1
    • ASE_OBJ.2: 10
    • ASE_REQ: 1
    • ASE_REQ.2: 13
    • ASE_SPD: 1
    • ASE_SPD.1: 7
    • ASE_TSS: 1
    • ASE_TSS.1: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 5
    • ATE_DPT: 1
    • ATE_DPT.1: 5
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 5
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 2
    • FAU_STG.2: 9
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_IFC: 2
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF: 2
    • FDP_IFF.1: 12
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS: 2
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 1
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.3: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 6
    • FMT_SMF: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 3
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP: 2
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CE: 3
    • A.LOCATION: 4
    • A.NETWORK: 4
  • O:
    • O.ENCRYPT: 4
    • O.OVERWRITE: 5
  • OE:
    • OE.CE: 2
    • OE.LOCATION: 2
    • OE.NETWORK: 2
  • A:
    • A.ACCESS: 3
    • A.MANAGE: 3
    • A.NOEVIL: 2
    • A.PROTECT: 2
  • O:
    • O.ACCESS: 4
    • O.ADMIN: 4
    • O.ANALYZER: 6
    • O.AUDIT: 4
    • O.INTEGRITY: 3
    • O.RESPONSE: 7
    • O.REVIEW: 6
    • O.SENSOR: 7
    • O.STORAGE: 4
    • O.TRAFFIC: 3
  • OE:
    • OE.CONFID: 2
    • OE.INSTALL: 2
    • OE.PERSONNEL: 2
    • OE.PHYSICAL: 2
  • T:
    • T.ACCIDENT: 2
    • T.ACCOUNT: 2
    • T.COMPROMISE: 3
    • T.CONFIG: 2
    • T.INFLUX: 3
    • T.LOSSOF: 2
    • T.MALICE: 3
    • T.MISUSE: 3
    • T.PRIVILEGE: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • AES_competition:
    • AES:
      • AES: 3
    • RC:
      • RC2: 2
      • RC4: 2
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 2
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 9
    • SSHv2: 7
  • TLS:
    • SSL:
      • SSL: 5
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • FIPS:
    • FIPS 140-2: 2
  • X509:
    • X.509: 1
pdf_data/st_metadata
  • /Author: KYOCERA MITA Corporation
  • /CreationDate: D:20111007113158+09'00'
  • /Creator: CubePDF
  • /Keywords: Security Target
  • /ModDate: D:20111007113204+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title: TASKalfa 6500i, TASKalfa 8000i Data Security Kit (E) Overseas Version Security Target
  • pdf_file_size_bytes: 341288
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
  • /Author:
  • /CreationDate: D:20150318142909+08'00'
  • /Creator:
  • /Keywords:
  • /ModDate: D:20150318142917+08'00'
  • /Producer: Foxit Reader PDF Printer Version 7.0.1.831
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1322388
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different