name |
Data Security Kit (E) Software Type III V1.00E |
Oracle VM Server for SPARC 3.6 and Oracle Solaris 11.4 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
JP |
CA |
status |
archived |
active |
not_valid_after |
01.10.2015 |
25.01.2029 |
not_valid_before |
28.09.2010 |
25.01.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/614-LSS%20CT%20v1.0.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0271_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/614-LSS%20CR%20v1.1.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0271_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/614-LSS%20ST%20v2.4.pdf |
manufacturer |
KYOCERA MITA Corporation |
Oracle Corporation |
manufacturer_web |
https://www.kyoceramita.com/ |
https://www.oracle.com |
security_level |
EAL3 |
{} |
dgst |
9819cf2673cbe519 |
8399bd70f5b41a1f |
heuristics/cert_id |
JISEC-CC-CRP-C0271 |
614-LSS |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:o:oracle:solaris:11.4:*:*:*:*:*:*:*, cpe:2.3:o:oracle:vm_server:3.6:*:*:*:*:*:sparc:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2019-2787, CVE-2019-2820, CVE-2019-2838, CVE-2020-2571, CVE-2019-2807, CVE-2019-2788, CVE-2019-2844, CVE-2019-2804, CVE-2017-3623, CVE-2016-2334 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
1.00 |
11.4, 3.6 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0271
- certification_date: 01.09.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0271_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 300i - TASKalfa 300iG - CS 300i - CD 1430/DC 2430 This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Data Security Kit (E) Software Type III
- product_type: Data protection function in digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0271_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0271_est.pdf
- toe_version: V1.00E
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.10.2015
- supplier: KYOCERA MITA Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0271_it9268.html
- toe_overseas_name: Data Security Kit (E) Software Type III V1.00E
|
- certification_date: 25.01.2024
- level: PP_BASE_VIRTUALIZATION_v1.1; MOD_SV_V1.1; PKG_SSH_V1.0; PKG_TLS_V1.1
- product: Oracle VM Server for SPARC 3.6 and Oracle Solaris 11.4
- vendor: Oracle Corporation
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
c40ae795865a0dba, ed9c9d74c3710878, e80eb1652a0e6f6a, deb6fe6c7a4a2306 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_SV_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_VIRTUALIZATION_BASE_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf |
pdf_data/cert_filename |
|
614-LSS CT v1.0.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate: D:20240126125657-05'00'
- /Creator:
- /Keywords:
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
- /ModDate: D:20240126125715-05'00'
- /Producer: Foxit PDF Editor Printer Version 13.0.0.15725
- /Subject:
- /Title:
- pdf_file_size_bytes: 367241
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0271_erpt.pdf |
614-LSS CR v1.1.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0271-01: 1
- Certification No. C0271: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CE: 1
- A.LOCATION: 1
- A.NETWORK: 2
- T:
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20101215173729+09'00'
- /ModDate: D:20101215173729+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 183890
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
|
pdf_data/st_filename |
c0271_est.pdf |
614-LSS ST v2.4.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_TSU_EXT.1: 3
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
|
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 5
- FCS_CKM_EXT.4.1: 1
- FCS_CKM_EXT.4.2: 1
- FCS_COP: 16
- FCS_COP.1: 4
- FCS_ENT_EXT.1: 5
- FCS_ENT_EXT.1.1: 1
- FCS_ENT_EXT.1.2: 1
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHS_EXT.1: 8
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 1
- FCS_SSH_EXT.1: 6
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_SSH_EXT.1.8: 1
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSS_EXT.1: 4
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.2: 1
- FCS_TLS_EXT.1: 3
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_HBI_EXT.1: 6
- FDP_HBI_EXT.1.1: 1
- FDP_PPR_EXT.1: 5
- FDP_PPR_EXT.1.1: 1
- FDP_PPR_EXT.1.2: 1
- FDP_PPR_EXT.1.3: 1
- FDP_RIP_EXT.1: 5
- FDP_RIP_EXT.1.1: 1
- FDP_RIP_EXT.2: 5
- FDP_RIP_EXT.2.1: 1
- FDP_VMS_EXT.1: 5
- FDP_VMS_EXT.1.1: 3
- FDP_VMS_EXT.1.2: 1
- FDP_VMS_EXT.1.3: 1
- FDP_VMS_EXT.1.4: 1
- FDP_VNC_EXT.1: 5
- FDP_VNC_EXT.1.1: 1
- FDP_VNC_EXT.1.2: 1
- FIA:
- FIA_AFL_EXT.1: 5
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FMT:
- FMT_MOF_EXT: 1
- FMT_MOF_EXT.1: 6
- FMT_MOF_EXT.1.1: 2
- FMT_MOF_EXT.1.2: 1
- FMT_SMO_EXT.1: 5
- FMT_SMO_EXT.1.1: 1
- FPT:
- FPT_DVD_EXT.1: 5
- FPT_DVD_EXT.1.1: 1
- FPT_EEM_EXT.1: 5
- FPT_EEM_EXT.1.1: 1
- FPT_HAS_EXT.1: 5
- FPT_HAS_EXT.1.1: 1
- FPT_HAS_EXT.1.2: 1
- FPT_HCL_EXT.1: 5
- FPT_HCL_EXT.1.1: 1
- FPT_RDM_EXT.1: 5
- FPT_RDM_EXT.1.1: 1
- FPT_RDM_EXT.1.2: 1
- FPT_TUD: 1
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_VDP_EXT.1: 5
- FPT_VDP_EXT.1.1: 1
- FPT_VDP_EXT.1.2: 1
- FPT_VIV_EXT.1: 5
- FPT_VIV_EXT.1.1: 1
- FPT_VIV_EXT.1.2: 1
- FTA:
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 7
- FTP_ITC_EXT.1.1: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
- FTP_UIF_EXT.1: 5
- FTP_UIF_EXT.1.1: 1
- FTP_UIF_EXT.2: 5
- FTP_UIF_EXT.2.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CE: 4
- A.LOCATION: 5
- A.NETWORK: 5
- O:
- OE:
- OE.CE: 3
- OE.LOCATION: 3
- OE.NETWORK: 3
- T:
|
- A:
- A.NON_MALICIOUS: 1
- A.NON_MALICIOUS_: 1
- A.NON_MALICIOUS_USER: 2
- A.PHYSICAL: 4
- A.PLATFORM: 1
- A.PLATFORM_: 1
- A.TRUSTED_ADMIN: 2
- O:
- O.AUDIT: 2
- O.CORRECTLY_: 1
- O.CORRECTLY_APPLIED: 1
- O.CORRECTLY_APPLIED_: 1
- O.DOMAIN_: 1
- O.DOMAIN_INTEGRITY: 1
- O.MANAGEMENT_: 1
- O.MANAGEMENT_ACCESS: 2
- O.PATCHED_: 1
- O.PATCHED_SOFTWARE: 2
- O.PLATFORM_: 1
- O.PLATFORM_INTEGRITY: 1
- O.PLATORM_INTEGRITY: 1
- O.RESOURCE_: 1
- O.RESOURCE_ALLOCATION: 2
- O.VMM_INTEGRITY: 6
- O.VM_ENTROPY: 3
- O.VM_ISOLATION: 5
- OE:
- OE.CONFIG: 3
- OE.NON_MALICIOUS: 1
- OE.NON_MALICIOUS_USER: 2
- OE.PHYSICAL: 4
- OE.TRUSTED_ADMIN: 3
- T:
- T.DATA_LEAKAGE: 4
- T.DENIAL_OF: 1
- T.DENIAL_OF_: 1
- T.DENIAL_OF_SERVICE: 2
- T.MISCONFIGURATION: 2
- T.PLATFORM: 1
- T.PLATFORM_: 1
- T.UNAUTHORIZED: 3
- T.UNAUTHORIZED_: 3
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_MODIFICATION: 2
- T.UNPATCHED: 1
- T.UNPATCHED_: 1
- T.UNPATCHED_SOFTWARE: 2
- T.USER_ERROR: 2
- T.VMM_: 1
- T.VMM_COMPROMISE: 3
- T.WEAK_CRYPTO: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 3
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 1
- DHE: 2
- Diffie-Hellman: 4
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- SSH:
- TLS:
- TLS:
- TLS: 35
- TLS 1.1: 1
- TLS 1.2: 1
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS PUB 180-4: 4
- FIPS PUB 186-4: 8
- FIPS PUB 197: 2
- FIPS PUB 198-1: 2
- ISO:
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38F: 1
- NIST SP 800-56A: 1
- NIST SP 800-57: 3
- SP 800-38C: 1
- SP 800-56A: 1
- RFC:
- RFC 3256: 1
- RFC 3526: 1
- RFC 4252: 3
- RFC 4253: 8
- RFC 4344: 2
- RFC 5246: 7
- RFC 5280: 3
- RFC 5288: 4
- RFC 5647: 2
- RFC 5656: 4
- RFC 6125: 1
- RFC 6668: 2
- RFC 8017: 1
- RFC 8268: 1
- RFC8603: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: KYOCERA MITA Corporation
- /CreationDate: D:20101129105537+09'00'
- /Creator: CubePDF
- /ModDate: D:20101129105537+09'00'
- /Producer: CubePDF
- /Title: Data Security Kit (E) Software Type III Overseas Security Target
- pdf_file_size_bytes: 326068
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: Tim Condly
- /CreationDate: D:20240305120737-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20240305120737-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: Oracle VM Server for SPARC 3.6 and Oracle Solaris 11.4
- /Title: Oracle
- pdf_file_size_bytes: 732246
- pdf_hyperlinks: https://www.oracle.com/security-alerts/, https://www.oracle.com/corporate/security-practices/assurance/vulnerability/reporting.html, https://sun4v.github.io/downloads/hypervisor-api-3.0draft7.pdf, http://www.lightshipsec.com/, https://www.oracle.com/corporate/security-practices/assurance/vulnerability/security-fixing.html, https://docs.oracle.com/cd/E37838_01/, https://docs.oracle.com/cd/E93612_01/, https://docs.oracle.com/en/servers/sparc/t8/index.html, https://edelivery.oracle.com/, https://docs.oracle.com/cd/E93612_01/html/E93617/rootdomainwithpcibuses.html, https://www.ietf.org/rfc/rfc4252.html#section-8
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |