name |
Data Security Kit (E) Software Type III V1.00E |
Aruba 6000 and Aruba 800 Series Mobility Controller Running ArubaOS Version 2.4.8.14-FIPS |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
UK |
status |
archived |
archived |
not_valid_after |
01.10.2015 |
23.08.2013 |
not_valid_before |
28.09.2010 |
27.06.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0271_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp246.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0271_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/aruba_st.pdf |
manufacturer |
KYOCERA MITA Corporation |
Aruba Networks |
manufacturer_web |
https://www.kyoceramita.com/ |
https://www.arubanetworks.com |
security_level |
EAL3 |
EAL2+, ACM_SCP.1, ALC_FLR.2, AVA_MSU.1 |
dgst |
9819cf2673cbe519 |
cc27a9b921651b6e |
heuristics/cert_id |
JISEC-CC-CRP-C0271 |
CRP246 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, ADV_SPM.1, ATE_COV.1, AGD_ADM.1, AVA_MSU.1, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2 |
heuristics/extracted_versions |
1.00 |
2.4.8.14 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0271
- certification_date: 01.09.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0271_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 300i - TASKalfa 300iG - CS 300i - CD 1430/DC 2430 This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Data Security Kit (E) Software Type III
- product_type: Data protection function in digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0271_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0271_est.pdf
- toe_version: V1.00E
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.10.2015
- supplier: KYOCERA MITA Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0271_it9268.html
- toe_overseas_name: Data Security Kit (E) Software Type III V1.00E
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
a91e9c889e6f3e47 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_as_br_v1.0.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0271_erpt.pdf |
crp246.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0271-01: 1
- Certification No. C0271: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 2
- EAL2 augmented: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CE: 1
- A.LOCATION: 1
- A.NETWORK: 2
- T:
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20101215173729+09'00'
- /ModDate: D:20101215173729+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 183890
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /Author: CESG
- /CreationDate: D:20080630155350+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20120106115421Z
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Subject: Aruba 6000 and Aruba 800 Series Mobility Controller Running ArubaOS Version 2.4.8.14-FIPS
- /Title: CPR246
- pdf_file_size_bytes: 810545
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
c0271_est.pdf |
aruba_st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_CAP.2: 2
- ACM_SCP.1: 6
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 6
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
|
- FAU:
- FAU_ARP.1: 12
- FAU_ARP.1.1: 1
- FAU_GEN: 20
- FAU_GEN.1: 10
- FAU_GEN.2: 12
- FAU_SAA.1: 3
- FAU_SAA.3: 11
- FAU_SAA.3.1: 1
- FAU_SAA.3.2: 1
- FAU_SAA.3.3: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP.1: 4
- FCS_CKM: 65
- FCS_CKM.1: 12
- FCS_CKM.2: 5
- FCS_CKM.4: 10
- FCS_CKM_EXP.2: 18
- FCS_CKM_EXP.2.1: 1
- FCS_COP: 28
- FCS_COP.1: 8
- FCS_COP_EXP.1: 4
- FCS_COP_EXP.2: 4
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 7
- FDP_ITC.2: 5
- FDP_PUD_EXP: 1
- FDP_PUD_EXP.1: 13
- FDP_PUD_EXP.1.1: 1
- FDP_RIP: 15
- FDP_RIP.1: 2
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 27
- FIA_ATD.1: 4
- FIA_UAU: 11
- FIA_UAU.1: 3
- FIA_UAU_EXP: 19
- FIA_UAU_EXP.5: 4
- FIA_UID: 19
- FIA_UID.1: 8
- FIA_UID.2: 3
- FIA_USB.1: 10
- FIA_USB.1.1: 3
- FMT:
- FMT_MOF: 49
- FMT_MOF.1: 6
- FMT_MSA.1: 2
- FMT_MSA.2: 24
- FMT_MTD: 41
- FMT_MTD.1: 6
- FMT_SMF: 55
- FMT_SMF.1: 16
- FMT_SMR: 19
- FMT_SMR.1: 16
- FPT:
- FPT_RVM: 19
- FPT_RVM.1: 2
- FPT_SEP: 19
- FPT_SEP.1: 4
- FPT_STM: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_STM_EXP: 2
- FPT_STM_EXP.1: 10
- FPT_STM_EXP.1.1: 1
- FPT_TRP: 2
- FPT_TST.1: 2
- FPT_TST_EXP.1: 9
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 12
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTA:
- FTA_SSL: 3
- FTA_SSL.3: 15
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXP: 21
- FTP_ITC_EXP.1: 6
- FTP_TRP: 38
- FTP_TRP.1: 14
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CE: 4
- A.LOCATION: 5
- A.NETWORK: 5
- O:
- OE:
- OE.CE: 3
- OE.LOCATION: 3
- OE.NETWORK: 3
- T:
|
- A:
- A.ADMIN: 3
- A.BYPASS: 3
- A.LOCATE: 3
- A.NO_EVIL: 1
- A.NO_GENERAL_PURPOSE: 1
- A.NO_GENRL: 3
- A.PHYSICAL: 1
- A.TOE_NO_BYPASS: 1
- O:
- O.ADMIN_GUIDANCE: 2
- O.AUDIT_GEN: 3
- O.AUDIT_GENERATION: 1
- O.BANNER: 4
- O.BYPASS: 1
- O.CONFIGURATION: 1
- O.CONFIGURATION_: 1
- O.CORRECT: 6
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTO: 7
- O.CRYPTOGRAPHY: 1
- O.CRYPTOGRAPHY_VALIDATED: 1
- O.DISPLAY_BANNER: 1
- O.DOCUMENTED_: 2
- O.INTRUSION: 8
- O.MANAGE: 11
- O.MEDIATE: 1
- O.PARTIAL_: 1
- O.PARTIAL_FUNCTIONAL_TESTING: 1
- O.PROTECT_COMMS: 1
- O.RESIDUAL: 8
- O.RESIDUAL_: 1
- O.SELF_PROTECT: 8
- O.SELF_PROTECTION: 1
- O.TIME: 3
- O.TIME_STAMPS: 1
- O.TOE_ACCESS: 11
- O.TRAFFIC: 8
- O.VULNERABILITY_: 2
- OE:
- OE.ADMIN: 6
- OE.AUDIT_PROTECT: 6
- OE.AUDIT_PROTECTION: 1
- OE.AUDIT_REVIEW: 4
- OE.BYPASS: 5
- OE.MANAGE: 10
- OE.NO_EVIL: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_GENRL: 3
- OE.PHYSICAL: 1
- OE.PROTECT: 2
- OE.PROTECT_COMMS: 3
- OE.PROTECT_MGMT_COMMS: 1
- OE.RESIDUAL: 9
- OE.RESIDUAL_INFORMATION: 1
- OE.SELF_PROTECT: 5
- OE.SELF_PROTECTION: 1
- OE.TIME: 6
- OE.TIME_STAMPS: 1
- OE.TOE_ACCESS: 6
- OE.TOE_NO_BYPASS: 1
- T:
- T.ACCESS: 3
- T.ACCIDENTAL_ADMIN_ERROR: 1
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 1
- T.ATTACK: 3
- T.CRYPTO: 3
- T.ERROR: 3
- T.IMPERSON: 3
- T.INTERNAL: 3
- T.MASQUERADE: 1
- T.POOR_DESIGN: 2
- T.POOR_IMPLEMENTATION: 2
- T.POOR_TEST: 2
- T.RESIDUAL: 3
- T.RESIDUAL_DATA: 1
- T.SESSION: 3
- T.TSF_COMPROMISE: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTH_ADMIN_ACCESS: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 140-2: 61
- FIPS PUB 180-2: 2
- FIPS PUB 197: 2
- FIPS PUB 198: 2
- FIPS PUB 46-3: 2
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2631: 4
- RFC 2716: 1
- RFC 2865: 1
- RFC 2866: 1
- RFC 3748: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: KYOCERA MITA Corporation
- /CreationDate: D:20101129105537+09'00'
- /Creator: CubePDF
- /ModDate: D:20101129105537+09'00'
- /Producer: CubePDF
- /Title: Data Security Kit (E) Software Type III Overseas Security Target
- pdf_file_size_bytes: 326068
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: CESG
- /CreationDate: D:20080529101401Z
- /Creator: PrimoPDF http://www.primopdf.com
- /ModDate: D:20080704101321+01'00'
- /Producer: PrimoPDF
- /Subject: Aruba 6000 and Aruba 800 Series Mobility Controller, version 1.8, May 2008
- /Title: Aruba 6000 and Aruba 800 Series Mobility Controller Security Target
- pdf_file_size_bytes: 791968
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 101
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |