Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
383-4-145
bizhub C3850 / bizhub C3350 PKI Card System Control Software A3GN30G0213999P
JISEC-CC-CRP-C0478
name VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1 bizhub C3850 / bizhub C3350 PKI Card System Control Software A3GN30G0213999P
category Operating Systems Other Devices and Systems
scheme CA JP
not_valid_after 15.05.2017 26.08.2020
not_valid_before 15.10.2010 26.08.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esx-v40-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0478_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esx-v40-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0478_est.pdf
manufacturer VMware Inc. KONICA MINOLTA, INC.
manufacturer_web https://www.vmware.com https://www.konicaminolta.com/index.html
security_level EAL4+, ALC_FLR.2 EAL3
dgst 9c60f1c7f9ea7348 c20b0db1415da04e
heuristics/cert_id 383-4-145 JISEC-CC-CRP-C0478
heuristics/cert_lab CANADA []
heuristics/cpe_matches {} cpe:2.3:h:konicaminolta:bizhub_c3850:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c3350:-:*:*:*:*:*:*:*
heuristics/extracted_sars AGD_OPE.1, ALC_DEL.1, AGD_PRE.1, ALC_CMC.4, AVA_VAN.3, ALC_CMS.4, ADV_FSP.4, ALC_DVS.1, ALC_TAT.1, ALC_LCD.1, ADV_ARC.1, ADV_IMP.1, ATE_DPT.1, ALC_FLR.2, ATE_IND.2, ADV_TDS.3, ATE_COV.2, ATE_FUN.1 AGD_OPE.1, ASE_ECD.1, ADV_TDS.2, ATE_DPT.1, ADV_FSP.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ALC_CMC.3, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_IND.2, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, AGD_PRE.1, ALC_CMS.3
heuristics/extracted_versions 4.0 -
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0478
  • certification_date: 01.08.2015
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0478_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as "MFP"), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Encryption Print Function The function that receives the encrypted print data and can print the print data only with a right IC card. - S/MIME Encryption Function The function to encrypt an image data when transmitting it by e-mail. - Digital Signature Function The function to add the digital signature by using the function of IC card when transmitting an image data by e-mail. - HDD Encryption Function The function to encrypt the image data written in HDD. - All Area Overwrite Deletion Function The function that deletes data area including the image data of HDD completely by deletion method compliant with various overwrite deletion standards.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: bizhub C3850 / bizhub C3350 PKI Card System Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0478_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0478_est.pdf
    • toe_version: A3GN30G0213999P
    • vendor: KONICA MINOLTA,INC.
  • expiration_date: 01.09.2020
  • supplier: KONICA MINOLTA,INC.
  • toe_japan_name: bizhub C3850 / bizhub C3350 PKI Card System Control SoftwareA3GN30G0213999P
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0478_it4506.html
  • toe_overseas_name: bizhub C3850 / bizhub C3850 / bizhub C3350 PKI Card System Control SoftwareA3GN30G0213999P
maintenance_updates
pdf_data/report_filename vmware-esx-v40-cert-eng.pdf c0478_erpt.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-145-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-145-CR: 1
  • JP:
    • CRP-C0478-01: 1
    • Certification No. C0478: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 4+: 3
    • EAL4+: 1
  • EAL:
    • EAL3: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.IC-CARD: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
  • T:
    • T.ACCESS-HDD: 2
    • T.DISCARD-MFP: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 180-3: 1
    • FIPS 186-2: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • through the network. The TOE provides the protection function against the disclosure of the highly confidential documents stored in the MFP. Note that the TOE does not possess the audit log function. Moreover, against: 1
pdf_data/report_metadata
  • /AM_ACPP_Date: [dd month yyyy]
  • /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
  • /AM_ACPP_Version: [AM_AMCPP_Version]
  • /AM_IAR_Date: [dd month yyyy]
  • /AM_IAR_Doc#: [AM_IAR_Doc#]
  • /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
  • /AM_IAR_Version: [AM_IAR_Version]
  • /AM_ST Date: [dd month yyyy]
  • /AM_ST Title: [AM_ST Title]
  • /AM_ST Version: [AM_ST Version]
  • /AM_TOE: [AM_TOE]
  • /AM_TOE Short: [AM_TOE Short]
  • /AM_TOE Version: [AM_TOE Version]
  • /Author: sjackson
  • /CC Version: 3.1 Revision 3
  • /CC date: July 2009
  • /CEM Version: 3.1 Revision 3
  • /CEM date: July 2009
  • /CR_Date: 2 September 2010
  • /CR_Version: 0.3
  • /Client City: Palo Alto
  • /Client Country: USA
  • /Client Full Name: VMware, Inc.
  • /Client Postal Code: 94304
  • /Client Short Name: VMware
  • /Client State: CA
  • /Client Street: 3401 Hillview Ave.
  • /Company:
  • /CreationDate: D:20101027133109-04'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Developer Long Name: VMware, Inc.
  • /Developer Short Name: VMware
  • /EAL Level: 4+
  • /EAL Level Base: 4
  • /EAL Level Text: 4 augmented
  • /EAL Long: EAL 4 Augmented
  • /EAL Short: EAL 4+
  • /ER Document Date: 9 September 2009
  • /ER Version: Version 1.0
  • /ETPlan_Doc#: 1651-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: 0.1
  • /ETPlan_date: 3 August 2010
  • /ETProcRes_Date: September 2010
  • /ETProcRes_Doc#: 1651-000-D005
  • /ETProcRes_Title: Evaluation Test Results
  • /ETProcRes_Version: 0.1
  • /ETProc_Date: 13 August 2010
  • /ETProc_Doc#: 1651-000-D004
  • /ETProc_Title: Evaluation Test Procedures
  • /ETProc_Version: 0.2
  • /ETReport_Date: 1 September 2010
  • /ETReport_Doc#: 1651-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_TitleShort: ETR
  • /ETReport_Version: 1.4
  • /EWP_Date: 5 July 2010
  • /EWP_Doc#: 1651-000-D001
  • /EWP_Title: Evaluation Work Plan for EAL 4+ Common Criteria Evaluation of VMware Incorporated ESX 4.0 and vCenter 4.0, Document No. 1651-000-D001, Version 1.3, 5 July 2010, Common Criteria Evaluation Number: 383-4-145
  • /EWP_Version: 1.3
  • /Eval number: 383-4-145
  • /Eval_End_Date: 22 October 2010
  • /Eval_Start_Date: 1 December 2009
  • /Keywords:
  • /LeadEvaluator: K. Braun
  • /LeadEvaluatorInitials: KB
  • /Manager:
  • /ModDate: D:20101027133206-04'00'
  • /Producer: Acrobat Distiller 9.2.0 (Windows)
  • /ProjectManager: M. Gauvreau
  • /ProjectManagerInitials: MG
  • /ProjectNumber: 1651
  • /ST_Date: 31 August 2010
  • /ST_Title: VMware, Inc. VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1 Security Target
  • /ST_Version: 1.2
  • /SVC_Date: 5 August 2009
  • /SVC_Doc#: 1610-000-D006
  • /SVC_Title: Site Visit Checklist
  • /SVC_Version: 1.0
  • /SVR_Date: 5 August 2009
  • /SVR_Doc#: 1610-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: 1.0
  • /SV_City: Palo Alto
  • /Security Classification: EWA-Canada & VMware Proprietary
  • /SourceModified: D:20101027170032
  • /Sponsor: VMware, Inc.
  • /Sponsor City: Palo Alto
  • /Sponsor Country: USA
  • /Sponsor Postal Code: 94304
  • /Sponsor State: CA
  • /Sponsor Street: 3401 Hillview Ave.
  • /Subject:
  • /TOE: VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
  • /TOE Short-NoTM: ESX and vCenter Server 4.0 Update 1
  • /TOE Version: 4.0 Update 1
  • /TOE with version: VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
  • /TOE-NoTM: VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
  • /Title: EAL X+ Evaluation of [Developer Long Name]
  • /_AdHocReviewCycleID: 1430796098
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Reade, Rick A.
  • /_EmailSubject: VMWare CPL post request ...rick
  • /_ReviewingToolsShownOnce:
  • pdf_file_size_bytes: 95655
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /CreationDate: D:20161018111125+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20161018111202+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 375619
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 34
pdf_data/st_filename vmware-esx-v40-sec-eng.pdf c0478_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
    • EAL4+: 3
  • EAL:
    • EAL3: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 2
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 21
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 5
    • FDP_IFC.2: 7
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_UAU.1: 3
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 26
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 26
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 27
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_ITC.1: 6
    • FPT_ITC.1.1: 1
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 3
  • FAU:
    • FAU_GEN: 2
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_COP: 1
    • FCS_COP.1: 15
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC: 2
    • FDP_ITC.1: 3
    • FDP_ITC.2: 1
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_SOS.1: 16
    • FIA_SOS.1.1: 3
    • FIA_SSL.3: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 2
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 18
    • FIA_UID.2.1: 3
  • FMT:
    • FMT_MOF.1: 18
    • FMT_MOF.1.1: 2
    • FMT_MTD.1: 19
    • FMT_MTD.1.1: 3
    • FMT_SMF: 5
    • FMT_SMF.1: 28
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 43
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NOEVIL: 2
    • A.PHYSCL: 3
  • O:
    • O.ACCESS: 7
    • O.ADMIN: 6
    • O.AUDIT: 6
    • O.CONTINUITY: 4
    • O.IDAUTH: 8
    • O.SECURE: 4
    • O.VLAN: 4
    • O.VM: 4
    • O.VSWITCH: 4
  • OE:
    • OE.IDAUTH: 7
    • OE.SEP: 7
    • OE.TIME: 5
  • T:
    • T.AVAILABILITY: 2
    • T.COMINT: 2
    • T.PRIVIL: 2
    • T.VIRTUAL_NETWORK: 2
    • T.VM: 2
  • A:
    • A.ADMIN: 3
    • A.IC-CARD: 3
    • A.NETWORK: 3
    • A.SECRET: 2
    • A.SERVICE: 2
  • O:
    • O.CRYPTO-HDD: 4
    • O.DECRYPT-PRINT: 4
    • O.MAIL-: 1
    • O.MAIL-CRYPTO: 4
    • O.MAIL-SIGN: 4
    • O.OVERWRITE-ALL: 5
    • O.PKI-CAPABILITY: 9
  • OE:
    • OE.ADMIN: 3
    • OE.CARD-USER: 3
    • OE.DRIVER: 3
    • OE.IC-CARD: 6
    • OE.NETWORK: 3
    • OE.SECRET: 3
    • OE.SERVICE: 3
    • OE.SETTING: 1
    • OE.SETTING-SECURITY: 3
    • OE.SIGN: 3
  • T:
    • T.ACCESS-HDD: 3
    • T.DISCARD-MFP: 2
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 2
  • Microsoft:
    • Microsoft: 12
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • 3DES: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
  • SHA:
    • SHA2:
      • SHA-256: 9
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 10
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-2: 3
    • FIPS 186-2: 6
    • FIPS PUB 197: 7
    • FIPS180-3: 3
    • FIPS186-2: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • that encryption print for a printer data transmitted to mfp from client PC among the highly confidential document transmitted between mfp and client PC. Also, it provides a function of protecting the scanned image: 1
pdf_data/st_metadata
  • /Author: e09667
  • /CreationDate: D:20161014100604+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20161014100604+09'00'
  • /Producer: Acrobat Distiller 10.1.15 (Windows)
  • /Title: Microsoft Word - 【C0478】英文ASE_Venus_PKI-1.09-150724.doc
  • pdf_file_size_bytes: 417262
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 53
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different