name |
Japan : bizhub PRESS C8000 Image Control Program, Overseas : bizhub PRESS C8000 Image Control Program Version: A1RF0Y0-00I1-G00-10 |
Crypto Library V2.6 on P5CC008V1A and P5CC012V1A |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
archived |
not_valid_after |
02.12.2015 |
07.06.2017 |
not_valid_before |
16.11.2010 |
06.07.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0279_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-11-31802-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0279_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20P5_CL_C14_ST_Lite_CC012%20v1.1.pdf |
manufacturer |
KONICA MINOLTA, INC. |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.konicaminolta.com/index.html |
https://www.nxp.com |
security_level |
EAL3 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
9e9fa0dc76302277 |
f977d70e1882b3a2 |
heuristics/cert_id |
JISEC-CC-CRP-C0279 |
NSCIB-CC-11-31802-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_DPT.1, ATE_COV.2, AGD_OPE.1, ALC_DEL.1, ASE_INT.1, AVA_VAN.2, ALC_DVS.1, ADV_ARC.1, ASE_ECD.1, ALC_LCD.1, ASE_REQ.2, ASE_OBJ.2, ATE_IND.2, ATE_FUN.1, ALC_CMS.3, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ADV_TDS.2, ADV_FSP.3, ASE_CCL.1, ALC_CMC.3 |
ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ADV_FSP.5, AVA_VAN.5, ASE_ECD.1, ATE_DPT.3, ALC_LCD.1, ASE_REQ.2, ADV_IMP.1, ALC_DVS.2, ASE_OBJ.2, ATE_IND.2, ATE_FUN.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.5, ADV_INT.2, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1 |
heuristics/extracted_versions |
10 |
2.6 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0771-2011 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0771-2011 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0279
- certification_date: 01.11.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0279_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE, that is installed with digital MFP manufactured by Konica Minolta Business Technologies, Inc., is a software product that provide the function of copier, printer and scanner. It prevents document data in HDD from disclosing during the abuse of functions such as copier, printer and scanner. TOE security functionality TOE provides the following security functions. - Identification and authentication function - Access control function - Audit function - Management function - CE function - Test function of HDD lock system
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japan : bizhub PRESS C8000 Image Control Program Overseas : bizhub PRESS C8000 Image Control Program
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0279_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0279_est.pdf
- toe_version: A1RF0Y0-00I1-G00-10
- vendor: KONICA MINOLTA, INC.
- expiration_date: 01.12.2015
- supplier: KONICA MINOLTA, INC. (Former: Konica Minolta Business Technologies, Inc.)
- toe_japan_name: bizhub PRESS C8000 Image Control Program A1RF0Y0-00I1-G00-10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0279_it0288.html
- toe_overseas_name: bizhub PRESS C8000 Image Control Program A1RF0Y0-00I1-G00-10
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0279_erpt.pdf |
Certification Report NSCIB-CC-11-31802-CR.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-11-31802-CR
- cert_item:
- cert_lab: Brightsight
- developer: NXP Semiconductors Germany GmbH
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0279-01: 1
- Certification No. C0279: 1
|
- DE:
- BSI-DSZ-CC-0771: 1
- BSI-DSZ-CC-0771-2011: 2
- NL:
- NSCIB-CC-11-31802: 1
- NSCIB-CC-11-31802-CR: 14
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 2
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 3
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.ACCESS: 4
- T.IMPADMIN: 4
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 9
- NXP Semiconductors: 5
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- Side channel: 1
- timing attacks: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20140129145204+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140129145241+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 312427
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
|
pdf_data/st_filename |
c0279_est.pdf |
[ST] P5_CL_C14_ST_Lite_CC012 v1.1.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 3
- EAL4: 1
- EAL4+: 2
- EAL5: 29
- EAL5 augmented: 1
- EAL5+: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 2
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 2
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_ACC.1: 1
- FIA_AFL.1: 12
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS.1: 45
- FIA_SOS.1.1: 4
- FIA_UAU.1: 5
- FIA_UAU.2: 37
- FIA_UAU.2.1: 3
- FIA_UAU.6: 1
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID.1: 15
- FIA_UID.2: 29
- FIA_UID.2.1: 3
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 16
- FMT_MOF.1.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD.1: 67
- FMT_MTD.1.1: 7
- FMT_SMF.1: 39
- FMT_SMF.1.1: 1
- FMT_SMR.1: 59
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 3
- FPT:
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TEE.1: 9
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 23
- FCS_COP.1.1: 5
- FCS_RNG.1: 12
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 6
- FDP_ACF.1: 5
- FDP_IFC.1: 20
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_ITT: 1
- FDP_ITT.1: 25
- FDP_ITT.1.1: 1
- FDP_RIP: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FMT_MSA.1: 3
- FMT_MSA.3: 2
- FMT_SMF.1: 4
- FPT:
- FPT_FLS.1: 17
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 29
- FPT_ITT.1.1: 1
- FPT_PHP.3: 7
- FRU:
|
pdf_data/st_keywords/cc_claims |
- O:
- O.ACCESS: 7
- O.AUDIT: 11
- O.CHECK-HDD: 6
- O.HDD-LOCK: 1
- O.IA: 12
- O.MANAGE: 12
- OE:
- OE.ADMIN: 3
- OE.HDD: 5
- OE.NET: 3
- OE.PLACE: 4
- OE.SECOND: 3
- OE.SECRET: 3
- OE.SERVICE: 3
- OE.SESSION: 6
- OE.SETTING-SECURITY: 3
- T:
- T.ACCESS: 2
- T.ACESS: 1
- T.HDDACESS: 2
- T.IMPADMIN: 2
|
- O:
- O.COPY: 6
- O.CUST_RECONFIG: 3
- O.MEM_ACCESS: 5
- O.MF_FW: 4
- O.REUSE: 6
- O.RND: 12
- O.RSA: 5
- O.SFR_ACCESS: 4
- O.SHA: 5
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 66
- NXP Semiconductors: 27
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 13
- TDES: 3
- Triple-DES: 18
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 22
- Malfunction: 13
- fault induction: 1
- fault injection: 1
- malfunction: 3
- SCA:
- DPA: 12
- Leak-Inherent: 12
- Physical Probing: 2
- SPA: 15
- Timing attacks: 3
- side channel: 19
- side-channel: 11
- timing attacks: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- FIPS:
- FIPS 180-2: 2
- FIPS PUB 180-2: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 2
- FIPS PUB 81: 3
- ISO:
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- issued from the panel of MFP body and through the network. To prevent leakage of the highly confidential document data stored in the MFP, TOE, using the MFP, provides the function that identifies and authenticates: 1
|
|
pdf_data/st_metadata |
- /Author: e06930
- /CreationDate: D:2014010717434009'00'
- /Creator: PrimoPDF http://www.primopdf.com/
- /ModDate: D:2014010717434009'00'
- /Producer: PrimoPDF
- /Title: (Microsoft Word - \201yC0279\201z\214\366\212J\227p\211p\225\266ST_Renoir_20131021_\203R\203\201\203\223\203g_ - \203R\203s\201[.doc)
- pdf_file_size_bytes: 742682
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /Alternative descriptive title: Security Target Lite
- /Author: Andreas Kühn, Markus Hinkelmann
- /CertificationID: NSCIB-CC-11-31802
- /Chip family: SmartMX
- /Chip type: P5CC008V1A and P5CC012V1A
- /Comments:
- /Company: NXP Semiconductors / Brightsight
- /Copyright date: 2012
- /CreationDate: D:20120704150017+02'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Descriptive title: Security Target Lite
- /Division: NXP Semiconductors
- /Keywords: Crypto Library, SmartMX, P5CC008V1A, P5CC012V1A, NXP, EAL5+, AVA_VAN.5, Security Target, AES, DES, RSA, ECC over GF(p), SHA
- /ModDate: D:20120704150104+02'00'
- /Modification date: 4 Jul 2012
- /Producer: Adobe PDF Library 9.0
- /Revision: Rev. 1.1
- /Security status: PUBLIC INFORMATION
- /SourceModified: D:20120704125354
- /Specification status: Evaluation documentation
- /Status: accepted
- /Subject: Common Criteria Evaluation of Crypto Library on SmartMX
- /TOE long: Crypto Library V2.6 on P5CC008V1A and P5CC012V1A
- /TOE short: Crypto Library on SmartMX
- /Template date: 1 October 2006
- /Template version: 2.8.1
- /Title: Security Target - Crypto Library V2.7 on P5CC008V1A / P5CC012V1A
- /docpath: I:\Workspace\CryptoLibP5\SmxCl\docs\02_sw_req_an
- /philips_smx_cl_docpath: I:\SmartMX\P5_CryptoLib\SmxCl\docs\02_sw_req_an
- /relBibilioPath: ..\Bibliography.doc
- pdf_file_size_bytes: 374114
- pdf_hyperlinks:
|