name |
VERA Type-II SSR Application Firmware v1.5.2 |
AR-FR12M Version M.20 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
scheme |
TR |
JP |
status |
active |
archived |
not_valid_after |
09.12.2027 |
07.10.2013 |
not_valid_before |
09.12.2022 |
11.03.2005 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC%20Certificate.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/MT-VERA%20Certification%20Report.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/VERA%20MTK200%20KEC_ST%20v2.2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_est.pdf |
manufacturer |
MT BİLGİ TEKNOLOJİLERİ VE DIŞ TİC.A.Ş. |
Sharp Corporation |
manufacturer_web |
https://mtholding.com.tr/ |
https://sharp-world.com/ |
security_level |
EAL4+, ALC_DVS.2 |
EAL3+, ADV_SPM.1 |
dgst |
a23b2722122de369 |
8a35a1a0f9dabc51 |
heuristics/cert_id |
21.0.03/TSE-CCCS-137 |
JISEC-CC-CRP-C0022-01 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, AVA_MCU.1, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1 |
heuristics/extracted_versions |
1.5.2 |
20 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0022
- certification_date: 01.03.2005
- claim: EAL3+ ADV_SPM.1
- enhanced:
- assurance_level: EAL3 + ADV_SPM.1
- cert_link: https://www.ipa.go.jp/en/security/c0022_eimg.pdf
- description: PRODUCT DESCRIPTION TOE is a firmware that aims to prevent disclosure of real image data stored temporarily in Mass Storage Device (hereafter referred to as MSD), which are specified for every functional unit configuration of Multi Function Device (hereafter referred to as MFD). TOE is provided as a kit of upgrading firmware of MFD. TOE executes encryption before the real image data are spooled in MSD, when the MFD functions like PCFAX, FAX transmission or FAX receiving are performed. It also clears spool data area in MSD after the jobs like copying, printing, SCAN transmission, PCFAX, FAX transmission or FAX receiving are completed. These encryption function and data erasing function ensure the confidentiality of real image data that are stored temporarily in MSD and counter fraudulent readout of them.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology security center (JEITA ITSC)
- product: AR-FR12M
- product_type: product (Data protection function inside digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0022_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0022_est.pdf
- toe_version: VERSION M.20
- vendor: Sharp Corporation
- expiration_date: 01.10.2013
- supplier: Sharp Corporation
- toe_japan_name: AR-FR12M VERSION M.20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0022_it4028.html
- toe_overseas_name: AR-FR12M VERSION M.20
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
CC Certificate.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20240105163223+02'00'
- /Creator: Canon iR-ADV C5240 PDF
- /Producer: Adobe PSL 1.2e for Canon
- pdf_file_size_bytes: 86514
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
MT-VERA Certification Report.pdf |
c0022_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0022-01: 1
- Certification No. C0022: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4+: 1
- EAL4+: 2
|
- EAL:
- EAL3: 2
- EAL3 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: TSE KSDB
- /CreationDate: D:20221226151258+03'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20221226175032+03'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 2315455
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20050518144032+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /Manager: IPA
- /ModDate: D:20050518144205+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /SourceModified: D:20050518054022
- /Title: CRP-C0022-01_e
- pdf_file_size_bytes: 213209
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
pdf_data/st_filename |
VERA MTK200 KEC_ST v2.2.pdf |
c0022_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 6
- EAL4 augmented: 1
- EAL4+: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 3
- AVA_VAN.5: 1
|
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 4
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 3
- ADV_HLD.2: 1
- ADV_RCR.1: 4
- ADV_SPM.1: 12
- AGD:
- AGD_ADM.1: 7
- AGD_USR.1: 6
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MCU.1: 1
- AVA_MSU.1: 2
- AVA_SOF.1: 3
- AVA_VLA.1: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 6
- FAU_GEN: 2
- FAU_GEN.1: 31
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAA.1: 8
- FAU_SAA.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 7
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 5
- FCO:
- FCO_NRO.1: 1
- FCO_NRO.2: 6
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 22
- FCS_CKM.1: 9
- FCS_CKM.2: 2
- FCS_CKM.4: 26
- FCS_CKM.4.1: 1
- FCS_COP: 57
- FCS_COP.1: 2
- FCS_COP.1.1: 5
- FDP:
- FDP_ACC.1: 1
- FDP_ETC.1: 1
- FDP_ETC.2: 12
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 15
- FDP_IFF.1: 14
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 7
- FDP_ITC.2: 7
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.2: 1
- FIA_UAU: 1
- FIA_UAU.1: 5
- FIA_UAU.2: 22
- FIA_UAU.5: 21
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 22
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 8
- FMT_MOF.1: 2
- FMT_MSA.3: 1
- FMT_MTD: 15
- FMT_SMF.1: 24
- FMT_SMF.1.1: 1
- FMT_SMR.1: 26
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_IDA: 39
- FPT_IDA.1: 6
- FPT_IDA.1.1: 6
- FPT_SSY: 20
- FPT_SSY.1: 6
- FPT_SSY.1.1: 5
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.4: 6
- FCS_COP.1: 15
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 5
- FDP_IFC.1: 1
- FDP_RIP.1: 13
- FDP_RIP.1.1: 1
- FIA:
- FIA_SOS.1: 16
- FIA_SOS.1.1: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 20
- FIA_UAU.2.1: 1
- FIA_UAU.7: 15
- FIA_UAU.7.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 15
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 16
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.2: 17
- FMT_MSA.2.1: 1
- FMT_MTD.1: 13
- FMT_MTD.1.1: 1
- FMT_RVM.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 17
- FPT_RVM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A: 1
- A.APS-IVPS: 2
- A.IVPS: 2
- A.PC: 2
- A.SAM_: 3
- A.SPCA: 2
- OE:
- OE.APS: 8
- OE.CM: 31
- OE.IVPS: 4
- OE.IVS: 3
- OE.OCSP: 1
- OE.OCSPS: 9
- OE.PC: 5
- OE.PKI: 27
- OE.SAM: 30
- OE.SAS: 11
- OE.SPCA: 8
- OE.SSR_: 3
- OT:
- OT.DPM: 11
- OT.RH_DA: 11
- OT.RH_SC: 5
- OT.RIP: 12
- OT.SAS_DA: 13
- OT.SAS_SC: 4
- T:
|
- A:
- O:
- O.REMOVE: 6
- O.RESIDUAL: 8
- OE:
- OE.ERASEALL: 3
- OE.OPERATE: 3
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- TLS:
- TLS:
- TLS: 10
- TLS v1.2: 1
- TLSv1.2: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 2
- FIPS 180-422: 1
- FIPS 197: 4
- NIST:
- PKCS:
- RFC:
- RFC 3447: 1
- RFC 4493: 3
- RFC 5246: 3
- RFC 524616: 1
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- ISO:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Göktuğ İLISU
- /CreationDate: D:20230127111113+03'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230127111113+03'00'
- /Producer: Microsoft® Word 2016
- /Subject: VERA Type-II SSR Firmware with SAS v1.3.0
- /Title: VERA KEC SecurIty Target v2.2
- pdf_file_size_bytes: 2903504
- pdf_hyperlinks: callto:2015101201, callto:2015101199, callto:2015101200, callto:2015101202
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
- /Author: SHARP Corporation
- /Company: SHARP Corporation
- /CreationDate: D:20050518145955+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20050518150808+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Subject: C0022
- /Title: ST
- pdf_file_size_bytes: 664695
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |