name |
AR-FR24 VERSION M.10 |
Solaris™ 10 Release 11/06 Trusted Extensions |
category |
Other Devices and Systems |
Operating Systems |
scheme |
JP |
CA |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
29.09.2015 |
not_valid_before |
16.11.2007 |
11.06.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0123_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/solaris10ext-cert-e.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0123_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/solaris10ext-sec-e.pdf |
manufacturer |
Sharp Corporation |
Oracle Corporation |
manufacturer_web |
https://sharp-world.com/ |
https://www.oracle.com |
security_level |
EAL3+, ADV_SPM.1 |
EAL4+, ALC_FLR.3 |
dgst |
a62ce002e7469a17 |
2544cfb3d223999f |
heuristics/cert_id |
JISEC-CC-CRP-C0123 |
383-4-57 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:x64:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-1999-0046, CVE-2017-3623, CVE-2016-2334 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1 |
ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ALC_FLR.3, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
heuristics/extracted_versions |
10 |
11, 10, 06 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0123
- certification_date: 01.11.2007
- claim: EAL3+ ADV_SPM.1
- enhanced:
- assurance_level: EAL3+ADV_SPM.1
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0123_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as “MFD”). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. As countermeasures against information leakage that residual image data in the MFD induce, the TOE has such security functions as cryptographic operation and data clear. The cryptographic operation function encrypts the image data of each fax job before spooled to the Flash memory in the MFD. The data clear function overwrites random or fixed values over the storage area that the spooled image data occupy when the MFD finishes or aborts each job of copy, printer, network scanner or fax functions.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: AR-FR24
- product_type: IT Product (data protection function in Multi Function Device)
- report_link: https://www.ipa.go.jp/en/security/c0123_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0123_est.pdf
- toe_version: VERSION M.10
- vendor: Sharp Corporation
- expiration_date: 01.10.2013
- supplier: Sharp Corporation
- toe_japan_name: AR-FR24 VERSION M.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0123_it7143.html
- toe_overseas_name: AR-FR24 VERSION M.10
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0123_erpt.pdf |
solaris10ext-cert-e.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-57-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0123-01: 1
- Certification No. C0123: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 3
- EAL3 augmented: 2
|
- EAL:
- EAL 4: 5
- EAL 4 augmented: 2
- EAL 4+: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110526173838+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110526173917+09'00'
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 874958
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 24
|
- /Author: CGI
- /CC date: August 1999
- /CC document number: CCIMB-99-031/032/033
- /CC version: 2.1
- /CCEF: <change CCEF - full name>
- /CCEF abbr: <change CCEF abbr - abbreviated name>
- /CCEF location: <change CCEF location - city, province>
- /CEM date: August 1999
- /CEM document number: CEM-99/045
- /CEM version: 1.0
- /Comments: Reproduction of this report is authorized provided the report is reproduced in its entirety.
- /Company: CGI
- /Completion date: <change certification completion date - DD Month YYYY>
- /CreationDate: D:20080611091156-04'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer name: <change developer name>
- /EAL long: <change EAL long - 2 augmented>
- /EAL short: <change EAL short - 2+>
- /ETR Version: <change ETR version number>
- /ETR date: <change ETR completion date - DD Month YYYY>
- /Evaluation date: <change evaluation completion date - DD Month YYYY>
- /Evaluation number: <change evaluation file number - 383-4-XX>
- /Manager: Andrew Pridham
- /ModDate: D:20080626100420-04'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ST date: <change ST completion date - DD Month YYYY>
- /ST version: <change ST version number>
- /SourceModified: D:20080611131101
- /TOE name: Sun Microsystems Inc. Solaris 10 Release 11/06 with Trusted Extensions
- /TOE version: <change TOE version number>
- /Technical oversight date: 3 October 2002
- /Technical oversight version: 1.0
- /Title: EAL 4+ Evaluation of Sun Microsystems Inc
- /Version: <change CR version number>
- pdf_file_size_bytes: 121058
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
c0123_est.pdf |
solaris10ext-sec-e.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL3: 2
- EAL4: 4
- EAL4+: 7
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 3
- ADV_HLD.2: 2
- ADV_RCR.1: 4
- ADV_SPM.1: 13
- AGD:
- AGD_ADM.1: 9
- AGD_USR.1: 5
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN: 1
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 3
|
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- ADV_SPM.1.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.3: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 4
- FDP_IFC.1: 3
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FIA:
- FIA_SOS.1: 13
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 17
- FIA_UAU.2.1: 1
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 12
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.2: 17
- FMT_MSA.2.1: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 16
- FPT_RVM.1.1: 1
- FTP:
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 8
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 3
- FAU_SEL: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 2
- FAU_STG: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 2
- FAU_STG.1.2: 1
- FAU_STG.3: 5
- FAU_STG.3.1: 3
- FAU_STG.4: 8
- FAU_STG.4.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 9
- FDP_ACC.1.1: 2
- FDP_ACF.1: 10
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 3
- FDP_ETC: 1
- FDP_ETC.1: 5
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 6
- FDP_ETC.2.2: 1
- FDP_ETC.2.5: 1
- FDP_IFC: 1
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF.1: 2
- FDP_IFF.2: 9
- FDP_IFF.2.2: 2
- FDP_IFF.2.3: 1
- FDP_IFF.2.4: 1
- FDP_IFF.2.5: 1
- FDP_IFF.2.6: 1
- FDP_IFF.2.7: 1
- FDP_ITC: 1
- FDP_ITC.1: 5
- FDP_ITC.1.1: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 9
- FDP_ITC.2.2: 1
- FDP_ITC.2.4: 1
- FDP_RIP: 1
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FDP_UCT: 1
- FDP_UCT.1: 5
- FDP_UCT.1.1: 2
- FDP_UIT: 1
- FDP_UIT.1: 3
- FDP_UIT.1.1: 3
- FDP_UIT.1.2: 2
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 12
- FIA_ATD.1.1: 2
- FIA_SOS: 1
- FIA_SOS.1: 3
- FIA_SOS.1.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 9
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID: 2
- FIA_UID.1: 10
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 5
- FIA_USB: 1
- FIA_USB.1: 11
- FIA_USB.1.1: 2
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_AMT.1: 1
- FMT_MOF.1: 3
- FMT_MSA: 1
- FMT_MSA.1: 15
- FMT_MSA.1.1: 3
- FMT_MSA.2: 9
- FMT_MSA.3: 13
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 20
- FMT_MTD.1.1: 6
- FMT_MTD.3: 5
- FMT_REV: 1
- FMT_REV.1: 9
- FMT_REV.1.1: 3
- FMT_REV.1.2: 4
- FMT_SMF: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 3
- FMT_SMR: 1
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 2
- FMT_SMR.2: 10
- FMT_SMR.2.1: 2
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 2
- FPT:
- FPT_AMT: 1
- FPT_AMT.1: 6
- FPT_AMT.1.1: 2
- FPT_FLS: 1
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_RCV: 1
- FPT_RCV.1: 4
- FPT_RCV.1.1: 2
- FPT_RCV.4: 4
- FPT_RCV.4.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 3
- FPT_RVM.1.1: 2
- FPT_SEP: 1
- FPT_SEP.1: 2
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 1
- FPT_STM: 1
- FPT_STM.1: 5
- FPT_STM.1.1: 2
- FPT_TDC.1: 7
- FPT_TST: 1
- FPT_TST.1: 4
- FPT_TST.1.1: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_LSA: 1
- FTA_LSA.1: 3
- FTA_LSA.1.1: 2
- FTA_SSL: 1
- FTA_SSL.1: 3
- FTA_SSL.1.1: 4
- FTA_SSL.1.2: 3
- FTA_SSL.2: 4
- FTA_SSL.2.1: 3
- FTA_SSL.2.2: 4
- FTA_TSE: 1
- FTA_TSE.1: 3
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 8
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.REMOVE: 8
- O.RESIDUAL: 6
- OE:
- OE.ERASEALL: 3
- OE.OPERATE: 3
- T:
|
- A:
- A.ACCESS: 3
- A.ASSET: 5
- A.CLEARANCE: 3
- A.CONNECT: 6
- A.COOP: 3
- A.LDAP_DOMAINS: 3
- A.LOCATE: 3
- A.MANAGE: 18
- A.NO_EVIL_ADM: 4
- A.OWNER: 2
- A.PASSWORD: 4
- A.PEER: 4
- A.PROTECT: 5
- A.SENSITIVITY: 3
- A.USER: 4
- O:
- O.ACCOUNT: 15
- O.ADMIN: 1
- O.AUDITING: 15
- O.AUTHORIZATION: 17
- O.DISCRETIONARY_ACCESS: 16
- O.DISRETIONARY_ACCESS: 1
- O.DUTY: 11
- O.ENFORCEMENT: 24
- O.ENTRY: 9
- O.E_: 1
- O.E_ACCOUNTABLE: 12
- O.E_ADMIN: 14
- O.E_AUDITDATA: 4
- O.E_BOOT: 10
- O.E_CONNECT: 7
- O.E_CONNECT-: 4
- O.E_CONSISTENCY: 13
- O.E_CREDEN: 15
- O.E_INFO_PROTECT: 9
- O.E_INSTALL: 10
- O.E_MAINTENANCE: 3
- O.E_PHYSICAL: 11
- O.E_PROTECT: 10
- O.E_RECOVER: 4
- O.E_SERIAL_LOGIN: 5
- O.E_SOFTWARE_IN: 4
- O.HIERACHICAL: 3
- O.HIERARCHICAL: 6
- O.KNOWN: 13
- O.MANAGE: 25
- O.MANDATORY_ACCESS: 6
- O.RESIDUAL_INFO: 12
- O.ROLE: 14
- O.TRUSTPATH: 8
- T:
- T.ACCESS_INFO: 13
- T.ACCESS_TOE: 11
- T.ADMIN_RIGHTS: 12
- T.COMPROMISE: 4
- T.ENTRY: 1
- T.MODIFY: 12
- T.OPERATE: 9
- T.ROLEDEV: 7
- T.TRANSIT: 7
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- FIPS:
- ISO:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: K.Nakagawa
- /Company: Sharp Corporation
- /CreationDate: D:20110524153336+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /GTS_PDFXConformance: PDF/X-1a:2001
- /GTS_PDFXVersion: PDF/X-1:2001
- /ModDate: D:20110526172010+09'00'
- /Producer: Acrobat Distiller 8.2.6 (Windows)
- /Subject: AR-FR24
- /Title: Security Target
- /Trapped: /False
- pdf_file_size_bytes: 748188
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
- /Author: Jane Medefesser
- /Copyright: 2008 Sun Microsystems, INC
- /CreationDate: D:20080430100051Z
- /Creator: FrameMaker 7.0
- /Keywords: "Sun Microsystems, CAPP, RBAC, LSPP, EAL4+, Common Criteria, Security Target, Solaris Security, Multi Level Security Operating System"
- /Marked: True
- /ModDate: D:20080626100447-04'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Subject: Sun Microsystems Solaris 10 11/06 Trusted Extensions Common Criteria Security Target
- /Title: Solaris 10 11/06 Trusted Extensions Security Target
- /WebStatement: http://wwws.sun.com/software/security/securitycert
- pdf_file_size_bytes: 530085
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 108
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |