name |
Apple iOS 10.2 on iPhone & iPad Devices |
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00 |
category |
Mobility |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
07.07.2019 |
01.09.2015 |
not_valid_before |
27.07.2017 |
31.08.2010 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10782-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10782-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10782-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_est.pdf |
manufacturer |
Apple Inc. |
Konica Minolta Business Technologies, Inc |
manufacturer_web |
https://www.apple.com/ |
https://www.konicaminolta.com/ |
security_level |
{} |
EAL3 |
dgst |
a98996628f8d17cb |
e1cef4b86461e7ab |
heuristics/cert_id |
CCEVS-VR-10782-2017 |
JISEC-CC-CRP-C0265 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.2, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
AVA_VLA.2, ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
10.2 |
283, 423, 7828, 0100, 00, 363, 223 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Mobility
- certification_date: 27.07.2017
- evaluation_facility: atsec information security corporation
- expiration_date: 27.07.2019
- id: CCEVS-VR-VID10782
- product: Apple iOS 10.2 on iPhone & iPad Devices
- scheme: US
- url: https://www.niap-ccevs.org/product/10782
- vendor: Apple Inc.
|
- cert_id: JISEC-CC-CRP-C0265
- certification_date: 01.08.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0265_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as 溺FP・ or through the network, and provides the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in MFP, TOE can encrypt all the data written in HDD including image data using ASIC (Application Specific Integrated Circuit). Besides, TOE provides the function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards, and the function that controls the access from the public telephone line against the danger using Fax function as a steppingstone to access internal network. TOE security functionality TOE provides the following security functions. - Administrator function - SNMP administrator function - Service mode function - User function - User box function - Secure print function - ID & print function - All area overwrite deletion function - Encryption key generation function - Authentication Failure Frequency Reset function - Trusted Channel function - S/MIME encryption processing function - External Server authentication operation support function - ASIC support function - WebDAV administrator function - Fax unit control function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0265_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0265_est.pdf
- toe_version: A1UD0Y0-0100-GM0-00
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.04.2011
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software A1UD0Y0-0100-GM0-00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0265_it9283.html
- toe_overseas_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software A1UD0Y0-0100-GM0-00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
14a859ad7daf14a4, 652138e3ca5b246a, c88af12926be2779 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ep_mdm_agent_v3.0.pdf |
{} |
pdf_data/cert_filename |
st_vid10782-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10782-2017: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20170802095932-04'00'
- /ModDate: D:20170802095932-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 178567
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10782-vr.pdf |
c0265_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-10782-2017
- cert_item: Apple iOS 10.2
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0265-01: 1
- Certification No. C0265: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-GROUP-BOX: 2
- T.ACCESS-PRIVATE-BO: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRI: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 2
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRANS: 1
- T.UNEXPECTED-TRANSMISSION: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20170802085427-04'00'
- /ModDate: D:20170802085427-04'00'
- pdf_file_size_bytes: 481019
- pdf_hyperlinks: https://developer.apple.com/enterprise/ConfigurationProfileReference.pdf, https://help.apple.com/profilemanager/mac/5.1/#/apdB8464D5D-F4C9-4848-9AD7-4B188ED6E130, https://developer.apple.com/library/content/documentation/Miscellaneous/Reference/MobileDeviceManagementProtocolRef/1-Introduction/Introduction.html, https://developer.apple.com/library/ios/documentation/General/Reference/InfoPlistKeyReference/Introduction/Introduction.html, https://www.apple.com/ae/business/docs/DEP_Guide.pdf, https://developer.apple.com/library/prerelease/ios/documentation/Security/Reference/SecurityFrameworkReference/index.html, http://help.apple.com/configurator/mac/2.2/, https://developer.apple.com/library/content/documentation/Security/Conceptual/CertKeyTrustProgGuide/, https://itunes.apple.com/us/book/ios-deployment-reference/id917468024?mt=11, https://developer.apple.com/library/ios/documentation/Security/Conceptual/keychainServConcepts/01introduction/introduction.html, https://itunes.apple.com/us/book/iphone-user-guide-for-ios-10.2/id1134772174?mt=11, https://developer.apple.com/library/mac/documentation/Security/Conceptual/cryptoservices/Introduction/Introduction.html, https://developer.apple.com/bug-reporting/profiles-and-logs/?platforms=ios, https://itunes.apple.com/us/book/ipad-user-guide-for-ios-10.2/id1134772572?mt=11, https://developer.apple.com/library/mac/documentation/Security/Conceptual/CertKeyTrustProgGuide/01introduction/introduction.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
- /CreationDate: D:20101213141346+09'00'
- /ModDate: D:20101213141346+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 235716
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
st_vid10782-st.pdf |
c0265_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 12
- AGD_PRE.1: 8
- ALC:
- ALC_CMC.1: 6
- ALC_CMS.1: 3
- ALC_CMS.2: 4
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 10
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.1: 6
- ASE_REQ.1: 12
- ASE_SPD.1: 10
- ASE_TSS.1: 7
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ALT: 3
- FAU_ALT_EXT.2: 6
- FAU_ALT_EXT.2.1: 2
- FAU_ALT_EXT.2.2: 2
- FAU_GEN: 3
- FAU_GEN.1: 8
- FAU_GEN.1.1: 4
- FAU_GEN.1.2: 5
- FAU_SEL: 3
- FAU_SEL.1: 5
- FAU_SEL.1.1: 2
- FAU_STG: 3
- FAU_STG.1: 4
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FAU_STG.4: 4
- FAU_STG.4.1: 2
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 10
- FCS_CKM.1.1: 4
- FCS_CKM.2: 12
- FCS_CKM.2.1: 6
- FCS_CKM_EXT.1: 5
- FCS_CKM_EXT.1.1: 2
- FCS_CKM_EXT.1.2: 2
- FCS_CKM_EXT.1.3: 2
- FCS_CKM_EXT.1.4: 3
- FCS_CKM_EXT.2: 3
- FCS_CKM_EXT.2.1: 2
- FCS_CKM_EXT.3: 5
- FCS_CKM_EXT.3.1: 3
- FCS_CKM_EXT.3.2: 2
- FCS_CKM_EXT.4: 4
- FCS_CKM_EXT.4.1: 3
- FCS_CKM_EXT.4.2: 2
- FCS_CKM_EXT.5: 6
- FCS_CKM_EXT.5.1: 2
- FCS_CKM_EXT.5.2: 2
- FCS_CKM_EXT.6: 4
- FCS_CKM_EXT.6.1: 2
- FCS_COP: 3
- FCS_COP.1: 24
- FCS_COP.1.1: 11
- FCS_RBG: 3
- FCS_RBG_EXT.1: 16
- FCS_RBG_EXT.1.1: 3
- FCS_RBG_EXT.1.2: 3
- FCS_RBG_EXT.1.3: 2
- FCS_SRV: 3
- FCS_SRV_EXT.1: 4
- FCS_SRV_EXT.1.1: 2
- FCS_STG: 3
- FCS_STG_EXT.1: 5
- FCS_STG_EXT.1.1: 2
- FCS_STG_EXT.1.2: 2
- FCS_STG_EXT.1.3: 2
- FCS_STG_EXT.1.4: 2
- FCS_STG_EXT.1.5: 2
- FCS_STG_EXT.2: 4
- FCS_STG_EXT.2.1: 3
- FCS_STG_EXT.2.2: 2
- FCS_STG_EXT.3: 5
- FCS_STG_EXT.3.1: 3
- FCS_STG_EXT.3.2: 2
- FCS_STG_EXT.4: 4
- FCS_STG_EXT.4.1: 2
- FCS_TLSC: 3
- FCS_TLSC_EXT: 3
- FCS_TLSC_EXT.1: 9
- FCS_TLSC_EXT.1.1: 5
- FCS_TLSC_EXT.1.2: 4
- FCS_TLSC_EXT.1.3: 4
- FCS_TLSC_EXT.1.4: 4
- FCS_TLSC_EXT.1.5: 2
- FCS_TLSS_EXT.1.1: 1
- FDP:
- FDP_ACF: 3
- FDP_ACF_EXT.1: 4
- FDP_ACF_EXT.1.1: 2
- FDP_ACF_EXT.1.2: 2
- FDP_DAR: 3
- FDP_DAR_EXT.1: 6
- FDP_DAR_EXT.1.1: 2
- FDP_DAR_EXT.1.2: 2
- FDP_DAR_EXT.2: 5
- FDP_DAR_EXT.2.1: 2
- FDP_DAR_EXT.2.2: 2
- FDP_DAR_EXT.2.3: 2
- FDP_DAR_EXT.2.4: 2
- FDP_IFC: 3
- FDP_IFC_EXT.1: 5
- FDP_IFC_EXT.1.1: 2
- FDP_STG: 3
- FDP_STG_EXT.1: 5
- FDP_STG_EXT.1.1: 2
- FDP_UPC: 3
- FDP_UPC_EXT.1: 4
- FDP_UPC_EXT.1.1: 2
- FDP_UPC_EXT.1.2: 2
- FIA:
- FIA_AFL: 3
- FIA_AFL_EXT.1: 4
- FIA_AFL_EXT.1.1: 2
- FIA_AFL_EXT.1.2: 2
- FIA_AFL_EXT.1.3: 2
- FIA_AFL_EXT.1.4: 2
- FIA_AFL_EXT.1.5: 2
- FIA_AFL_EXT.1.6: 2
- FIA_BLT: 3
- FIA_BLT_EXT.1: 4
- FIA_BLT_EXT.1.1: 2
- FIA_BLT_EXT.2: 3
- FIA_BLT_EXT.2.1: 2
- FIA_BLT_EXT.3: 3
- FIA_BLT_EXT.3.1: 2
- FIA_BLT_EXT.4: 3
- FIA_BLT_EXT.4.1: 2
- FIA_BMG_EXT.1.2: 1
- FIA_ENR: 3
- FIA_ENR_EXT.2: 5
- FIA_ENR_EXT.2.1: 2
- FIA_PAE: 3
- FIA_PAE_EXT.1: 4
- FIA_PAE_EXT.1.1: 2
- FIA_PMG: 3
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 2
- FIA_TRT: 3
- FIA_TRT_EXT.1: 4
- FIA_TRT_EXT.1.1: 2
- FIA_UAU: 3
- FIA_UAU.5: 3
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 3
- FIA_UAU.6: 6
- FIA_UAU.6.1: 4
- FIA_UAU.7: 5
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.1: 3
- FIA_UAU_EXT.1.1: 2
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 2
- FIA_UAU_EXT.2.2: 2
- FMT:
- FMT_MOF: 3
- FMT_MOF_EXT.1: 4
- FMT_MOF_EXT.1.1: 2
- FMT_MOF_EXT.1.2: 2
- FMT_POL_EXT.2: 5
- FMT_POL_EXT.2.1: 2
- FMT_POL_EXT.2.2: 2
- FMT_SMF: 3
- FMT_SMF_EXT: 3
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 7
- FMT_SMF_EXT.2: 4
- FMT_SMF_EXT.2.1: 2
- FMT_SMF_EXT.3: 5
- FMT_SMF_EXT.3.1: 3
- FMT_SMF_EXT.3.2: 2
- FMT_UNR_EXT.1: 5
- FMT_UNR_EXT.1.1: 2
- FPT:
- FPT_AEX: 3
- FPT_AEX_EXT.1: 4
- FPT_AEX_EXT.1.1: 2
- FPT_AEX_EXT.1.2: 2
- FPT_AEX_EXT.2: 4
- FPT_AEX_EXT.2.1: 2
- FPT_AEX_EXT.2.2: 2
- FPT_AEX_EXT.3: 4
- FPT_AEX_EXT.3.1: 2
- FPT_AEX_EXT.4: 4
- FPT_AEX_EXT.4.1: 2
- FPT_AEX_EXT.4.2: 2
- FPT_JTA: 3
- FPT_JTA_EXT.1: 4
- FPT_JTA_EXT.1.1: 2
- FPT_KST: 3
- FPT_KST_EXT.1: 4
- FPT_KST_EXT.1.1: 2
- FPT_KST_EXT.2: 4
- FPT_KST_EXT.2.1: 2
- FPT_KST_EXT.3: 4
- FPT_KST_EXT.3.1: 2
- FPT_NOT: 3
- FPT_NOT_EXT.1: 5
- FPT_NOT_EXT.1.1: 2
- FPT_STM: 3
- FPT_STM.1: 4
- FPT_STM.1.1: 3
- FPT_TST: 3
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 4
- FPT_TST_EXT.1.2: 2
- FPT_TST_EXT.2: 5
- FPT_TST_EXT.2.1: 3
- FPT_TST_EXT.2.2: 3
- FPT_TUD: 3
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FPT_TUD_EXT.2: 4
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 2
- FPT_TUD_EXT.2.3: 2
- FPT_TUD_EXT.2.4: 2
- FPT_TUD_EXT.2.5: 2
- FPT_TUD_EXT.2.6: 2
- FTA:
- FTA_SSL: 3
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 2
- FTA_SSL_EXT.1.2: 2
- FTA_SSL_EXT.1.3: 2
- FTA_TAB: 3
- FTA_TAB.1: 4
- FTA_TAB.1.1: 2
- FTA_WSE: 3
- FTA_WSE_EXT.1: 5
- FTA_WSE_EXT.1.1: 2
- FTP:
- FTP_ITC: 3
- FTP_ITC_EXT: 2
- FTP_ITC_EXT.1: 11
- FTP_ITC_EXT.1.1: 4
- FTP_ITC_EXT.1.2: 6
- FTP_ITC_EXT.1.3: 4
- FTP_ITT_EXT.1: 1
|
- FAU:
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 72
- FDP_ACC.1.1: 4
- FDP_ACF.1: 55
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ACP.1: 1
- FDP_IFC.1: 14
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 71
- FIA_AFL.1.1: 9
- FIA_AFL.1.2: 9
- FIA_ATD.1: 29
- FIA_ATD.1.1: 1
- FIA_MSA.3: 1
- FIA_SOS: 1
- FIA_SOS.1: 44
- FIA_SOS.1.1: 5
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU: 2
- FIA_UAU.1: 43
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 44
- FIA_UAU.2.1: 4
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID.1: 31
- FIA_UID.2: 48
- FIA_UID.2.1: 7
- FIA_USB.1: 26
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 31
- FMT_MOF.1.1: 3
- FMT_MSA: 5
- FMT_MSA.1: 34
- FMT_MSA.1.1: 3
- FMT_MSA.3: 42
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 7
- FMT_MTD.1: 119
- FMT_MTD.1.1: 13
- FMT_SMF.1: 110
- FMT_SMF.1.1: 1
- FMT_SMR.1: 171
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SMS.1: 1
- FMT_SOS.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.CONNNECTIVITY: 1
- A.MOBILE_DEVICE_PLATFORM: 1
- A.NOTIFY: 1
- A.NO_TOE_BYPASS: 1
- A.PRECAUTION: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ACCOUNTABILITY: 1
- O.AUTH: 1
- O.AUTH_COMM: 1
- O.COMMS: 1
- O.CONFIG: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.INTEGRITY: 1
- O.PRIVACY: 1
- O.STORAGE: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.WIRELESS_ACCESS_POINT_CONNECTION: 1
- OE:
- OE.CONFIG: 1
- OE.DATA_PROPER_ADMIN: 1
- OE.DATA_PROPER_USER: 1
- OE.IT_ENTERPRISE: 1
- OE.MOBILE_DEVICE_PLATFORM: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- OE.WIRELESS_NETWORK: 1
- T:
- T.BACKUP: 1
- T.EAVESDROP: 1
- T.FLAWAPP: 3
- T.MALICIOUS_APPS: 1
- T.NETWORK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PERSISTENT: 3
- T.PHYSICAL: 3
- T.PHYSICAL_ACCESS: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED: 1
- T.UNDETECTED: 1
|
- A:
- A.ADMIN: 3
- A.NETWORK: 4
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.AUTH-CAPABILITY: 7
- O.CONFIG: 11
- O.CRYPT-KEY: 1
- O.CRYPTO-CAPABILITY: 7
- O.CRYPTO-KEY: 3
- O.CRYPTO-MAIL: 4
- O.FAX-CONTROL: 7
- O.GROUP-BOX: 5
- O.OVERWRITE-ALL: 7
- O.PRIVATE-BOX: 5
- O.PUBLIC-BOX: 8
- O.REGISTERED-USER: 14
- O.SECURE-PRINT: 8
- O.TRUSTED-PASS: 7
- OE:
- OE.ADMIN: 3
- OE.FAX-UNIT: 3
- OE.FEED-BACK: 10
- OE.NETWORK: 3
- OE.SECRET: 3
- OE.SERVER: 6
- OE.SERVICE: 3
- OE.SESSION: 10
- OE.SETTING-SECURITY: 3
- T:
- T.ACCESS-GROUP-BOX: 3
- T.ACCESS-PRIVATE-BOX: 3
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTED-TRANSMISSION: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 41
- AES-: 2
- AES-128: 6
- AES-192: 5
- AES-256: 6
- AES256: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 5
- HMAC: 6
- HMAC-SHA-224: 2
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 8
- SHA-224: 3
- SHA-256: 6
- SHA-384: 2
- SHA-512: 2
- SHA384: 2
- SHA512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- TLS:
- SSL:
- TLS:
- TLS: 46
- TLS 1.0: 2
- TLS 1.2: 3
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 3
- FIPS 186-4: 2
- FIPS 197: 3
- FIPS 198: 3
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- FIPS186-4: 2
- NIST:
- NIST SP 800-131A: 1
- NIST SP 800-132: 1
- NIST SP 800-38A: 1
- NIST SP 800-38C: 2
- NIST SP 800-38D: 1
- NIST SP 800-38F: 4
- NIST SP 800-56A: 1
- SP 800-132: 2
- SP 800-38: 7
- SP 800-38F: 1
- SP 800-56c: 1
- SP 800-90: 1
- SP 800-90A: 3
- PKCS:
- RFC:
- RFC 2560: 1
- RFC 2818: 1
- RFC 3394: 2
- RFC 4401: 1
- RFC 4492: 4
- RFC 5216: 1
- RFC 5246: 16
- RFC 5280: 4
- RFC 5289: 8
- RFC 6125: 1
- RFC7748: 1
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 186-2: 6
- FIPS PUB 197: 3
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.PHYSICAL_ACCESS Physical Access (EP_MDM_AGENT_V3.0) The mobile: 1
- out of scope: 1
|
- ConfidentialDocument:
- main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
|
pdf_data/st_metadata |
- /AAPL:Keywords: []
- /Author: Jerry Colunga
- /CreationDate: D:20170727203742Z
- /Creator: Word
- /Keywords:
- /ModDate: D:20170802085041-04'00'
- /Producer: Mac OS X 10.12.6 Quartz PDFContext
- /Subject:
- /Title: 20170727_CC_IOS10_SECURITY_TARGET-MDF+AGENT+WLAN
- pdf_file_size_bytes: 1438954
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 119
|
- /Author:
- /CreationDate: D:20101202154851+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20101202155121+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - C0265_ASE.doc
- /_AdHocReviewCycleID: -379351262
- /_PreviousAdHocReviewCycleID: 467482879
- pdf_file_size_bytes: 772548
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 111
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |