name |
KONICA MINOLTA bizhub 650i/bizhub 550i with FK-514, DEVELOP ineo 650i/ineo 550i with FK-514 G00-31 |
Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4 |
category |
Multi-Function Devices |
Detection Devices and Systems |
scheme |
JP |
US |
status |
active |
archived |
not_valid_after |
12.01.2026 |
22.04.2015 |
not_valid_before |
12.01.2021 |
22.04.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0699_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10402-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/c0699_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10402-st.pdf |
manufacturer |
KONICA MINOLTA, INC. |
Juniper Networks, Inc. |
manufacturer_web |
|
https://www.juniper.net/ |
security_level |
{} |
EAL4+, ALC_FLR.2 |
dgst |
aaa6f7597f3fd5e9 |
32c0f398615e577f |
heuristics/cert_id |
JISEC-CC-CRP-C0699-01-2021 |
CCEVS-VR-VID-10402-2013 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_550i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_650i:-:*:*:*:*:*:*:* |
cpe:2.3:h:juniper:ln1000:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, AVA_VAN.3, ATE_FUN.1, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, AGD_OPE.1, ADV_ARC.1, ADV_TDS.3, ATE_DPT.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1 |
heuristics/extracted_versions |
31, 514 |
11.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0699
- certification_date: 01.05.2022
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0699
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000030lw-att/c0699kz_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: KONICA MINOLTA bizhub 650i/bizhub 550i with FK-514, DEVELOP ineo 650i/ineo 550i with FK-514, Sindoh N802/N801/MF6111/ MF5101 with FK-514
- product_type: Multi-Function Printer
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000030lw-att/c0699kz_eacr.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000030lw-att/c0699kz_est.pdf
- toe_version: G00-31
- vendor: KONICA MINOLTA, INC.
- expiration_date:
- supplier: KONICA MINOLTA, INC.
- toe_japan_name: KONICA MINOLTA bizhub 650i / bizhub 550i with FK-514, DEVELOP ineo 650i / ineo 550i with FK-514G00-31
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0699_it0760_01.html
- toe_overseas_name: KONICA MINOLTA bizhub 650i / bizhub 550i with FK-514, DEVELOP ineo 650i / ineo 550i with FK-514, Sindoh N802 / N801 / MF6111 / MF5101 with FK-514G00-31
|
- category: Firewall, Router, Wireless Monitoring
- certification_date: 22.04.2013
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 22.04.2015
- id: CCEVS-VR-VID10402
- product: Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
- scheme: US
- url: https://www.niap-ccevs.org/product/10402
- vendor: Juniper Networks, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0699_erpt.pdf |
st_vid10402-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10402-2013
- cert_item: Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running Junos 11.2 R2S4
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0699-01-2021: 1
|
- US:
- CCEVS-VR-VID10402-2013: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.NO_TOE_BYPASS: 1
- A.PHYSICAL: 1
- T:
- T.ADDRESS_MASQUERADE: 1
- T.ADMIN_ROGUE: 1
- T.AUDIT_COMPROMISE: 1
- T.CRYPTO_COMPROMISE: 1
- T.EAVESDROP: 1
- T.MALICIOUS_TSF_COMPROMISE: 1
- T.MASQUERADE: 1
- T.REPLAY: 1
- T.RESIDUAL_DATA: 1
- T.RESOURCE_EXHAUSTION: 1
- T.SPOOFING: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_PEER: 1
- T.UNIDENTIFIED_ACTIONS: 1
- T.UNIDENTIFIED_INTRUSIONS: 1
- T.UNKNOWN_STATE: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20210215174747+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20210215174835+09'00'
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20210215005459
- pdf_file_size_bytes: 308250
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 32
|
- /Author: SAIC
- /CreationDate: D:20130502131855
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130502131855
- /Producer: Microsoft® Office Word 2007
- /Subject: Validation Report
- /Title: Juniper Networks
- pdf_file_size_bytes: 338979
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
c0699_est.pdf |
st_vid10402-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 2
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 13
- ADV_FSP.1: 2
- ADV_FSP.2: 2
- ADV_FSP.4: 13
- ADV_IMP.1: 10
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 18
- AGD:
- AGD_OPE.1: 13
- AGD_PRE.1: 8
- ALC:
- ALC_CMC.4: 16
- ALC_CMS.1: 1
- ALC_CMS.4: 7
- ALC_DEL.1: 6
- ALC_DVS.1: 7
- ALC_FLR.2: 16
- ALC_LCD.1: 8
- ALC_TAT.1: 9
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 6
- ATE_DPT.1: 7
- ATE_FUN.1: 12
- ATE_IND.2: 8
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_CKM_EXT: 2
- FAU_GEN: 10
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 33
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 16
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 55
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 17
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT.1: 6
- FDP:
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_FXS_EXT: 2
- FDP_FXS_EXT.1: 6
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT: 2
- FIA_PSK_EXT.1: 9
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 9
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 3
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_ARP: 5
- FAU_ARP.1: 13
- FAU_ARP.1.1: 1
- FAU_GEN: 14
- FAU_GEN.1: 4
- FAU_GEN.2: 1
- FAU_SAA: 10
- FAU_SAA.1: 2
- FAU_SAR.1: 16
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.2: 15
- FAU_SAR.2.1: 2
- FAU_SAR.3: 16
- FAU_SAR.3.1: 2
- FAU_SEL: 15
- FAU_SEL.1: 2
- FAU_STG: 30
- FAU_STG.1: 2
- FAU_STG.2: 1
- FAU_STG.3: 6
- FAU_STG.3.1: 1
- FAU_UAU.1: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 15
- FCS_CKM.1.1: 2
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 28
- FCS_COP.1.1: 4
- FDP:
- FDP_IFC.1: 14
- FDP_IFC.1.1: 2
- FDP_IFF.1: 12
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_IFF.1.6: 3
- FDP_RIP.2: 6
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL: 6
- FIA_AFL.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 15
- FIA_ATD.1.1: 2
- FIA_UAU: 5
- FIA_UAU.1: 1
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 1
- FIA_UID.2: 5
- FIA_UID.2.1: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 76
- FMT_MOF.1.1: 11
- FMT_MSA: 14
- FMT_MSA.1: 1
- FMT_MSA.2: 5
- FMT_MSA.2.1: 1
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 29
- FMT_MTD.1.1: 6
- FMT_MTD.2: 21
- FMT_MTD.2.1: 3
- FMT_MTD.2.2: 3
- FMT_REV: 5
- FMT_REV.1: 9
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_RCV.2: 6
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_RPL.1: 7
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TDC.1: 6
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TRP.1: 2
- FPT_TST: 1
- FPT_TST.1: 16
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FPT_TST_EXP.1: 1
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FRU:
- FRU_RSA.1: 10
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL: 11
- FTA_SSL.1: 2
- FTA_SSL.2: 1
- FTA_SSL.2.2: 1
- FTA_SSL.3: 11
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTA_TSE.1: 5
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 16
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 3
- FTP_TRP.1: 14
- FTP_TRP.1.1: 3
- FTP_TRP.1.2: 3
- FTP_TRP.1.3: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 5
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 4
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.NO_GENERAL_PURPOSE: 2
- A.NO_TOE: 1
- A.NO_TOE_BYPASS: 1
- A.PHYSICAL: 2
- O:
- O.ADMIN_ROLE: 6
- O.AUDIT_GENERATION: 5
- O.AUDIT_PROTECTION: 3
- O.AUDIT_REVIEW: 4
- O.CORRECT_: 2
- O.CORRECT_TSF_OPERATION: 2
- O.CRYPTOGRAPHIC_FUNCTIONS: 4
- O.CRYPTOGRAPHY_: 1
- O.CRYPTOGRAPHY_VALIDATED: 3
- O.DISPLAY_BANNER: 6
- O.IDS_AUDIT_GENERATION: 3
- O.IDS_AUDIT_REVIEW: 4
- O.MAINT_MODE: 4
- O.MANAGE: 4
- O.MEDIATE_INFORMATION_FLOW: 6
- O.PEER_AUTHENTICATION: 5
- O.PROTECT_IN_TRANSIT: 4
- O.PROTOCOL: 1
- O.PROTOCOLS: 5
- O.REPLAY_DETECTION: 5
- O.RESIDUAL_INFORMATION: 11
- O.RESOURCE_SHARING: 4
- O.ROBUST_TOE_ACCESS: 9
- O.TIME_STAMPS: 4
- O.TRUSTED_PATH: 8
- OE:
- OE.CRYPTANALYTIC: 2
- OE.MANAGEMENT: 1
- OE.NO_GENERAL_PURPOSE: 2
- OE.NO_TOE_BYPASS: 2
- OE.PHYSICAL: 2
- T:
- T.ADDRESS_MASQUERADE: 2
- T.ADMIN_ERROR: 1
- T.ADMIN_ROGUE: 3
- T.AUDIT_COMPROMISE: 2
- T.CRYPTO_COMPROMISE: 2
- T.EAVESDROP: 2
- T.MALICIOUS_TSF_COMPROMISE: 2
- T.MASQUERADE: 2
- T.REPLAY: 2
- T.RESIDUAL_DATA: 2
- T.RESOURCE_EXHAUSTION: 2
- T.SPOOFING: 2
- T.UNATTENDED_SESSION: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_PEER: 2
- T.UNIDENTIFIED_ACTIONS: 2
- T.UNIDENTIFIED_INTRUSIONS: 2
- T.UNKNOWN_STATE: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 6
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 15
- SHA-384: 6
- SHA-512: 9
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 5
- IKEv1: 14
- IKEv2: 3
- IPsec:
- SSH:
- TLS:
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 2
- FIPS PUB 186-4: 5
- FIPS PUB 197: 2
- FIPS PUB 198-1: 2
- ISO:
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-90A: 3
- PKCS:
- RFC:
- RFC 2407: 1
- RFC 3602: 7
- RFC 4106: 2
- RFC 4109: 2
- RFC 4301: 3
- RFC 4303: 3
- RFC 4304: 3
- RFC 4868: 5
- RFC 5282: 1
- RFC3602: 1
|
- FIPS:
- FIPS 140-2: 15
- FIPS 186-2: 1
- FIPS PUB 140-2: 4
- FIPS PUB 171: 1
- FIPS PUB 180-2: 1
- FIPS PUB 186-3: 1
- NIST:
- NIST SP 800-56A: 1
- NIST SP 800-57: 4
- PKCS:
- RFC:
- RFC 2404: 1
- RFC 2406: 1
- RFC 2409: 10
- RFC 2451: 1
- RFC 4251: 1
- RFC 4252: 1
- RFC 4253: 1
- RFC 4271: 3
- RFC 4301: 1
- RFC 4302: 1
- RFC 4303: 1
- RFC 4305: 1
- RFC2409: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Authentication services can be handled either internally (user selected passwords: 1
- including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Authentication services can be handled either internally (user selected passwords) or through a: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: e08884
- /CreationDate: D:20210212143601+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210215174723+09'00'
- /Producer: Acrobat Distiller 15.0 (Windows)
- /Title: Microsoft Word - 【C0699】[英] ASE_EagleBK H-2.00-201221.docx
- pdf_file_size_bytes: 889040
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 71
|
- /Author: Seth Ross, Jane Medefesser
- /CreationDate: D:20130502131822
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130502131822
- /Producer: Microsoft® Office Word 2007
- /Subject: LN1000-V Mobile Secure Router and SRX650 Services Gateway
- /Title: Security Target
- pdf_file_size_bytes: 2108087
- pdf_hyperlinks: http://www.juniper.net/, http://tools.ietf.org/html/rfc2409
- pdf_is_encrypted: False
- pdf_number_of_pages: 156
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |