name |
KONICA MINOLTA bizhub 650i/bizhub 550i with FK-514, DEVELOP ineo 650i/ineo 550i with FK-514 G00-31 |
Intel® SOA Expressway v2.7.0.4 and Intel® SOA Expressway v2.7.0.4 for Healthcare |
category |
Multi-Function Devices |
Boundary Protection Devices and Systems |
scheme |
JP |
CA |
status |
active |
archived |
not_valid_after |
12.01.2026 |
15.05.2017 |
not_valid_before |
12.01.2021 |
30.09.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0699_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/intel-soa-v2704-cert-eng.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/c0699_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1627_ST-Version_1_9%20(2).pdf |
manufacturer |
KONICA MINOLTA, INC. |
Intel Corporation |
manufacturer_web |
|
https://www.intel.com |
security_level |
{} |
EAL4+, ALC_FLR.1 |
dgst |
aaa6f7597f3fd5e9 |
ab8096e5557ad548 |
heuristics/cert_id |
JISEC-CC-CRP-C0699-01-2021 |
383-4-121 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_550i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_650i:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
31, 514 |
2.7.0.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0699
- certification_date: 01.05.2022
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0699
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000030lw-att/c0699kz_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: KONICA MINOLTA bizhub 650i/bizhub 550i with FK-514, DEVELOP ineo 650i/ineo 550i with FK-514, Sindoh N802/N801/MF6111/ MF5101 with FK-514
- product_type: Multi-Function Printer
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000030lw-att/c0699kz_eacr.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000030lw-att/c0699kz_est.pdf
- toe_version: G00-31
- vendor: KONICA MINOLTA, INC.
- expiration_date:
- supplier: KONICA MINOLTA, INC.
- toe_japan_name: KONICA MINOLTA bizhub 650i / bizhub 550i with FK-514, DEVELOP ineo 650i / ineo 550i with FK-514G00-31
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0699_it0760_01.html
- toe_overseas_name: KONICA MINOLTA bizhub 650i / bizhub 550i with FK-514, DEVELOP ineo 650i / ineo 550i with FK-514, Sindoh N802 / N801 / MF6111 / MF5101 with FK-514G00-31
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0699_erpt.pdf |
intel-soa-v2704-cert-eng.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0699-01-2021: 1
|
- CA:
- 383-4-121: 1
- 383-4-121-CR: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- FIPS:
- FIPS 140-2: 1
- FIPS 197: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20210215174747+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20210215174835+09'00'
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20210215005459
- pdf_file_size_bytes: 308250
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 32
|
- /Author: sjackson
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: 29 August 2011
- /CR_Version: 0.2
- /Client City: Oakbrook Terrace
- /Client Country: USA
- /Client Full Name: Intel Corporation
- /Client Postal Code: 60181
- /Client Short Name: Intel
- /Client State: Illinois
- /Client Street: 1815 South Meyers Road, Suite 150
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company: Microsoft
- /CreationDate: D:20111025093327-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer Long Name: Intel Corporation
- /Developer Short Name: Intel
- /EAL Level: 4+
- /EAL Level Base: 4
- /EAL Long: EAL 4 Augmented
- /EAL Short: EAL 4+
- /ETPlan_Doc#: 1627-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: X.X
- /ETPlan_date: dd month yyyyy
- /ETProcRes_Date: dd month yyyyy
- /ETProcRes_Doc#: 1627-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: X.X
- /ETProc_Date: dd month yyyyy
- /ETProc_Doc#: 1627-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: X.X
- /ETReport_Date: X August 2011
- /ETReport_Doc#: 1627-000-D002
- /ETReport_Title: Preliminary Evaluation Technical Report
- /ETReport_TitleShort: PETR
- /ETReport_Version: 1.2
- /EWP_Date: 1 April 2011
- /EWP_Doc#: 1627-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.1
- /Eval number: 383-4-121
- /Eval_End_Date: [dd month yyyy (date on certificate)]
- /Eval_Start_Date: dd month yyyy
- /Keywords:
- /ModDate: D:20111025093514-04'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /ProjectNumber: 1627
- /ST_Date: 24 August 2011
- /ST_Title: Intel® SOA Expressway v2.7 Security Target
- /ST_Version: Version 1.8
- /SVR_Date: dd month yyyyy
- /SVR_Doc#: 1627-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: X.X
- /SV_City: TBD
- /Security Classification: EWA-Canada & Intel Proprietary
- /SourceModified: D:20111025133130
- /Sponsor: Intel®
- /Sponsor City: tbd
- /Sponsor Country: tbd
- /Sponsor Postal Code: tbd
- /Sponsor State: tbd
- /Sponsor Street: tbd
- /Subject:
- /TOE: SOA Expressway
- /TOE Short: SOAE
- /TOE Short with version: tbd
- /TOE Short-NoTM: SOAE v2.7.0.4
- /TOE Version: tbd
- /TOE with version: Intel® SOA Expressway v2.7.0.4 and SOA Expressway v2.7.0.4 for Healthcare
- /TOE-NoTM: tbd
- /Title: EAL X+ Evaluation of [Developer Long Name]
- pdf_file_size_bytes: 82511
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
pdf_data/st_filename |
c0699_est.pdf |
1627_ST-Version_1_9 (2).pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_FLR.2: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_CKM_EXT: 2
- FAU_GEN: 10
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 33
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 16
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 55
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 17
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT.1: 6
- FDP:
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_FXS_EXT: 2
- FDP_FXS_EXT.1: 6
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT: 2
- FIA_PSK_EXT.1: 9
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 9
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 3
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_ARP: 1
- FAU_ARP.1: 8
- FAU_ARP.1.1: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FAU_STG.4: 10
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 2
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ETC.1: 8
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC.1: 17
- FDP_IFC.1.1: 2
- FDP_IFF.1: 19
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_ATD.1: 10
- FIA_ATD.1.1: 2
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UAU.5: 13
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 23
- FMT_MOF.1.1: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_MTD.2: 9
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_REV.1: 17
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 3
- FRU:
- FRU_FLT.2: 7
- FRU_FLT.2.1: 1
- FRU_RSA.1: 10
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 5
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 4
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.ACCESS: 3
- A.ASSET: 1
- A.DIRECT: 4
- A.GENPUR: 2
- A.LOWEXP: 4
- A.NOEVIL: 2
- A.NOREMO: 4
- A.PHYSEC: 2
- A.PUBLIC: 4
- A.REMACC: 2
- A.SINGEN: 4
- A.TIME_SOURCE: 3
- O:
- O.ACCOUN: 14
- O.ALARM: 9
- O.AUDIT: 10
- O.AUDREC: 4
- O.CRYPTOGRAPHY: 10
- O.EAL: 3
- O.ENCRYP: 6
- O.IDAUTH: 10
- O.LIMEXT: 4
- O.MEDIAT: 13
- O.ROLE: 7
- O.SECFUN: 11
- O.SECSTA: 5
- O.SELPRO: 8
- O.SINUSE: 6
- O.TOE_AVAILABLE: 11
- OE:
- OE.ACCESS: 2
- OE.ADMTRA: 4
- OE.ASSET: 2
- OE.CONSOLE: 2
- OE.DIRECT: 3
- OE.GENPUR: 3
- OE.GUIDAN: 3
- OE.GUIDANCE: 1
- OE.IDAUTH: 4
- OE.LOWEXP: 3
- OE.NOEVIL: 3
- OE.NOREMO: 3
- OE.PHYSCEC: 1
- OE.PHYSEC: 2
- OE.PUBLIC: 4
- OE.REMACC: 3
- OE.SINGEN: 3
- OE.TIME_SOURCE: 4
- T:
- T.ASPOOF: 4
- T.ATTACK_DATA: 3
- T.ATTACK_POTENTIAL: 5
- T.AUDACC: 2
- T.AUDFUL: 4
- T.AUDIT_UNDETECTED: 3
- T.BAD_ADMIN: 5
- T.BAD_CREDENTIALS: 3
- T.CAPTURE: 5
- T.DENIAL: 3
- T.ENHANCEDEXP: 5
- T.HIJACK: 3
- T.INTERNAL: 5
- T.LOWEXP: 1
- T.MEDIAT: 2
- T.MODIFY_: 1
- T.MODIFY_PROTOCOL: 4
- T.NOAUTH: 3
- T.OLDINF: 4
- T.PROCOM: 2
- T.REMOTE_ATTACK: 5
- T.REPEAT: 2
- T.REPLAY: 4
- T.SELPRO: 2
- T.SERVICE_MISUSE: 5
- T.UNAVAILABLE: 3
- T.USAGE: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 6
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 15
- SHA-384: 6
- SHA-512: 9
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 5
- IKEv1: 14
- IKEv2: 3
- IPsec:
- SSH:
- TLS:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 2
- FIPS PUB 186-4: 5
- FIPS PUB 197: 2
- FIPS PUB 198-1: 2
- ISO:
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-90A: 3
- PKCS:
- RFC:
- RFC 2407: 1
- RFC 3602: 7
- RFC 4106: 2
- RFC 4109: 2
- RFC 4301: 3
- RFC 4303: 3
- RFC 4304: 3
- RFC 4868: 5
- RFC 5282: 1
- RFC3602: 1
|
- FIPS:
- FIPS 140-2: 8
- FIPS 197: 2
- FIPS PUB 140-2: 2
- NIST:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: e08884
- /CreationDate: D:20210212143601+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210215174723+09'00'
- /Producer: Acrobat Distiller 15.0 (Windows)
- /Title: Microsoft Word - 【C0699】[英] ASE_EagleBK H-2.00-201221.docx
- pdf_file_size_bytes: 889040
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 71
|
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: Mark Gauvreau
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: [dd month yyyy]
- /CR_Version: [x.x]
- /Client City: Oakbrook Terrace
- /Client Country: U.S.A.
- /Client Full Name: Intel Corporation
- /Client Postal Code: 60181
- /Client Short Name: Intel
- /Client State: Illinois
- /Client Street: 1815 South Meyers Road, Suite 150
- /Comments: CC V3.1 Evaluation Work Plan
Template Version 1_2
- /Company: EWA-Canada
- /CreationDate: D:20111123095733-05'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer Long Name: Intel Corporation
- /Developer Short Name: Intel
- /EAL Level: 4+
- /EAL Level Base: 4
- /EAL Long: EAL 4+
- /EAL Short: EAL 4+
- /ETPlan_Doc#: 1627-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: [0.x]
- /ETPlan_date: [dd month yyyy]
- /ETProcRes_Date: [dd month yyyy]
- /ETProcRes_Doc#: 1627-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: [0.x]
- /ETProc_Date: [dd month yyyy]
- /ETProc_Doc#: 1627-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: [0.x]
- /ETReport_Date: [dd month yyyy]
- /ETReport_Doc#: 1627-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_Version: [0.x]
- /EWP_Date: [dd month yyyy]
- /EWP_Doc#: 1627-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: [0.x]
- /Eval number: [TBD]
- /Eval_End_Date: [dd month yyyy (date on certificate)]
- /Eval_Start_Date: [dd month yyyy (registration)]
- /ModDate: D:20111123134717-05'00'
- /Producer: Adobe PDF Library 10.0
- /ProjectNumber: 1627
- /ST_Date: August 30, 2011
- /ST_Doc#: 1627-006
- /ST_Title: Intel® SOA Expressway v2.7.0.4 and Intel® SOA Expressway v2.7.0.4 for Healthcare Security Target
- /ST_Version: 1.9
- /SVR_Date: [dd month yyyy]
- /SVR_Doc#: 1627-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: [0.x]
- /SV_City: [site vist city/cities]
- /Security Classification: EWA-Canada & Intel Proprietary
- /SourceModified: D:20111123145656
- /Sponsor: Intel Corporation
- /Sponsor City: Oakbrook Terrace
- /Sponsor Country: U.S.A
- /Sponsor Postal Code: 60181
- /Sponsor State: Illinois
- /Sponsor Street: 1815 South Meyers Road, Suite 150
- /TOE: Intel® SOA Expressway
- /TOE Short: SOAE
- /TOE Short with version: SOAE Version 2.7.0.4
- /TOE Short-NoTM: SOAE
- /TOE Version: Version 2.7.0.4
- /TOE with version: Intel® SOA Expressway Version 2.7.0.4
- /Title: Evaluation Work Plan
- pdf_file_size_bytes: 1040341
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |