Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C353P / ineo+ 353P Control Software version A02E0Y0-100_GM012
JISEC-CC-CRP-C0148
fiskaly Security Module Application for Electronic Record-keeping Systems, Version 1.0.6
BSI-DSZ-CC-1130-V2-2021
name bizhub C353P / ineo+ 353P Control Software version A02E0Y0-100_GM012 fiskaly Security Module Application for Electronic Record-keeping Systems, Version 1.0.6
scheme JP DE
status archived active
not_valid_after 07.10.2013 02.12.2029
not_valid_before 26.03.2008 03.12.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1130V2c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1130V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1130V2b_pdf.pdf
manufacturer Konica Minolta Business Technologies, Inc fiskaly GmbH
manufacturer_web https://www.konicaminolta.com/ https://fiskaly.com
security_level EAL3 EAL2, ALC_CMS.3, ALC_LCD.1
dgst b41c1858c9432c46 a9cd9ec3d06930f7
heuristics/cert_id JISEC-CC-CRP-C0148 BSI-DSZ-CC-1130-V2-2021
heuristics/cert_lab [] BSI
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 ALC_LCD.1, ALC_CMS.3, ADV_ARC.1, ATE_IND.2
heuristics/extracted_versions - 1.0.6
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-1130-V3-2025
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1130-2021
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-1130-V3-2025, BSI-DSZ-CC-1130-V4-2025
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1153-2021, BSI-DSZ-CC-1130-2021
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0148
  • certification_date: 01.03.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0148_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. network printer (bizhub C353P / ineo+ 353P). This product offers the protection from exposure of the highly confidential document stored in the printer, and aims at protecting the data which may be exposed against a user's intention. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions. - All area overwrite deletion function - HDD encryption key generation function - HDD verification function - Public box authentication function - Secure print authentication function - Trusted channel function - Administrator identification and authentication functions - Service engineer identification and authentication functions
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: Japanese name:bizhub C353P / ineo+ 353P Control Software English name:bizhub C353P / ineo+ 353P Control Software
    • product_type: IT Product (Data protection function in printer systems)
    • report_link: https://www.ipa.go.jp/en/security/c0148_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0148_est.pdf
    • toe_version: A02E0Y0-0100-GM0-12
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.10.2013
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0148_it7166.html
  • toe_overseas_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
heuristics/protection_profiles {} 2b68318b6d8b660f
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0105V2b_pdf.pdf
pdf_data/cert_filename 1130V2c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1130-V2-2021: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0105-V2-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_CMS.3: 1
    • ALC_LCD.1: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20211203141837+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, "
  • /ModDate: D:20211207132115+01'00'
  • /Producer: LibreOffice 6.3
  • /Subject: fiskaly Security Module Application, Fiscalization
  • /Title: Certification Report BSI-DSZ-CC-1130-V2-2021
  • pdf_file_size_bytes: 364026
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0148_erpt.pdf 1130V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 2 augmented by ALC_LCD.1 and ALC_CMS.3
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1130-V2-2021
    • cert_item: fiskaly Security Module Application for Electronic Record-keeping Systems, Version 1.0.6
    • cert_lab: BSI
    • developer: fiskaly GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Security Module Application for Electronic Record-keeping Systems (SMAERS) Version 1.0, 15 July 2020, BSI-CC-PP- 0105-V2-2020
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0148-01: 1
    • Certification No. C0148: 1
  • DE:
    • BSI-DSZ-CC-1130-2021: 2
    • BSI-DSZ-CC-1130-V2-2021: 14
  • NL:
    • CC-1130-2021: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0105-V2-2020: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 1: 1
    • EAL 2: 6
    • EAL 2 augmented: 3
    • EAL 2+: 1
    • EAL 4: 2
    • EAL2: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMS.3: 4
    • ALC_FLR: 2
    • ALC_LCD.1: 4
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 2
    • FCS_COP.1: 1
    • FCS_RNG.1: 1
  • FMT:
    • FMT_MSA.4: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.BRING-OUT-STORAGE: 2
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
  • PACE:
    • PACE: 6
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/ecc_curve
  • NIST:
    • Curve P-256: 1
    • P-256: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 180-1: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS20: 4
    • AIS31: 1
  • FIPS:
    • FIPS 186-4: 4
    • FIPS PUB 186-4: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Hereinafter referred to as”printer”). This TOE offers the protection from exposure of the highly confidential document CRP-C0148-01 2 stored in the printer. Moreover, TOE can encrypt the image data written in HDD for: 1
  • ConfidentialDocument:
    • Record-keeping Systems TOE Ver-sion 1.0.6, Version: 1.2.0, Date: 2021-08-31, fiskaly GmbH (confidential document) 7 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
    • Record-keeping Systems TOE Version 1.0.6, Version: 1.1.5, Date: 2021- 08-31, fiskaly GmbH (confidential document) [13] Umgebungsschutzkonzept fiskaly Security Module Application for Electronic Record-keeping: 1
    • SHA256 value 54ED663586E16DC46FF13A28CE530A284DA8E7CF473C44AA37C1E11845823B BE, fiskaly GmbH (confidential document) [11] Preparative Procedures & Operational User Guidance Documentation fiskaly Security Module: 1
    • Systems Version 1.0.6, Version 2.3, Date: 2021-10-12, SRC Security Research & Consulting GmbH, (confidential document) [8] Protection Profile Common Criteria Protection Profile Security Module Application for: 1
    • TOE Version 1.0.6, Version: 1.3.6, Date: 2021-08-31, fiskaly GmbH (confidential document) 23 / 25 Certification Report BSI-DSZ-CC-1130-V2-2021 C. Excerpts from the Criteria For the: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /CreationDate: D:20080617154414+09'00'
  • /ModDate: D:20080617154414+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 218797
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename c0148_est.pdf 1130V2b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0104-2019: 1
    • BSI-CC-PP-0105-V2-2020: 5
    • BSI-CC-PP-0108-2019: 1
    • BSI-CC-PP-0111-2019: 1
    • BSI-CC-PP-0113-2019: 1
    • BSI-CC-PP-0113-2020: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 6
    • EAL4: 1
  • EAL:
    • EAL2: 5
    • EAL2 augmented: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ADV:
    • ADV_ARC.1: 1
  • ALC:
    • ALC_CMS.3: 5
    • ALC_LCD.1: 4
  • ATE:
    • ATE_IND.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 6
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 41
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 47
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ITC.1: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 65
    • FIA_AFL.1.1: 7
    • FIA_AFL.1.2: 7
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 14
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 58
    • FIA_SOS.1.1: 6
    • FIA_SOS.2: 11
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 22
    • FIA_UAU.2: 76
    • FIA_UAU.2.1: 5
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 2
    • FIA_UID: 3
    • FIA_UID.1: 21
    • FIA_UID.2: 34
    • FIA_UID.2.1: 4
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MOF.1: 136
    • FMT_MOF.1.1: 4
    • FMT_MSA: 5
    • FMT_MSA.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 86
    • FMT_MTD.1.1: 6
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 73
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_ITC.1: 2
    • FPT_RVM.1: 17
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 7
    • FAU_GEN.1: 3
    • FAU_STG: 9
    • FAU_STG.1: 3
    • FAU_STG.3: 5
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 5
    • FCS_COP.1.1: 1
    • FCS_RNG: 4
    • FCS_RNG.1: 9
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 6
    • FDP_ACC.1: 16
    • FDP_ACF: 10
    • FDP_ACF.1: 14
    • FDP_DAU: 5
    • FDP_ETC: 15
    • FDP_ETC.2: 12
    • FDP_IFC.1: 9
    • FDP_ITC: 12
    • FDP_ITC.1: 2
    • FDP_ITC.2: 19
    • FDP_RIP: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 4
    • FIA_API.1: 8
    • FIA_API.1.1: 2
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 5
    • FIA_UAU.6: 3
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 5
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
    • FIA_USB.1: 2
    • FIA_USB.1.1: 3
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 4
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 3
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 3
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 4
    • FMT_MSA.4.1: 1
    • FMT_MTD: 16
    • FMT_MTD.1: 4
    • FMT_MTD.3: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 5
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS: 2
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 5
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TEE.1: 19
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC: 7
    • FTP_ITC.1: 6
    • FTP_TEE.1: 1
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 3
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.CHECK-HDD: 4
    • O.CONFIG: 13
    • O.CRYPT-KEY: 6
    • O.OVERWRITE-ALL: 4
    • O.PUBLIC-BOX: 7
    • O.SECURE-PRINT: 5
    • O.TRUSTED-PASS: 5
  • OE:
    • OE.CRYPT: 5
    • OE.CRYPTO: 1
    • OE.FEED-BACK: 11
    • OE.LOCK-HDD: 4
    • OE.SESSION: 1
  • T:
    • T.ACCESS-NET-SETTING: 3
    • T.ACCESS-PUBLIC-BOX: 3
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 3
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-PRINTER: 3
  • A:
    • A.CSP: 3
  • O:
    • O.IAA: 4
    • O.TEE: 8
    • O.TST: 4
  • OE:
    • OE.CSP: 5
    • OE.ERS: 7
    • OE.SUCP: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 1
      • AES-256: 3
  • constructions:
    • MAC:
      • CMAC: 5
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
  • PACE:
    • PACE: 22
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 10
pdf_data/st_keywords/cipher_mode
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • Edwards:
    • Ed25519: 1
  • NIST:
    • Curve P-256: 1
    • P-256: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03116: 1
    • BSI TR-03116-5: 1
    • BSI TR-03151: 6
    • BSI TR-03153: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
  • other:
    • TEE: 8
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS PUB 197: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 186-4: 1
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 19790: 6
    • ISO/IEC 27001: 2
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the printer. Moreover, TOE can encrypt the image data written in HDD for the danger of: 1
pdf_data/st_metadata
  • /Author:
  • /Company:
  • /CreationDate: D:20080602193009+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20080602193041+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - 【C0148】bizhub353P_英文ST-106-080118_080530.doc
  • pdf_file_size_bytes: 641424
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 97
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different