Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C353P / ineo+ 353P Control Software version A02E0Y0-100_GM012
JISEC-CC-CRP-C0148
Following MFP with FCU (Fax Option Type 5001). MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001 Version: MFP Software/Hardware Version: Software System/Copy 1.00, Network Support 7.29.3, Scanner 01.24, Printer 1.00, Fax 01.00.00, Web Support 1.00.1, Web Uapl 1.02, Network Doc Box 1.00, Hardware Ic Key 1100, Ic Hdd 01, FCU Version: GWFCU3-19(WW) 01.00.00
JISEC-CC-CRP-C0262
name bizhub C353P / ineo+ 353P Control Software version A02E0Y0-100_GM012 Following MFP with FCU (Fax Option Type 5001). MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001 Version: MFP Software/Hardware Version: Software System/Copy 1.00, Network Support 7.29.3, Scanner 01.24, Printer 1.00, Fax 01.00.00, Web Support 1.00.1, Web Uapl 1.02, Network Doc Box 1.00, Hardware Ic Key 1100, Ic Hdd 01, FCU Version: GWFCU3-19(WW) 01.00.00
category Other Devices and Systems Multi-Function Devices
not_valid_after 07.10.2013 02.08.2015
not_valid_before 26.03.2008 30.07.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0262_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0262_est.pdf
manufacturer Konica Minolta Business Technologies, Inc Ricoh Company, Ltd.
manufacturer_web https://www.konicaminolta.com/ https://www.ricoh.com/
dgst b41c1858c9432c46 b3e6ff57f68f0387
heuristics/cert_id JISEC-CC-CRP-C0148 JISEC-CC-CRP-C0262
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions - 1.00.1, 1.02, 01.24, 01.00.00, 1.00, 7.29.3
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0148
  • certification_date: 01.03.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0148_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. network printer (bizhub C353P / ineo+ 353P). This product offers the protection from exposure of the highly confidential document stored in the printer, and aims at protecting the data which may be exposed against a user's intention. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions. - All area overwrite deletion function - HDD encryption key generation function - HDD verification function - Public box authentication function - Secure print authentication function - Trusted channel function - Administrator identification and authentication functions - Service engineer identification and authentication functions
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: Japanese name:bizhub C353P / ineo+ 353P Control Software English name:bizhub C353P / ineo+ 353P Control Software
    • product_type: IT Product (Data protection function in printer systems)
    • report_link: https://www.ipa.go.jp/en/security/c0148_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0148_est.pdf
    • toe_version: A02E0Y0-0100-GM0-12
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.10.2013
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0148_it7166.html
  • toe_overseas_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
  • cert_id: JISEC-CC-CRP-C0262
  • certification_date: 01.07.2010
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0262_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions. TOE security functionality The major security functions of the TOE are: - Audit, which creates audit logs of security events. - Identification and Authentication, which identifies and authenticates users. - Document Data Access Control, which controls each users operation of documents. - Stored Data Protection, which encrypts stored document data on hard disk. - Network Communication Data Protection, which encrypts network communications. - Security Management, which provides total management of the security function settings. - Service Mode Lock, which controls the maintenance functions. - Telephone Line Intrusion Protection, which permits fax only communication. - MFP Control Software Verification, which checks the integrity of the software.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Following MFP with FCU(Fax Option Type 5001) MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001
    • product_type: Multi Function Product
    • report_link: https://www.ipa.go.jp/en/security/c0262_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0262_est.pdf
    • toe_version: MFP Software /Hardware Version : Software System/Copy 1.00 Network Support 7.29.3 Scanner 01.24 Printer 1.00 Fax 01.00.00 Web Support 1.00.1 Web Uapl 1.02 Network Doc Box 1.00 Ic Key 1100 Hardware Ic Hdd 01 FCU Version : GWFCU3-19(WW) 01.00.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.08.2015
  • revalidations: [frozendict({'date': '2011-02', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0262_it0290_01.html'})]
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0262_it0290.html
  • toe_overseas_name: Following MFP with FCU(Fax Option Type 5001) MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001 < Cont. >
pdf_data/report_filename c0148_erpt.pdf c0262_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0148-01: 1
    • Certification No. C0148: 1
  • JP:
    • CRP-C0262-01: 1
    • Certification No. C0262: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL3: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.BRING-OUT-STORAGE: 2
  • A:
    • A.ADMIN: 2
    • A.NETWORK: 1
    • A.SUPERVISOR: 1
  • T:
    • T.ABUSE_SEC_MNG: 3
    • T.FAX_LINE: 3
    • T.ILLEGAL_USE: 4
    • T.SALVAGE: 3
    • T.TRANSIT: 3
    • T.UNAUTH_ACCESS: 7
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
  • TLS:
    • SSL:
      • SSL: 9
    • TLS:
      • TLS: 1
pdf_data/report_keywords/tee_name
  • other:
    • T6: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 180-1: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • BSI:
    • BSI-AIS 31: 2
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • FIPS:
    • FIPS PUB 197: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Hereinafter referred to as”printer”). This TOE offers the protection from exposure of the highly confidential document CRP-C0148-01 2 stored in the printer. Moreover, TOE can encrypt the image data written in HDD for: 1
  • ConfidentialDocument:
    • users, receives the document data from client computers which are connected via Network, stores the confidential document data into HDD of the TOE, and performs outputting by print and delivery. Therefore, the TOE is a: 1
pdf_data/report_metadata
  • /CreationDate: D:20080617154414+09'00'
  • /ModDate: D:20080617154414+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 218797
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
  • /Author:
  • /CreationDate: D:20110114141833+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /ModDate: D:20110114141838+09'00'
  • /Producer: Acrobat Distiller 8.2.3 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 327868
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
pdf_data/st_filename c0148_est.pdf c0262_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 6
    • EAL4: 1
  • EAL:
    • EAL3: 6
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 6
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 41
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 47
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ITC.1: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 65
    • FIA_AFL.1.1: 7
    • FIA_AFL.1.2: 7
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 14
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 58
    • FIA_SOS.1.1: 6
    • FIA_SOS.2: 11
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 22
    • FIA_UAU.2: 76
    • FIA_UAU.2.1: 5
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 2
    • FIA_UID: 3
    • FIA_UID.1: 21
    • FIA_UID.2: 34
    • FIA_UID.2.1: 4
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MOF.1: 136
    • FMT_MOF.1.1: 4
    • FMT_MSA: 5
    • FMT_MSA.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 86
    • FMT_MTD.1.1: 6
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 73
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_ITC.1: 2
    • FPT_RVM.1: 17
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ADF.1: 1
    • FDP_IFC.1: 12
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 6
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 18
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 10
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
    • FTP_TST.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 3
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.CHECK-HDD: 4
    • O.CONFIG: 13
    • O.CRYPT-KEY: 6
    • O.OVERWRITE-ALL: 4
    • O.PUBLIC-BOX: 7
    • O.SECURE-PRINT: 5
    • O.TRUSTED-PASS: 5
  • OE:
    • OE.CRYPT: 5
    • OE.CRYPTO: 1
    • OE.FEED-BACK: 11
    • OE.LOCK-HDD: 4
    • OE.SESSION: 1
  • T:
    • T.ACCESS-NET-SETTING: 3
    • T.ACCESS-PUBLIC-BOX: 3
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 3
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-PRINTER: 3
  • A:
    • A.ADMIN: 5
    • A.NETWORK: 5
    • A.SUPERVISOR: 4
  • O:
    • O.AUDIT: 16
    • O.DOC_ACC: 8
    • O.GENUINE: 9
    • O.LINE: 2
    • O.LINE_PROTECT: 7
    • O.MANAGE: 10
    • O.MEM: 10
    • O.NET: 9
  • OE:
    • OE.ADMIN: 3
    • OE.NETWORK: 3
    • OE.SUPERVISOR: 3
  • T:
    • T.ABUSE_SEC_MNG: 4
    • T.FAX_LINE: 3
    • T.ILLEGAL_USE: 4
    • T.SALVAGE: 3
    • T.TRANSIT: 4
    • T.UNAUTH_ACCESS: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
  • TLS:
    • SSL:
      • SSL: 9
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS PUB 197: 2
  • BSI:
    • BSI-AIS31: 3
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2006-09-002: 1
    • CCMB-2007-09-0004: 1
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
  • FIPS:
    • FIPS197: 3
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the printer. Moreover, TOE can encrypt the image data written in HDD for the danger of: 1
pdf_data/st_metadata
  • /Author:
  • /Company:
  • /CreationDate: D:20080602193009+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20080602193041+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - 【C0148】bizhub353P_英文ST-106-080118_080530.doc
  • pdf_file_size_bytes: 641424
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 97
  • /Author: p000266068
  • /CreationDate: D:20110105171644
  • /Creator: MP_4001_ST_jp.doc - Microsoft Word
  • /Producer: Acrobat PDFWriter 5.0 Windows NT
  • /Title: MP_4001_ST_jp.doc
  • pdf_file_size_bytes: 2064056
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 81
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different