name |
bizhub C353P / ineo+ 353P Control Software version A02E0Y0-100_GM012 |
FIN.X RTOS SE V5 |
category |
Other Devices and Systems |
Operating Systems |
scheme |
JP |
IT |
status |
archived |
active |
not_valid_after |
07.10.2013 |
21.06.2027 |
not_valid_before |
26.03.2008 |
21.06.2022 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_finx_rtos_se_v5_v1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_finx_rtos_se_v5_rev02_lite.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
MBDA Italia S.p.A. |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.mbda-systems.com/ |
security_level |
EAL3 |
{} |
dgst |
b41c1858c9432c46 |
e1338a1b4a36e01a |
heuristics/cert_id |
JISEC-CC-CRP-C0148 |
OCSI/CERT/LEO/08/2021/RC |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
OCSI/CERT/RES/06/2014/RC |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
OCSI/CERT/RES/06/2014/RC, OCSI/CERT/RES/03/2012/RC |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0148
- certification_date: 01.03.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0148_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. network printer (bizhub C353P / ineo+ 353P). This product offers the protection from exposure of the highly confidential document stored in the printer, and aims at protecting the data which may be exposed against a user's intention. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions. - All area overwrite deletion function - HDD encryption key generation function - HDD verification function - Public box authentication function - Secure print authentication function - Trusted channel function - Administrator identification and authentication functions - Service engineer identification and authentication functions
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: Japanese name:bizhub C353P / ineo+ 353P Control Software English name:bizhub C353P / ineo+ 353P Control Software
- product_type: IT Product (Data protection function in printer systems)
- report_link: https://www.ipa.go.jp/en/security/c0148_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0148_est.pdf
- toe_version: A02E0Y0-0100-GM0-12
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.10.2013
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0148_it7166.html
- toe_overseas_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
c40ae795865a0dba, e34797b67a3163c5 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0148_erpt.pdf |
rc_finx_rtos_se_v5_v1.0.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0148-01: 1
- Certification No. C0148: 1
|
- IT:
- OCSI/CERT/LEO/08/2021/RC: 26
- OCSI/CERT/RES/06/2014/RC: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ALC_FLR: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 3
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-NET-SETTING: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 1
- T.BACKUP-RESTORE: 1
- T.BRING-OUT-STORAGE: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Hereinafter referred to as”printer”). This TOE offers the protection from exposure of the highly confidential document CRP-C0148-01 2 stored in the printer. Moreover, TOE can encrypt the image data written in HDD for: 1
|
|
pdf_data/report_metadata |
- /CreationDate: D:20080617154414+09'00'
- /ModDate: D:20080617154414+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 218797
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /Author: OCSI
- /CreationDate: D:20220621125759+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220621130817+02'00'
- /Producer: Microsoft® Word 2016
- /Title: Rapporto di Certificazione del prodotto "FIN.X RTOS SE V5"
- pdf_file_size_bytes: 903328
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
c0148_est.pdf |
st_finx_rtos_se_v5_rev02_lite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 6
- FCS_COP.1: 8
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 41
- FDP_ACC.1.1: 3
- FDP_ACF.1: 47
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ITC.1: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 65
- FIA_AFL.1.1: 7
- FIA_AFL.1.2: 7
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_NEW.1: 14
- FIA_NEW.1.1: 1
- FIA_NEW.1.2: 1
- FIA_SOS: 1
- FIA_SOS.1: 58
- FIA_SOS.1.1: 6
- FIA_SOS.2: 11
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 22
- FIA_UAU.2: 76
- FIA_UAU.2.1: 5
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UAU.7: 15
- FIA_UAU.7.1: 2
- FIA_UID: 3
- FIA_UID.1: 21
- FIA_UID.2: 34
- FIA_UID.2.1: 4
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_CKM.1: 1
- FMT_MOF.1: 136
- FMT_MOF.1.1: 4
- FMT_MSA: 5
- FMT_MSA.1: 3
- FMT_MSA.2: 4
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD.1: 86
- FMT_MTD.1.1: 6
- FMT_SMF.1: 31
- FMT_SMF.1.1: 1
- FMT_SMR.1: 73
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 3
- FPT:
- FPT_ITC.1: 2
- FPT_RVM.1: 17
- FPT_RVM.1.1: 1
- FPT_SEP.1: 13
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 4
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.1.1: 2
- FCS_CKM.2: 6
- FCS_CKM.2.1: 2
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 8
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 25
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT: 1
- FCS_SSHC_EXT.1: 3
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHS_EXT: 2
- FCS_SSHS_EXT.1: 2
- FCS_SSHS_EXT.1.1: 1
- FCS_SSH_EXT: 2
- FCS_SSH_EXT.1: 8
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_SSH_EXT.1.8: 1
- FCS_STO_EXT: 1
- FCS_STO_EXT.1: 4
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 14
- FCS_TLSC_EXT.1.1: 4
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.2: 8
- FCS_TLSC_EXT.2.1: 5
- FCS_TLSC_EXT.3: 8
- FCS_TLSC_EXT.3.1: 1
- FCS_TLSC_EXT.4: 7
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSC_EXT.5: 7
- FCS_TLSC_EXT.5.1: 1
- FCS_TLSS_EXT: 1
- FCS_TLSS_EXT.1: 8
- FCS_TLSS_EXT.1.1: 4
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 1
- FCS_TLSS_EXT.2: 7
- FCS_TLSS_EXT.2.1: 1
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FCS_TLSS_EXT.3: 6
- FCS_TLSS_EXT.3.1: 1
- FCS_TLS_EXT.1: 6
- FCS_TLS_EXT.1.1: 3
- FDP:
- FDP_ACF_EXT: 1
- FDP_ACF_EXT.1: 4
- FDP_ACF_EXT.1.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT.1: 6
- FMT_MOF_EXT.1.1: 1
- FMT_SMF_EXT: 2
- FMT_SMF_EXT.1: 4
- FMT_SMF_EXT.1.1: 2
- FPT:
- FPT_ACF_EXT: 1
- FPT_ACF_EXT.1: 4
- FPT_ACF_EXT.1.1: 1
- FPT_ACF_EXT.1.2: 1
- FPT_ASLR_EXT: 1
- FPT_ASLR_EXT.1: 4
- FPT_ASLR_EXT.1.1: 1
- FPT_SBOP_EXT: 1
- FPT_SBOP_EXT.1: 4
- FPT_SBOP_EXT.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 4
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.2: 4
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 9
- FTP_ITC_EXT.1.1: 1
- FTP_TRP: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.NETWORK: 3
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.CHECK-HDD: 4
- O.CONFIG: 13
- O.CRYPT-KEY: 6
- O.OVERWRITE-ALL: 4
- O.PUBLIC-BOX: 7
- O.SECURE-PRINT: 5
- O.TRUSTED-PASS: 5
- OE:
- OE.CRYPT: 5
- OE.CRYPTO: 1
- OE.FEED-BACK: 11
- OE.LOCK-HDD: 4
- OE.SESSION: 1
- T:
- T.ACCESS-NET-SETTING: 3
- T.ACCESS-PUBLIC-BOX: 3
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-PRINTER: 3
|
- A:
- A.PLATFORM: 3
- A.PROPER_ADMIN: 3
- A.PROPER_USER: 3
- O:
- O.ACCOUNTABILITY: 6
- O.INTEGRITY: 6
- O.MANAGEMENT: 6
- O.PROTECTED_COMMS: 8
- O.PROTECTED_STORAGE: 4
- OE:
- OE.PLATFORM: 3
- OE.PROPER_ADMIN: 3
- OE.PROPER_USER: 3
- T:
- T.LIMITED_PHYSICAL_ACCESS: 2
- T.LOCAL_ATTACK: 2
- T.NETWORK_ATTACK: 6
- T.NETWORK_EAVESDROP: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 12
- AES-128: 2
- AES-192: 1
- AES-256: 3
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 5
- SHA-256: 6
- SHA-384: 3
- SHA-512: 6
- SHA256: 5
- SHA384: 4
- SHA512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 119
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 5
- TLS v1.2: 3
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 4
- P-384: 4
- P-521: 4
- secp256r1: 4
- secp384r1: 4
- secp521r1: 4
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 3
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_GCM_SHA384: 3
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 180-1: 2
- FIPS PUB 197: 2
|
- CC:
- CCIMB-2012-09-003: 1
- CCMB-2012-09-001: 1
- FIPS:
- FIPS 186-4: 2
- FIPS PUB 186-4: 5
- FIPS140: 2
- FIPS186: 1
- FIPS186-4: 4
- FIPS197: 2
- FIPS198-1: 1
- NIST:
- NIST SP 800-131A: 1
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-57: 2
- NIST SP 800-90A: 1
- RFC:
- RFC 3526: 2
- RFC 4151: 1
- RFC 4251: 1
- RFC 4252: 5
- RFC 4253: 11
- RFC 4256: 2
- RFC 4344: 3
- RFC 5246: 21
- RFC 5280: 4
- RFC 5288: 12
- RFC 5289: 24
- RFC 5656: 16
- RFC 5759: 1
- RFC 6125: 2
- RFC 6668: 3
- RFC 6960: 1
- RFC 8017: 1
- RFC 8268: 2
- RFC 8332: 7
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the printer. Moreover, TOE can encrypt the image data written in HDD for the danger of: 1
|
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects that are accessible to users but cannot be used to store: 1
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author:
- /Company:
- /CreationDate: D:20080602193009+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20080602193041+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - 【C0148】bizhub353P_英文ST-106-080118_080530.doc
- pdf_file_size_bytes: 641424
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 97
|
- /Author: MBDA Italia S.p.A.
- /CreationDate: D:20220620122243Z00'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220620122243Z00'00'
- /Producer: Mac OS X 10.13.6 Quartz PDFContext
- /Title: FIN.X RTOS SE V5 Security Target (Lite)
- pdf_file_size_bytes: 1810845
- pdf_hyperlinks: https://www.ietf.org/rfc/rfc6668.txt, https://datatracker.ietf.org/doc/html/rfc4344, http://www.gentoo.org/, http://www.ietf.org/rfc/rfc5647.txt, http://www.ietf.org/rfc/rfc5656.txt, http://rt.wiki.kernel.org/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0525, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0463, http://www.ietf.org/rfc/rfc4251.txt, https://datatracker.ietf.org/doc/html/rfc5280, http://www.ietf.org/rfc/rfc2898.txt, https://tools.ietf.org/html/rfc5289, https://tools.ietf.org/html/rfc8332, https://tools.ietf.org/html/rfc5246, http://www.ietf.org/rfc/rfc4252.txt, https://www.ietf.org/rfc/rfc4256.txt, http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, https://tools.ietf.org/html/rfc6125, http://www.ietf.org/rfc/rfc4253.txt, https://tools.ietf.org/html/rfc5288, http://www.ietf.org/rfc/rfc4254.txt, https://datatracker.ietf.org/doc/html/rfc8268
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |