name |
TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J |
Check Point VPN-1 NGX |
category |
Other Devices and Systems |
Boundary Protection Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
01.09.2016 |
01.11.2014 |
not_valid_before |
31.08.2011 |
01.11.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0308_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10352-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0308_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10352-st.pdf |
manufacturer |
KYOCERA MITA Corporation |
Check Point Software Technologies Ltd. |
manufacturer_web |
https://www.kyoceramita.com/ |
https://www.checkpoint.com/ |
security_level |
EAL3 |
AVA_VLA.3, EAL4+, ALC_FLR.3 |
dgst |
bc7181356569d9c6 |
06533f545c283c4b |
heuristics/cert_id |
JISEC-CC-CRP-C0308 |
CCEVS-VR-VID-10352-2012 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
cpe:2.3:h:kyocera:taskalfa_3500i:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_5500i:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_4500i:-:*:*:*:*:*:*:* |
cpe:2.3:a:checkpoint:vpn-1:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2004-0699 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ADV_RCR.1, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ALC_FLR.3, ATE_FUN.1, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
heuristics/extracted_versions |
1.00 |
1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0308
- certification_date: 01.08.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0308_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 3500i - TASKalfa 4500i - TASKalfa 5500i This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E)
- product_type: Data protection function in digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0308_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0308_est.pdf
- toe_version: V1.00J
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.09.2016
- supplier: KYOCERA MITA Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0308_it0326.html
- toe_japan_name: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J
- toe_overseas_link: None
- toe_overseas_name: -----
|
- category: Firewall, Virtual Private Network, Wireless Monitoring
- certification_date: 01.11.2012
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10353
- product: Check Point IP Appliances with VPN-1 NGX
- scheme: US
- url: https://www.niap-ccevs.org/product/10353
- vendor: Check Point Software Technologies Ltd
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
fdcf1d342da6f23a, 3af2791847aec55b, 92feb3250d1c164e |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_fw_al_mr_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_fw_tf_mr_v1.4.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_v1.6.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0308_erpt.pdf |
st_vid10352-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10352-2012
- cert_item: Check Point Software Technologies LTD Check Point VPN-1 NGX
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0308-01: 1
- Certification No. C0308: 1
|
- US:
- CCEVS-VR-VID10352-2012: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 10
- EAL4: 5
- EAL4 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FDP:
- FDP_UCT.1.1: 1
- FDP_UIT.1: 1
- FIA:
- FTP:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CE: 1
- A.LOCATION: 1
- A.NETWORK: 2
|
- A:
- A.DIRECT: 1
- A.GENPUR: 1
- A.MODEXP: 1
- A.NOEVIL: 1
- A.NOREMO: 1
- A.PHYSEC: 1
- A.PUBLIC: 1
- A.REMACC: 1
- A.SINGEN: 1
- O:
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
|
- CC:
- CCIMB-2004-01-002: 1
- CCMB-2004-01-004: 1
- FIPS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20111017144607+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20111017144639+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 238454
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 29
|
- /Author: Daniel P. Faigin
- /CreationDate: D:20121114094453
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20121114094453
- /Producer: Microsoft® Office Word 2007
- /Title: Validators Report
- pdf_file_size_bytes: 469393
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
c0308_est.pdf |
st_vid10352-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL 3: 1
- EAL 4: 29
- EAL 5: 1
- EAL 9: 1
- EAL2: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 3
- ACM_CAP.3: 1
- ACM_CAP.4: 4
- ACM_SCP.2: 3
- ADO:
- ADO_DEL.2: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 8
- ADV_FSP.2: 8
- ADV_HLD.1: 2
- ADV_HLD.2: 8
- ADV_IMP.1: 9
- ADV_LLD.1: 7
- ADV_RCR.1: 10
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 10
- AGD_USR.1: 8
- ALC:
- ALC_DVS.1: 4
- ALC_FLR.3: 8
- ALC_LCD.1: 2
- ALC_TAT.1: 6
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 9
- ATE_IND.2: 2
- AVA:
- AVA_MSU.2: 3
- AVA_SOF.1: 2
- AVA_VLA.3: 11
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 26
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 10
- FAU_GEN.2.1: 1
- FAU_SAA.3: 12
- FAU_SAA.3.1: 1
- FAU_SAA.3.2: 1
- FAU_SAA.3.3: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_SEL.1: 10
- FAU_SEL.1.1: 1
- FAU_STG.1: 4
- FAU_STG.2: 15
- FAU_STG.2.1: 1
- FAU_STG.2.2: 2
- FAU_STG.2.3: 1
- FAU_STG.3: 9
- FAU_STG.3.1: 1
- FAU_STG.4: 14
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.2: 27
- FCS_CKM.2.1: 3
- FCS_CKM.4: 4
- FCS_COP.1: 87
- FCS_COP.1.1: 8
- FCS_ITC.1: 4
- FDP:
- FDP_ACC.1: 3
- FDP_IFC.1: 43
- FDP_IFC.1.1: 3
- FDP_IFF.1: 47
- FDP_IFF.1.1: 5
- FDP_IFF.1.2: 4
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.6: 3
- FDP_RIP.1: 4
- FDP_RIP.2: 10
- FDP_RIP.2.1: 1
- FDP_UCT.1: 17
- FDP_UCT.1.1: 2
- FDP_UIT.1: 16
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 2
- FIA:
- FIA_AFL.1: 6
- FIA_ATD.1: 12
- FIA_ATD.1.1: 2
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 42
- FIA_UAU.5.1: 4
- FIA_UAU.5.2: 3
- FIA_UID.1: 5
- FIA_UID.2: 17
- FIA_UID.2.1: 1
- FIA_USB.1: 14
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 53
- FMT_MOF.1.1: 5
- FMT_MSA.1: 58
- FMT_MSA.1.1: 7
- FMT_MSA.2: 4
- FMT_MSA.3: 18
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 1
- FMT_MTD.1: 39
- FMT_MTD.1.1: 4
- FMT_MTD.2: 3
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 13
- FPT_AMT.1.1: 2
- FPT_ITA.1: 1
- FPT_ITC.1: 1
- FPT_ITI.1: 1
- FPT_ITT.1: 10
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 3
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 19
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 2
- FTP_TRP.1: 14
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CE: 3
- A.LOCATION: 4
- A.NETWORK: 4
- O:
- O.ENCRYPT: 4
- O.OVERWRITE: 5
- OE:
- OE.CE: 2
- OE.LOCATION: 2
- OE.NETWORK: 2
|
- A:
- A.ACCESS: 1
- A.DIRECT: 2
- A.GENPUR: 2
- A.MODEXP: 1
- A.NOEVIL: 2
- A.NOREMO: 1
- A.PHYSEC: 2
- A.PUBLIC: 1
- A.REMACC: 2
- A.SINGEN: 1
- O:
- O.ACCESS: 3
- O.ACCESS-: 1
- O.ACCOUN: 4
- O.AUDITS: 4
- O.AUDREC: 10
- O.CREDEN: 1
- O.EADMIN: 5
- O.EAL: 10
- O.ENCRYP: 7
- O.EXPORT: 3
- O.GENPUR: 1
- O.IDANLZ: 11
- O.IDAUTH: 17
- O.IDSCAN: 2
- O.IDSENS: 8
- O.INSTAL: 2
- O.INTEGR: 4
- O.INTROP: 2
- O.LIMEXT: 3
- O.MEDIAT: 8
- O.MEDIATE: 1
- O.NOREMO: 1
- O.OFLOWS: 7
- O.PERSON: 2
- O.PHYCAL: 2
- O.PROTCT: 3
- O.RESPON: 8
- O.SECFUN: 13
- O.SECSTA: 4
- O.SELPRO: 6
- O.SINUSE: 3
- O.VPN: 8
- OE:
- T:
- T.ASPOOF: 1
- T.AUDACC: 1
- T.AUDFUL: 1
- T.INADVE: 2
- T.MEDIAT: 4
- T.MISACT: 3
- T.MISUSE: 4
- T.MODEXP: 2
- T.NACCESS: 2
- T.NMODIFY: 2
- T.NOAUTH: 5
- T.OLDINF: 1
- T.PROCOM: 2
- T.REPEAT: 1
- T.REPLAY: 2
- T.SELPRO: 2
- T.TUSAGE: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 28
- TLS v1.0: 1
- TLSv1.0: 7
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCIMB-2004-01-001: 2
- CCIMB-2004-01-003: 1
- FIPS:
- FIPS 140-1: 1
- FIPS 140-2: 11
- FIPS 180-2: 1
- FIPS 46-3: 1
- FIPS PUB 140-1: 3
- FIPS PUB 140-2: 5
- FIPS PUB 180-2: 1
- FIPS PUB 197: 3
- FIPS PUB 198: 3
- FIPS PUB 46-3: 8
- FIPS140: 1
- FIPS197: 1
- FIPS198: 1
- FIPS46-3: 1
- PKCS:
- PKCS #1: 1
- PKCS#1: 4
- PKCS#12: 1
- RFC:
- RFC 0854: 1
- RFC 0959: 1
- RFC 1305: 1
- RFC 1777: 2
- RFC 1778: 1
- RFC 2104: 3
- RFC 2138: 1
- RFC 2246: 3
- RFC 2401: 1
- RFC 2404: 3
- RFC 2406: 3
- RFC 2409: 5
- RFC 2616: 1
- RFC 2818: 1
- RFC 2821: 1
- RFC 2865: 1
- RFC 3947: 1
- RFC 3948: 1
- RFC 792: 1
- RFC0854: 1
- RFC0959: 2
- RFC1305: 1
- RFC1777: 1
- RFC1778: 1
- RFC2104: 1
- RFC2138: 1
- RFC2246: 3
- RFC2401: 2
- RFC2404: 1
- RFC2406: 1
- RFC2409: 1
- RFC2616: 1
- RFC2818: 1
- RFC2821: 2
- RFC2865: 1
- RFC3947: 1
- RFC3948: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: KYOCERA MITA Corporation
- /CreationDate: D:20111007112509+09'00'
- /Creator: CubePDF
- /Keywords: Security Target
- /ModDate: D:20111007112514+09'00'
- /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
- /Subject:
- /Title: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) Japan Version Security Target
- pdf_file_size_bytes: 341566
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /Author: Nir Naaman
- /CC_SK: sk35763
- /Company: Check Point Software Technologies Ltd.
- /CreationDate: D:20121031171655+02'00'
- /Creator: Acrobat PDFMaker 7.0.5 for Word
- /HFA: 30
- /HFA_Take: 124
- /Keywords: Information flow control, firewall, proxy server, traffic filter, VPN, TLS, IPSec, IDS/IPS, intrusion detection, Medium Robustness Environments
- /ModDate: D:20121031171818+02'00'
- /Nokia_OS: IPSO 4.2 build 051c05
- /OS: Check Point SecurePlatform
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Revision: 2.0
- /SC_HFA: 01
- /Subject: Security Target
- /TOE: Check Point VPN-1
- /Take: 224
- /Take_app: 46
- /Title: Check Point VPN-1 NGX R65
- /cp_version: NGX R65
- /documentDate: 6/25/2012
- /hotfix: MR1
- /longDate: June 25, 2012
- pdf_file_size_bytes: 1179486
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 164
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |