Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J
JISEC-CC-CRP-C0308
VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1
383-4-147
name TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1
category Other Devices and Systems Operating Systems
scheme JP CA
not_valid_after 01.09.2016 15.05.2017
not_valid_before 31.08.2011 15.10.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0308_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-cert-eng.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0308_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-sec-eng.pdf
manufacturer KYOCERA MITA Corporation VMware Inc.
manufacturer_web https://www.kyoceramita.com/ https://www.vmware.com
security_level EAL3 EAL4+, ALC_FLR.2
dgst bc7181356569d9c6 6d943c6a06ed7b36
heuristics/cert_id JISEC-CC-CRP-C0308 383-4-147
heuristics/cert_lab [] CANADA
heuristics/cpe_matches cpe:2.3:h:kyocera:taskalfa_3500i:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_5500i:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_4500i:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, ATE_FUN.1, ALC_CMC.4, ADV_FSP.4, ATE_IND.2, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ADV_TDS.3, ATE_DPT.1, AVA_VAN.3, ALC_FLR.2, ADV_IMP.1
heuristics/extracted_versions 1.00 4.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0308
  • certification_date: 01.08.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0308_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 3500i - TASKalfa 4500i - TASKalfa 5500i This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E)
    • product_type: Data protection function in digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0308_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0308_est.pdf
    • toe_version: V1.00J
    • vendor: KYOCERA MITA Corporation
  • expiration_date: 01.09.2016
  • supplier: KYOCERA MITA Corporation
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0308_it0326.html
  • toe_japan_name: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J
  • toe_overseas_link: None
  • toe_overseas_name: -----
maintenance_updates
pdf_data/report_filename c0308_erpt.pdf vmware-esxi-v40-cert-eng.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
    • cert_id: 383-4-147-CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0308-01: 1
    • Certification No. C0308: 1
  • CA:
    • 383-4-147-CR: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 4+: 3
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.CE: 1
    • A.LOCATION: 1
    • A.NETWORK: 2
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 2
  • FIPS:
    • FIPS 180-3: 1
    • FIPS 186-2: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /CreationDate: D:20111017144607+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20111017144639+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 238454
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
  • /AM_ACPP_Date: [dd month yyyy]
  • /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
  • /AM_ACPP_Version: [AM_AMCPP_Version]
  • /AM_IAR_Date: [dd month yyyy]
  • /AM_IAR_Doc#: [AM_IAR_Doc#]
  • /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
  • /AM_IAR_Version: [AM_IAR_Version]
  • /AM_ST Date: [dd month yyyy]
  • /AM_ST Title: [AM_ST Title]
  • /AM_ST Version: [AM_ST Version]
  • /AM_TOE: [AM_TOE]
  • /AM_TOE Short: [AM_TOE Short]
  • /AM_TOE Version: [AM_TOE Version]
  • /Author: sjackson
  • /CC Version: 3.1 Revision 3
  • /CC date: July 2009
  • /CEM Version: 3.1 Revision 3
  • /CEM date: July 2009
  • /CR_Date: 2 September 2010
  • /CR_Version: 0.3
  • /Client City: Palo Alto
  • /Client Country: USA
  • /Client Full Name: VMware, Inc.
  • /Client Postal Code: 94304
  • /Client Short Name: VMware
  • /Client State: CA
  • /Client Street: 3401 Hillview Ave.
  • /CreationDate: D:20101123115917-05'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /Developer Long Name: VMware, Inc.
  • /Developer Short Name: VMware
  • /EAL Level: 4+
  • /EAL Level Base: 4
  • /EAL Level Text: 4 augmented
  • /EAL Long: EAL 4 Augmented
  • /EAL Short: EAL 4+
  • /ER Document Date: 9 September 2009
  • /ER Version: Version 1.0
  • /ETPlan_Doc#: 1651-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: 0.1
  • /ETPlan_date: 3 August 2010
  • /ETProcRes_Date: September 2010
  • /ETProcRes_Doc#: 1651-000-D005
  • /ETProcRes_Title: Evaluation Test Results
  • /ETProcRes_Version: 0.1
  • /ETProc_Date: 13 August 2010
  • /ETProc_Doc#: 1651-000-D004
  • /ETProc_Title: Evaluation Test Procedures
  • /ETProc_Version: 0.2
  • /ETReport_Date: 1 September 2010
  • /ETReport_Doc#: 1651-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_TitleShort: ETR
  • /ETReport_Version: 1.4
  • /EWP_Date: 5 July 2010
  • /EWP_Doc#: 1651-000-D001
  • /EWP_Title: Evaluation Work Plan for EAL 4+ Common Criteria Evaluation of VMware Incorporated ESX 4.0 and vCenter 4.0, Document No. 1651-000-D001, Version 1.3, 5 July 2010, Common Criteria Evaluation Number: 383-4-145
  • /EWP_Version: 1.3
  • /Eval number: 383-4-145
  • /Eval_End_Date: 22 October 2010
  • /Eval_Start_Date: 1 December 2009
  • /LeadEvaluator: K. Braun
  • /LeadEvaluatorInitials: KB
  • /ModDate: D:20101123120044-05'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /ProjectManager: M. Gauvreau
  • /ProjectManagerInitials: MG
  • /ProjectNumber: 1651
  • /ST_Date: 31 August 2010
  • /ST_Title: VMware, Inc. VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1 Security Target
  • /ST_Version: 1.2
  • /SVC_Date: 5 August 2009
  • /SVC_Doc#: 1610-000-D006
  • /SVC_Title: Site Visit Checklist
  • /SVC_Version: 1.0
  • /SVR_Date: 5 August 2009
  • /SVR_Doc#: 1610-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: 1.0
  • /SV_City: Palo Alto
  • /Security Classification: EWA-Canada & VMware Proprietary
  • /SourceModified: D:20101123164210
  • /Sponsor: VMware, Inc.
  • /Sponsor City: Palo Alto
  • /Sponsor Country: USA
  • /Sponsor Postal Code: 94304
  • /Sponsor State: CA
  • /Sponsor Street: 3401 Hillview Ave.
  • /TOE: VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
  • /TOE Short-NoTM: ESXi and vCenter Server 4.0 Update 1
  • /TOE Version: 4.0 Update 1
  • /TOE with version: VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1
  • /TOE-NoTM: VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
  • /Title: EAL X+ Evaluation of [Developer Long Name]
  • /_AdHocReviewCycleID: 1598644691
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Reade, Rick A.
  • /_EmailSubject: CPL post request ... rr
  • pdf_file_size_bytes: 95769
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename c0308_est.pdf vmware-esxi-v40-sec-eng.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 5
  • EAL:
    • EAL4: 2
    • EAL4+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FAU:
    • FAU_ARP.1: 2
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 21
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 5
    • FDP_IFC.2: 7
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_UAU.1: 3
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 26
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 26
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 27
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_ITC.1: 6
    • FPT_ITC.1.1: 1
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.CE: 3
    • A.LOCATION: 4
    • A.NETWORK: 4
  • O:
    • O.ENCRYPT: 4
    • O.OVERWRITE: 5
  • OE:
    • OE.CE: 2
    • OE.LOCATION: 2
    • OE.NETWORK: 2
  • A:
    • A.NOEVIL: 2
    • A.PHYSCL: 3
  • O:
    • O.ACCESS: 7
    • O.ADMIN: 6
    • O.AUDIT: 6
    • O.CONTINUITY: 4
    • O.IDAUTH: 9
    • O.SECURE: 5
    • O.VLAN: 4
    • O.VM: 4
    • O.VSWITCH: 4
  • OE:
    • OE.IDAUTH: 7
    • OE.SEP: 7
    • OE.TIME: 5
  • T:
    • T.AVAILABILITY: 2
    • T.COMINT: 2
    • T.PRIVIL: 2
    • T.VIRTUAL_NETWORK: 2
    • T.VM: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Cisco:
    • Cisco: 2
  • Microsoft:
    • Microsoft: 12
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 10
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 10
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
pdf_data/st_metadata
  • /Author: KYOCERA MITA Corporation
  • /CreationDate: D:20111007112509+09'00'
  • /Creator: CubePDF
  • /Keywords: Security Target
  • /ModDate: D:20111007112514+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) Japan Version Security Target
  • pdf_file_size_bytes: 341566
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different