name |
Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8 |
bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software |
category |
Databases |
Other Devices and Systems |
scheme |
JP |
JP |
status |
archived |
archived |
not_valid_after |
01.07.2020 |
08.04.2014 |
not_valid_before |
16.06.2015 |
13.03.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_st.pdf |
manufacturer |
Microsoft Corporation |
Konica Minolta Business Technologies, Inc |
manufacturer_web |
https://www.microsoft.com |
https://www.konicaminolta.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL3 |
dgst |
c225189611bed8f2 |
2269d5f12e90117d |
heuristics/cert_id |
JISEC-CC-CRP-C0475 |
JISEC-CC-CRP-C0205 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, AVA_VLA.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
12.0.2000.8 |
7522, 601, 6022, 751 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0475
- certification_date: 01.06.2015
- claim: EAL2+ ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.2
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0475_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2014. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
- evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
- product: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)
- product_type: Database Management System (DBMS)
- protection_profile: U.S. Government Protection Profile for Database Management Systems, Version 1.3
- report_link: https://www.ipa.go.jp/en/security/c0475_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0475_est.pdf
- toe_version: 12.0.2000.8
- vendor: Microsoft Corporation
- expiration_date: 01.07.2020
- supplier: Microsoft Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0475_it3480.html
- toe_overseas_name: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
|
- cert_id: JISEC-CC-CRP-C0205
- certification_date: 01.03.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0205_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software English: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0205_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0205_st.pdf
- toe_version: A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.04.2014
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0205_it8216.html
- toe_overseas_name: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
61018742063aaca9 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_dbms_v1.3.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0475_erpt.pdf |
c0205_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0475-01: 1
- Certification No. C0475: 1
|
- JP:
- CRP-C0205-01: 1
- Certification No. C0205: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 3
- EAL2+: 2
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_EVIL: 1
- A.NO_GENERAL_: 1
- A.PHYSICAL: 1
- T:
- T.ACCIDENTIAL_ADMIN_ERROR: 1
- T.MASQUERADE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHORIZED_: 1
- T.UNIDENTIFIED_: 1
|
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-GROUP-B: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-NET-SET: 1
- T.ACCESS-PRIVATE: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTOR: 1
- T.BACKUP-RESTORE: 1
- T.BRING-OUT-CF: 2
- T.BRING-OUT-STOR: 1
- T.BRING-OUT-STORAGE: 1
- T.DISCARD-MFP: 2
- T.UNEXPECTEC-TRANSMISSION: 1
|
pdf_data/report_keywords/vendor |
- Microsoft:
- Microsoft: 20
- Microsoft Corporation: 7
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20150724094408+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20150724094442+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 233021
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
- /CreationDate: D:20090409174039+09'00'
- /ModDate: D:20090409174039+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 406178
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
c0475_est.pdf |
c0205_st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 1
- EAL2: 2
- EAL2 augmented: 2
- EAL2+: 51
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 1
- AGD:
- ALC:
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 4
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 10
- FAU_GEN.1: 3
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SEL: 8
- FAU_SEL.1: 2
- FAU_STG: 3
- FAU_STG.1: 2
- FAU_STG.3: 1
- FAU_STG.4: 1
- FAU_STG_EXP: 2
- FAU_STG_EXP.5: 15
- FAU_STG_EXP.5.1: 2
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF: 8
- FDP_ACF.1: 6
- FDP_IFC.1: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD.1: 10
- FIA_ATD.1.1: 2
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 11
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_REV.1: 16
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 1
- FPT_TRC.1: 6
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FTA:
- FTA_MCS.1: 6
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_TAH.1: 8
- FTA_TAH.1.1: 1
- FTA_TAH.1.2: 1
- FTA_TAH.1.3: 1
- FTA_TSE.1: 6
- FTA_TSE.1.1: 1
|
- FAU:
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 58
- FDP_ACC.1.1: 3
- FDP_ACF.1: 42
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ACP.1: 1
- FDP_IFC.1: 6
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 62
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 8
- FIA_ATD.1: 25
- FIA_ATD.1.1: 1
- FIA_EID: 2
- FIA_EID.1: 16
- FIA_EID.1.1: 3
- FIA_EID.1.2: 1
- FIA_NEW.1.2: 2
- FIA_SOS: 1
- FIA_SOS.1: 48
- FIA_SOS.1.1: 6
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU.1: 23
- FIA_UAU.2: 63
- FIA_UAU.2.1: 6
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID.1: 31
- FIA_UID.2: 50
- FIA_UID.2.1: 7
- FIA_USB.1: 22
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 33
- FMT_MOF.1.1: 4
- FMT_MSA: 3
- FMT_MSA.1: 32
- FMT_MSA.1.1: 3
- FMT_MSA.3: 31
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 5
- FMT_MTD.1: 105
- FMT_MTD.1.1: 12
- FMT_SMF.1: 109
- FMT_SMF.1.1: 1
- FMT_SMR.1: 167
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SMS.1: 1
- FMT_SOS.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_EVIL: 3
- A.NO_GENERAL_PURPOSE: 3
- A.PHYSICAL: 3
- O:
- O.ACCESS_HISTORY: 5
- O.ADMIN_GUIDANCE: 1
- O.ADMIN_ROLE: 4
- O.AUDIT_: 1
- O.AUDIT_GENERATION: 4
- O.CONFIGURATION_IDENTIFICATION: 1
- O.DOCUMENTED_DESIGN: 1
- O.INTERNAL_TOE_DOMAINS: 1
- O.MANAGE: 6
- O.MEDIATE: 5
- O.PARTIAL_FUNCTIONAL_TEST: 1
- O.PARTIAL_SELF_PROTECTION: 1
- O.RESIDUAL_INFORM: 1
- O.RESIDUAL_INFORMAT: 2
- O.RESIDUAL_INFORMATION: 3
- O.TOE_ACCESS: 7
- O.VULNERABILITY_ANALYSIS: 1
- OE:
- OE.NO_EVIL: 4
- OE.NO_GENERAL_: 2
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 4
- T:
- T.ACCIDENTIAL_ADMIN_ERROR: 1
- T.MASQUERADE: 3
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 3
- T.TSF_COMPROMISE: 3
- T.UNAUTHORIZED_ACCESS: 3
- T.UNIDENTIFIED_ACTIONS: 3
|
- A:
- A.ADMIN: 3
- A.NETWORK: 4
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.AUTH-CAPABILITY: 10
- O.CHECK-CF: 4
- O.CHECK-HDD: 7
- O.CONFIG: 11
- O.CRYPT-KEY: 5
- O.CRYPTO-CAPABILITY: 4
- O.CRYPTO-MAIL: 4
- O.GROUP-BOX: 5
- O.LOCK-CF-CAPABILITY: 4
- O.LOCK-HDD-CAPABILITY: 7
- O.OVERWRITE-ALL: 7
- O.PRIVATE-BOX: 5
- O.PUBLIC-BOX: 8
- O.REGISTERED-USER: 14
- O.SECURE-PRINT: 8
- O.TRUSTED-PASS: 7
- OE:
- OE.ADMIN: 2
- OE.CRYPT: 3
- OE.CRYPTO: 1
- OE.FEED-BACK: 10
- OE.LOCK-CF: 3
- OE.LOCK-HDD: 3
- OE.NETWORK: 2
- OE.SECRET: 2
- OE.SERVER: 5
- OE.SERVICE: 2
- OE.SESSION: 2
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS-GROUP-BOX: 3
- T.ACCESS-PRIVATE-BOX: 3
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-CF: 2
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTED-TRANSMISSION: 3
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 11
- Microsoft Corporation: 2
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186: 1
- FIPS 186-1: 1
- FIPS 186-2: 4
- FIPS PUB 197: 3
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- INC., All Rights Reserved. 7 / 110 TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in: 1
|
pdf_data/st_metadata |
|
- /Author: m-izumi
- /CreationDate: D:20090410164324+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20090410164324+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title: Microsoft Word - C0205_ST_en.doc
- pdf_file_size_bytes: 683223
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 110
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |