name |
Microsoft Windows 7, Microsoft Windows Server 2008 R2 |
bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software Version: A2XK0Y0-0100-G00-56 |
category |
Operating Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
01.11.2014 |
06.12.2017 |
not_valid_before |
24.03.2011 |
15.11.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10390-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0378_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10390-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0378_est.pdf |
manufacturer |
Microsoft Corporation |
Konica Minolta Business Technologies, Inc |
manufacturer_web |
https://www.microsoft.com |
https://www.konicaminolta.com/ |
security_level |
EAL4+, ALC_FLR.3 |
EAL3 |
dgst |
c6cb5dd4969f742e |
ca756a37746bc3cd |
heuristics/cert_id |
CCEVS-VR-10390-2010 |
JISEC-CC-CRP-C0378 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:h:konicaminolta:bizhub_c454:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c364:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c224:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c284:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c554:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, ADV_FSP.4, ATE_IND.2, ALC_LCD.1, AGD_OPE.1, ALC_FLR.3, ADV_ARC.1, ADV_TDS.3, ATE_DPT.1, AVA_VAN.3, ADV_IMP.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
2008, 7 |
554, 454, 0100, 364, 284, 56, 224 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Operating System
- certification_date: 24.03.2011
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10390
- product: Microsoft Windows 7, Microsoft Windows Server 2008 R2
- scheme: US
- url: https://www.niap-ccevs.org/product/10390
- vendor: Microsoft Corporation
|
- cert_id: JISEC-CC-CRP-C0378
- certification_date: 01.11.2012
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0378_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Japanese : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software English : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0378_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0378_est.pdf
- toe_version: A2XK0Y0-0100-G00-56
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.12.2017
- revalidations: [frozendict({'date': '2013-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386_01.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software A2XK0Y0-0100-G00-56
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386.html
- toe_overseas_name: bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 / D410 / D411 / D412 / D415 / D416 / D417 / D710 / D711 / D715 / D716 Control Software A2XK0Y0-0100-G00-56
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
1b3d0fa0ae86e5da |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_gpospp_v1.0.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10390-vr.pdf |
c0378_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-10390-2010
- cert_item: Microsoft Corporation, Corporate Headquarters, One Microsoft Way, Redmond, WA 98052-6399 Windows 7 and Windows Server 2008 R2
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0378-01: 1
- Certification No. C0378: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 9
- EAL 4 augmented: 1
- EAL4: 1
- EAL4 augmented: 1
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- T:
- T.ACCESS-GROUP-: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-PRIVATE-: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 2
- T.BRING-OUT-STORA: 1
- T.BRING-OUT-STORAGE: 1
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRA: 1
- T.UNEXPECTED-TRANSMISSION: 1
|
pdf_data/report_keywords/vendor |
- Broadcom:
- Cisco:
- Microsoft:
- Microsoft: 46
- Microsoft Corporation: 3
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of: 1
|
pdf_data/report_metadata |
- /Author: Ken Elliott
- /CreationDate: D:20110412124748
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110412124748
- /Producer: Microsoft® Office Word 2007
- /Title: Validation Report for Win7
- pdf_file_size_bytes: 510768
- pdf_hyperlinks: http://support.microsoft.com/kb/2492505
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
- /CreationDate: D:20130419151909+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20130419151955+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 477272
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 42
|
pdf_data/st_filename |
st_vid10390-st.pdf |
c0378_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 3
- EAL 4 augmented: 3
- EAL2: 1
- EAL2 augmented: 1
- EAL4: 5
- EAL4 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 11
- ADV_FSP: 1
- ADV_FSP.4: 12
- ADV_IMP: 1
- ADV_IMP.1: 8
- ADV_TDS: 1
- ADV_TDS.3: 16
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 11
- AGD_PRE: 1
- AGD_PRE.1: 7
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 16
- ALC_CMS: 1
- ALC_CMS.4: 7
- ALC_DEL: 1
- ALC_DEL.1: 6
- ALC_DVS: 1
- ALC_DVS.1: 6
- ALC_FLR: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 23
- ALC_LCD: 1
- ALC_LCD.1: 7
- ALC_TAT: 1
- ALC_TAT.1: 8
- ATE:
- ATE_COV: 1
- ATE_COV.2: 6
- ATE_DPT: 1
- ATE_DPT.1: 6
- ATE_FUN: 1
- ATE_FUN.1: 9
- ATE_IND: 1
- ATE_IND.2: 8
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 8
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAR: 7
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_SEL: 3
- FAU_SEL.1: 6
- FAU_SEL.1.1: 2
- FAU_STG: 9
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 5
- FAU_STG.3.1: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCO:
- FCO_NRO: 1
- FCO_NRO_CIMC: 8
- FCO_NRO_CIMC.3: 7
- FCO_NRO_CIMC.3.1: 1
- FCO_NRO_CIMC.3.2: 1
- FCO_NRO_CIMC.3.3: 1
- FCO_NRO_CIMC.4: 7
- FCO_NRO_CIMC.4.1: 1
- FCO_NRO_CIMC.4.2: 1
- FCS:
- FCS_BCM_EXT: 4
- FCS_BCM_EXT.1: 5
- FCS_BCM_EXT.1.1: 1
- FCS_CKM: 16
- FCS_CKM.1: 7
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COA_EXT: 4
- FCS_COA_EXT.1: 4
- FCS_COA_EXT.1.1: 1
- FCS_COP: 65
- FCS_COP.1: 1
- FCS_RBG_EXT: 4
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FDP:
- FDP_ACC: 56
- FDP_ACC.1: 12
- FDP_ACF: 64
- FDP_ACF.1: 3
- FDP_ACF.1.2: 1
- FDP_ACF_CIMC: 8
- FDP_ACF_CIMC.2: 7
- FDP_ACF_CIMC.2.1: 1
- FDP_ACF_CIMC.2.2: 1
- FDP_ACF_CIMC.3: 7
- FDP_ACF_CIMC.3.1: 1
- FDP_CIMC_CER: 4
- FDP_CIMC_CER.1: 8
- FDP_CIMC_CER.1.1: 1
- FDP_CIMC_CER.1.2: 1
- FDP_CIMC_CER.1.3: 1
- FDP_CIMC_CER.1.4: 1
- FDP_CIMC_CRL: 4
- FDP_CIMC_CRL.1: 8
- FDP_CIMC_CRL.1.1: 1
- FDP_CIMC_CSE: 4
- FDP_CIMC_CSE.1: 7
- FDP_CIMC_CSE.1.1: 1
- FDP_CIMC_OCSP: 4
- FDP_CIMC_OCSP.1: 8
- FDP_CIMC_OCSP.1.1: 1
- FDP_ETC_CIMC: 4
- FDP_ETC_CIMC.5: 7
- FDP_ETC_CIMC.5.1: 1
- FDP_IFC: 25
- FDP_IFC.1: 12
- FDP_IFF: 31
- FDP_IFF.1: 2
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_ITT: 3
- FDP_ITT.1: 8
- FDP_ITT.1.1: 1
- FDP_RIP: 2
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FDP_UCT: 2
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT: 3
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 1
- FIA_AFL_EXT: 4
- FIA_AFL_EXT.1: 5
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_ATD: 5
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS: 3
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 9
- FIA_UAU.1: 6
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID: 3
- FIA_UID.1: 7
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 3
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 30
- FMT_MOF.1: 3
- FMT_MOF_CIMC: 12
- FMT_MOF_CIMC.3: 9
- FMT_MOF_CIMC.3.1: 1
- FMT_MOF_CIMC.3.2: 1
- FMT_MOF_CIMC.3.3: 1
- FMT_MOF_CIMC.3.4: 1
- FMT_MOF_CIMC.5: 9
- FMT_MOF_CIMC.5.1: 1
- FMT_MOF_CIMC.5.2: 1
- FMT_MOF_CIMC.5.3: 1
- FMT_MOF_CIMC.6: 10
- FMT_MOF_CIMC.6.1: 1
- FMT_MOF_CIMC.6.2: 1
- FMT_MOF_CIMC.6.3: 1
- FMT_MSA: 140
- FMT_MSA.1: 6
- FMT_MSA.2: 5
- FMT_MSA.2.1: 1
- FMT_MSA.3: 11
- FMT_MTD: 69
- FMT_MTD_CIMC: 10
- FMT_MTD_CIMC.4: 7
- FMT_MTD_CIMC.4.1: 1
- FMT_MTD_CIMC.5: 8
- FMT_MTD_CIMC.5.1: 1
- FMT_MTD_CIMC.7: 7
- FMT_MTD_CIMC.7.1: 1
- FMT_REV: 20
- FMT_SAE: 3
- FMT_SAE.1: 5
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 3
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.2: 1
- FPT:
- FPT_ITT: 5
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_ITT.3: 7
- FPT_ITT.3.1: 1
- FPT_ITT.3.2: 1
- FPT_RCV: 3
- FPT_RCV.1: 5
- FPT_RCV.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TRC_EXT: 4
- FPT_TRC_EXT.1: 4
- FPT_TRC_EXT.1.1: 1
- FPT_TST.1: 2
- FPT_TST_EXT: 4
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 1
- FPT_TST_EXT.1.3: 1
- FRU:
- FRU_RSA: 3
- FRU_RSA.1: 5
- FRU_RSA.1.1: 1
- FTA:
- FTA_MCS: 3
- FTA_MCS.1: 5
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_SSL: 9
- FTA_SSL.1: 5
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 5
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTA_TAH: 3
- FTA_TAH.1: 4
- FTA_TAH.1.1: 1
- FTA_TAH.1.2: 1
- FTA_TAH.1.3: 1
- FTA_TRP.1: 1
- FTA_TSE: 3
- FTA_TSE.1: 8
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP: 3
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GNE.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 2
- FAU_SAR.2.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 2
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 72
- FDP_ACC.1.1: 4
- FDP_ACF.1: 57
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ACP.1: 1
- FDP_IFC.1: 14
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 3
- FDP_RIP.1.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 66
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 8
- FIA_ATD.1: 29
- FIA_ATD.1.1: 1
- FIA_MSA.3: 1
- FIA_SOS.1: 40
- FIA_SOS.1.1: 4
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU: 2
- FIA_UAU.1: 41
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 43
- FIA_UAU.2.1: 4
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 32
- FIA_UID.2: 63
- FIA_UID.2.1: 7
- FIA_USB.1: 26
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 48
- FMT_MOF.1.1: 5
- FMT_MSA: 5
- FMT_MSA.1: 34
- FMT_MSA.1.1: 3
- FMT_MSA.3: 42
- FMT_MSA.3.1: 8
- FMT_MSA.3.2: 7
- FMT_MTD.1: 123
- FMT_MTD.1.1: 15
- FMT_SMF.1: 128
- FMT_SMF.1.1: 1
- FMT_SMR.1: 185
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SOS.1: 1
- FPT:
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.ACCESS: 5
- O.ACCESS_HISTORY: 1
- O.ADMIN_ROLE: 1
- O.AUDIT_GENERATION: 1
- O.AUDIT_PROTECTION: 2
- O.AUDIT_REVIEW: 1
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHIC_SERVICES: 5
- O.DISCRETIONARY_ACCESS: 2
- O.DISCRETIONARY_USER_CONT: 1
- O.DISPLAY_BANNER: 1
- O.DOMAIN_ISOLATION: 1
- O.MANAGE: 1
- O.PROTECT: 5
- O.RECOVERY: 1
- O.RESIDUAL_INFORMATION: 1
- O.RESOURCE_EXHAUSTION: 1
- O.TSF_CRYPTOGRAPHIC_INTEGR: 1
- O.TSF_CRYPTOGRAPHIC_INTEGRITY: 1
- O.USER_AUTHENTICATION: 1
- O.USER_IDENTIFICATION: 1
- OE:
- T:
- T.ADMIN_ERROR: 1
- T.ADMIN_ROGUE: 1
- T.AUDIT_COMPROMISE: 1
- T.CRYPTO_COMPROMISE: 1
- T.MASQUERADE: 1
- T.OPERATIONAL_ERRORS: 1
- T.REPLAY: 5
- T.RESIDUAL_DATA: 1
- T.RESOURCE_EXHAUSTION: 1
- T.TSF_COMPROMISE: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNIDENTIFIED_ACTIONS: 1
- T.UNKNOWN_STATE: 1
|
- A:
- A.ADMIN: 5
- A.NETWORK: 6
- A.SECRET: 3
- A.SERVICE: 4
- O:
- O.AUDIT: 2
- O.AUDIT-LOGGED: 5
- O.AUTH: 2
- O.AUTH-CAPABILITY: 7
- O.CONFIG: 12
- O.CRYPT: 4
- O.CRYPTO: 5
- O.CRYPTO-CAPABILITY: 1
- O.CRYPTO-KEY: 2
- O.CRYPTO-MAIL: 4
- O.FAX: 2
- O.FAX-CONTROL: 3
- O.GROUP: 3
- O.GROUP-BOX: 3
- O.OVERWRITE: 7
- O.PRIVATE: 3
- O.PRIVATE-BOX: 3
- O.PUBLIC: 3
- O.PUBLIC-BOX: 5
- O.REGISTERED: 3
- O.REGISTERED-USER: 11
- O.SECURE: 4
- O.SECURE-PRINT: 5
- O.TRU: 1
- O.TRUSTED: 5
- OE:
- OE.ADMIN: 3
- OE.AUDIT: 3
- OE.AUDIT-REVIEWED: 2
- OE.AUDIT_ACCESS-AUT: 1
- OE.AUDIT_ACESS-AUTHORIZED: 1
- OE.AUDIT_STORAGE-PR: 1
- OE.AUDIT_STORAGE-PROTECTED: 1
- OE.FAX: 2
- OE.FAX-UNIT: 2
- OE.FEED: 2
- OE.FEED-BACK: 8
- OE.NETWORK: 4
- OE.S: 1
- OE.SECRET: 3
- OE.SERVER: 5
- OE.SERVICE: 3
- OE.SESSION: 10
- OE.SETTING: 2
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS: 19
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.BACKUP: 3
- T.BACKUP-RESTORE: 1
- T.BRING: 3
- T.DISCARD: 3
- T.DISCARD-MFP: 1
- T.UNEXPECTED: 2
- T.UNEXPECTED-TRANSMISSION: 1
|
pdf_data/st_keywords/vendor |
- Broadcom:
- Cisco:
- Microsoft:
- Microsoft: 231
- Microsoft Corporation: 3
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 9
- AES-: 1
- AES-256: 2
- RC:
- DES:
- LWC_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 4
- SHA-384: 3
- SHA-512: 3
- SHA384: 1
|
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 5
- Key agreement: 2
- KEX:
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 14
- P-384: 12
- P-521: 14
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 26
- FIPS 186-2: 5
- FIPS 197: 1
- FIPS 46-3: 2
- FIPS PUB 140-2: 2
- FIPS PUB 186-3: 1
- NIST:
- NIST SP 800-56A: 2
- NIST SP 800-57: 1
- NIST SP 800-90: 1
- PKCS:
- RFC:
- RFC 2560: 3
- RFC 2797: 2
- RFC 3280: 4
- RFC 3739: 1
- RFC 4120: 1
- RFC3280: 1
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 186: 2
- FIPS 186-2: 4
- FIPS PUB 197: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
|
pdf_data/st_metadata |
- /Author: Mike Grimm
- /CreationDate: D:20110330133045
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110330133045
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 2425180
- pdf_hyperlinks: http://msdn.microsoft.com/en-us/library/cc227906(PROT.10).aspx, http://www.microsoft.com/technet/security/bulletin/MS10-073.mspx, http://msdn.microsoft.com/en-us/library/dd207968(PROT.10).aspx, http://msdn.microsoft.com/en-us/library/cc233219(PROT.10).aspx, http://msdn.microsoft.com/en-us/library/cc223122(PROT.10).aspx, http://technet.microsoft.com/en-us/library/cc739804(WS.10).aspx, http://creativecommons.org/licenses/by-nd-nc/1.0/, http://support.microsoft.com/kb/309408, http://msdn.microsoft.com/en-us/library/cc233855(PROT.10).aspx, http://www.microsoft.com/technet/security/bulletin/MS10-085.mspx, http://support.microsoft.com/kb/2492505
- pdf_is_encrypted: False
- pdf_number_of_pages: 190
|
- /Author:
- /CreationDate: D:20130415152125+09'00'
- /Creator: CubePDF
- /Keywords:
- /ModDate: D:20130415152132+09'00'
- /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
- /Subject:
- /Title:
- pdf_file_size_bytes: 1193119
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 115
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |