name |
Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56 |
Data Security Kit(D) Software V1.00E |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
20.07.2012 |
31.01.2013 |
not_valid_before |
23.09.2008 |
31.10.2006 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10245-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0057_ecvr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10245-st.pdf |
|
manufacturer |
Juniper Networks, Inc. |
KYOCERA MITA Corporation |
manufacturer_web |
https://www.juniper.net/ |
https://www.kyoceramita.com/ |
security_level |
EAL3+, ALC_FLR.2 |
EAL3 |
dgst |
c974eb48324fee97 |
e97590283c1ec64c |
heuristics/cert_id |
CCEVS-VR-VID-10245-2008 |
JISEC-CC-CRP-C0057 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1, ALC_FLR.2 |
{} |
heuristics/extracted_versions |
4.56 |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Wireless LAN
- certification_date: 23.09.2008
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10245
- product: Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56
- scheme: US
- url: https://www.niap-ccevs.org/product/10245
- vendor: Juniper Networks, Inc.
|
- cert_id: JISEC-CC-CRP-C0150
- certification_date: 01.03.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0150_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is installed as an option to the MFPs "KM-3050, KM-4050, KM-5050, KM-3050i, KM-4050i, KM-5050i, CS-3050, CS-4050, CS-5050" of KYOCERA MITA Corporation. It is used to protect the image data that exists on HDD during or after each processing the copy function, the print function, the network scanning function, and the fax (sending and receiving) function from an illegal exposure. TOE security functions To defend assets to be protected in relation to the use of the above-mentioned basic functions, this TOE has the following security functions. - Hard disk accumulation data overwrite deletion function - Hard disk accumulation data encryption function
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Data Security Kit(C) Software
- product_type: IT Product (data protection function in digital MFP)
- toe_version: V1.40
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.03.2013
- supplier: KYOCERA MITA Corporation
- toe_japan_name: Data Security Kit (C) Software V1.40
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0150_it5063.html
- toe_overseas_name: Data Security Kit (C) Software V1.40
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10245-vr.pdf |
c0057_ecvr.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10245-2008
- cert_item: Odyssey Access Client (FIPS Edition), Version 4.56
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10245-2008: 1
|
- JP:
- Certification No. C0057: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3: 1
- EAL3: 6
- EAL3 augmented: 2
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.2: 1
- FAU_GEN_EXP.1: 1
- FAU_SAA.1: 1
- FAU_SAR.1: 1
- FAU_SAR.2: 1
- FAU_SAR.3: 1
- FAU_SEL.1: 1
- FAU_STG.1: 1
- FAU_STG.3: 1
- FCS:
- FCS_BCM_EXP.1: 1
- FCS_CKM.1: 3
- FCS_CKM.4: 1
- FCS_CKM_EXP.2: 1
- FCS_COP_EXP.1: 1
- FCS_COP_EXP.2: 10
- FDP:
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FDP_RIP.1: 2
- FIA:
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 3
- FMT_SMR.1: 1
- FPT:
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 1
- FPT_TST_EXP.1: 1
- FPT_TST_EXP.2: 1
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.BASIC_ROBUSTNESS_IT_: 1
- A.NO_EVIL: 1
- A.PHYSICAL: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 5
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20061102202158+09'00'
- /ModDate: D:20061102202158+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12898
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/st_filename |
st_vid10245-st.pdf |
|
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 2
- EAL2: 1
- EAL2 augmented: 1
- EAL3: 4
- EAL3 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.2: 1
- ACM_CAP.3: 20
- ACM_SCP.1: 7
- ADO:
- ADO_DEL.1: 7
- ADO_IGS.1: 7
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 2
- ADV_HLD.2: 18
- ADV_RCR.1: 8
- AGD:
- AGD_ADM.1: 13
- AGD_USR.1: 11
- ALC:
- ALC_DVS.1: 11
- ALC_FLR.2: 20
- ATE:
- ATE_COV.1: 1
- ATE_COV.2: 9
- ATE_DPT.1: 7
- ATE_FUN.1: 15
- ATE_IND.1: 1
- ATE_IND.2: 8
- AVA:
- AVA_MSU.1: 12
- AVA_SOF.1: 8
- AVA_VLA.1: 10
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.2: 2
- FAU_GEN.2.1: 1
- FAU_GEN_EXP: 2
- FAU_GEN_EXP.1: 5
- FAU_GEN_EXP.1.1: 1
- FAU_GEN_EXP.1.2: 1
- FAU_SAA.1: 2
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 2
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 2
- FAU_SAR.2.1: 1
- FAU_SAR.3: 2
- FAU_SAR.3.1: 1
- FAU_SEL: 3
- FAU_SEL.1: 4
- FAU_SEL.1.1: 1
- FAU_STG: 1
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 2
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP: 1
- FCS_BCM_EXP.1: 4
- FCS_BCM_EXP.1.1: 1
- FCS_BCM_EXP.1.2: 1
- FCS_BCM_EXP.1.3: 1
- FCS_CKM: 1
- FCS_CKM.1: 35
- FCS_CKM.2: 3
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_CKM_EXP: 1
- FCS_CKM_EXP.2: 4
- FCS_CKM_EXP.2.1: 1
- FCS_COP.1: 3
- FCS_COP_EXP: 1
- FCS_COP_EXP.1: 3
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 66
- FCS_COP_EXP.2.1: 2
- FDP:
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 4
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_RIP: 1
- FDP_RIP.1: 13
- FIA:
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.2: 20
- FMT_MSA.2.1: 1
- FMT_MSA.3: 3
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 2
- FPT_RVM.1.1: 1
- FPT_SEP.1: 2
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 3
- FPT_STM.1.1: 1
- FPT_TST: 1
- FPT_TST_EXP: 2
- FPT_TST_EXP.1: 7
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 4
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.BASIC_ROBUSTNESS_IT_ENVIRONMENT: 2
- A.NO_EVIL: 1
- A.PHYSICAL: 1
- O:
- O.ADMIN_GUIDANCE: 1
- O.AUDIT_GENERATION: 1
- O.CONFIGURATION_: 1
- O.CORRECT_: 1
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHY: 4
- O.DOCUMENTED_: 1
- O.MANAGE: 1
- O.PARTIAL_: 1
- O.RESIDUAL_: 1
- O.VULNERABILITY_: 1
- OE:
- OE.BASIC_ROBUSTNESS_OS: 2
- OE.CRYPTOGRAPHY: 3
- OE.MANAGE: 1
- OE.NO_EVIL: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_: 1
- OE.SELF_: 1
- OE.TIME_STAMPS: 1
- OE.TOE_ACCESS: 1
- T:
- T.ACCIDENTAL_ADMIN_: 1
- T.CRYPTO_COMPROMISE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 4
- FIPS 140-1: 8
- FIPS 140-2: 20
- FIPS 180-2: 1
- FIPS 186-2: 8
- FIPS 197: 1
- FIPS 198: 1
- FIPS PUB 140-1: 1
- PKCS:
- RFC:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: SAIC
- /Company: SAIC
- /CreationDate: D:20080926111130-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Manager: Rick O'Donnel
- /ModDate: D:20080926124308-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20080811191258
- /Subject: Security Target
- /Title: Juniper OAC Security Target
- pdf_file_size_bytes: 449660
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
False |
state/st/download_ok |
True |
False |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |