Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software Version: A2XK0Y0-0100-G00-56
JISEC-CC-CRP-C0378
secunet konnektor 2.1.0, Version 5.0.5:2.1.0
BSI-DSZ-CC-1128-V4-2022
name bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software Version: A2XK0Y0-0100-G00-56 secunet konnektor 2.1.0, Version 5.0.5:2.1.0
category Other Devices and Systems Key Management Systems
scheme JP DE
status archived active
not_valid_after 06.12.2017 07.04.2027
not_valid_before 15.11.2012 08.04.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1128V4c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0378_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1128V4a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0378_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1128V4b_pdf.pdf
manufacturer Konica Minolta Business Technologies, Inc Secunet Security Networks AG
manufacturer_web https://www.konicaminolta.com/ https://www.secunet.com/en/
security_level EAL3 EAL3+, ADV_FSP.4, ALC_TAT.1, AVA_VAN.5, ADV_TDS.3, ADV_IMP.1, ALC_FLR.2
dgst ca756a37746bc3cd e7f32273d0c69183
heuristics/cert_id JISEC-CC-CRP-C0378 BSI-DSZ-CC-1128-V4-2022
heuristics/cert_lab [] BSI
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_c554:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c454:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c284:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c224:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c364:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ASE_TSS.1, ADV_ARC.1 ADV_TDS.3, ALC_TAT.1, AGD_PRE.1, ALC_FLR.2, AVA_VAN.5, ATE_DPT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ADV_IMP.1
heuristics/extracted_versions 0100, 56, 554, 454, 364, 284, 224 2.1.0, 5.0.5
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-1128-V5-2022
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1128-V3-2021
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-1128-V5-2022
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1044-V2-2019, BSI-DSZ-CC-1044-2019, BSI-DSZ-CC-1128-V3-2021
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0378
  • certification_date: 01.11.2012
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0378_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Japanese : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software English : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0378_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0378_est.pdf
    • toe_version: A2XK0Y0-0100-G00-56
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.12.2017
  • revalidations: [frozendict({'date': '2013-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386_01.html'})]
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software A2XK0Y0-0100-G00-56
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386.html
  • toe_overseas_name: bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 / D410 / D411 / D412 / D415 / D416 / D417 / D710 / D711 / D715 / D716 Control Software A2XK0Y0-0100-G00-56
  • category: eHealth
  • cert_id: BSI-DSZ-CC-1209-V2-2025
  • certification_date: 10.06.2025
  • enhanced:
    • applicant: secunet Security Networks AG Weidenauer Straße 223-225 57076 Siegen Deutschland
    • assurance_level: EAL3,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_FLR.2,ALC_TAT.1,AVA_VAN.3
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1209V2c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 10.06.2025
    • description: The Target of evaluation (TOE) is a software product consisting of the Netzkonnektor and the Anwendungskonnektor as specified in the Protection Profile BSI-CC-PP-0098. The Netzkonnektor includes the security functionality of a Firewall, a VPN-client, an NTP Server, a name service (DNS) and a DHCP service. The TOE also includes the basic functions for establishment of secure TLS connections to other IT products. The TOE is part of the Konnektor and it is delivered pre-installed on exactly one hardware-configuration. The security functionality of the Anwendungskonnektor comprises the signature service, encryption and decryption of documents, a card terminal service and a smart card service. Together with the network connector, the Anwendungskonnektor also enables secure communication between the connector and the client system and between Fachmodulen and Fachdiensten.
    • entries: [frozendict({'id': 'BSI', 'description': 'Der Evaluationsgegenstand (EVG) ist ein Softwareprodukt, bestehend aus dem Netz- und dem Anwendungskonnektor nach dem Schutzprofil BSI-CC-PP-0098. Der Netzkonnektor setzt die Sicherheitsfunktionalität einer Firewall, einer VPN-Client, eines NTP Server, DNS und DHCP Service um. Weiterhin setzt der EVG die Basisfunktionalität zum Herstellen von sicheren TLS-Verbindungen zu anderen IT-Produkten um. Der TOE ist Teil des Konnektors und wird vorinstalliert auf exakt einer Hardwarekonfiguration ausgeliefert. Die Sicherheitsfunktionalität des Anwendungskonnektors umfasst die Signaturanwendung, die Verschlüsselung und Entschlüsselung von Dokumenten, den Kartenterminaldienst und den Chipkartendienst. Zusammen mit dem Netzkonnektor ermöglicht der Anwendungskonnektor zudem die gesicherte Kommunikation zwischen dem Konnektor und dem Clientsystem sowie zwischen Fachmodulen und Fachdiensten.'}), frozendict({'id': 'The Target of evaluation (TOE) is a software product consisting of the Netzkonnektor and the Anwendungskonnektor as specified in the Protection Profile BSI-CC-PP-0098. The Netzkonnektor includes the security functionality of a Firewall, a VPN-client, an NTP Server, a name service (DNS) and a DHCP service. The TOE also includes the basic functions for establishment of secure TLS connections to other IT products. The TOE is part of the Konnektor and it is delivered pre-installed on exactly one hardware-configuration. The security functionality of the Anwendungskonnektor comprises the signature service, encryption and decryption of documents, a card terminal service and a smart card service. Together with the network connector, the Anwendungskonnektor also enables secure communication between the connector and the client system and between Fachmodulen and Fachdiensten.BSI-DSZ-CC-1209-2023-MA-02 (Ausstellungsdatum / Certification Date 19.08.2024)', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-1209-2023-MA-01 (Ausstellungsdatum / Certification Date 31.10.2023)', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-1209-2023 (Ausstellungsdatum / Certification Date 19.10.2023, gültlig bis / valid until 18.10.2028)', 'description': 'Certificate'})]
    • evaluation_facility: SRC Security Research & Consulting GmbH
    • expiration_date: 09.06.2030
    • product: secunet konnektor 2.0.0 und 2.1.0 Version 5.70.4:2.0.0 und 5.70.4:2.1.0
    • protection_profile: Common Criteria Schutzprofil (Protection Profile), Schutzprofil 2: Anforderungen an den Konnektor, BSI-CC-PP-0098-V3-2021-MA-02, Version 1.6.1, 15.03.2023, Bundesamt für Sicherheit in der Informationstechnik (BSI)
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1209V2a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1209V2b_pdf.pdf?__blob=publicationFile&v=2
  • product: secunet konnektor 2.0.0 und 2.1.0 Version 5.70.4:2.0.0 und 5.70.4:2.1.0
  • subcategory: Software
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Software/1209.html
  • vendor: secunet Security Networks AG
heuristics/protection_profiles {} 19e2d2b1593c97a5
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0097V2b_pdf.pdf
pdf_data/cert_filename 1128V4c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1128-V4-2022: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0097-: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 3: 1
    • EAL 4: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
    • ALC_TAT.1: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informtionstechnik
  • /CreationDate: D:20220411134611+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, eHealth, Konnektor"
  • /ModDate: D:20220414110436+02'00'
  • /Producer: LibreOffice 6.3
  • /Subject: Zertifikat BSI-DSZ-CC-1128-V4-2022
  • /Title: Zertifikat BSI-DSZ-CC-1128-V4-2022
  • pdf_file_size_bytes: 396001
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0378_erpt.pdf 1128V4a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-1128-V4-2022
    • cert_item: secunet konnektor 2.1.0, Version 5.0.5:2.1.0
    • cert_lab: BSI
    • developer: secunet Security Networks AG
    • match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0378-01: 1
    • Certification No. C0378: 1
  • DE:
    • BSI-DSZ-CC-1128-V3-2021: 2
    • BSI-DSZ-CC-1128-V4-2021: 1
    • BSI-DSZ-CC-1128-V4-2022: 17
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0097-: 1
    • BSI-CC-PP-0097-2021: 1
    • BSI-CC-PP-0097-V2-2020-MA-: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 3: 4
    • EAL 4: 4
    • EAL 5: 1
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.4: 4
    • ADV_IMP.1: 4
    • ADV_TDS.3: 4
  • ALC:
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_FLR: 3
    • ALC_FLR.2: 4
    • ALC_TAT.1: 4
  • AVA:
    • AVA_ACC: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 5
    • FCS_CKM.1: 1
    • FCS_COP: 11
  • FDP:
    • FDP_ITC: 2
    • FDP_UIT: 2
  • FPT:
    • FPT_TDC: 9
  • FTP:
    • FTP_ITC: 3
    • FTP_TRP: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
  • T:
    • T.ACCESS-GROUP-: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 2
    • T.BRING-OUT-STORA: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRA: 1
    • T.UNEXPECTED-TRANSMISSION: 1
  • OE:
    • OE.NK: 4
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • constructions:
    • MAC:
      • HMAC: 12
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 5
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • AEAD:
    • AEAD: 1
  • KEX:
    • Key Exchange: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
  • IKE:
    • IKE: 3
    • IKEv2: 9
  • IPsec:
    • IPsec: 8
  • TLS:
    • TLS:
      • TLS: 35
      • TLS v1.2: 7
      • TLSv1.2: 1
  • VPN:
    • VPN: 8
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
    • BSI TR-03116-1: 1
    • BSI TR-03154: 1
    • BSI TR-03155: 1
    • BSI TR-03157: 2
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
    • AIS 34: 2
  • FIPS:
    • FIPS 180-4: 8
    • FIPS 197: 3
    • FIPS PUB 180-4: 1
    • FIPS180-4: 5
    • FIPS186-4: 2
    • FIPS197: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • NIST:
    • SP 800-38D: 1
  • PKCS:
    • PKCS#1: 3
    • PKCS#12: 1
  • RFC:
    • RFC 2104: 1
    • RFC 3268: 1
    • RFC 7027: 1
    • RFC-2104: 3
    • RFC-2404: 2
    • RFC-3268: 3
    • RFC-3526: 1
    • RFC-3602: 2
    • RFC-4301: 2
    • RFC-4303: 2
    • RFC-4492: 2
    • RFC-4868: 1
    • RFC-4880: 1
    • RFC-5116: 1
    • RFC-5246: 4
    • RFC-5289: 1
    • RFC-5639: 2
    • RFC-6931: 1
    • RFC-7296: 2
    • RFC-8017: 5
    • RFC2104: 1
    • RFC2404: 1
    • RFC3268: 1
    • RFC3526: 2
    • RFC3602: 1
    • RFC4055: 1
    • RFC4301: 1
    • RFC4303: 1
    • RFC4346: 1
    • RFC4868: 1
    • RFC4880: 1
    • RFC5246: 1
    • RFC5280: 1
    • RFC5289: 1
    • RFC5996: 1
    • RFC7027: 1
    • RFC7292: 1
    • RFC7296: 3
    • RFC8017: 3
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of: 1
pdf_data/report_metadata
  • /CreationDate: D:20130419151909+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130419151955+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 477272
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 42
pdf_data/st_filename c0378_est.pdf 1128V4b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1128-V4-2021: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0097: 4
    • BSI-CC-PP-0097“: 2
    • BSI-CC-PP-0098: 6
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL3: 14
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP.4: 7
    • ADV_IMP.1: 9
    • ADV_TDS.1: 1
    • ADV_TDS.2: 2
    • ADV_TDS.3: 7
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 13
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DEL.1: 5
    • ALC_FLR.2: 6
    • ALC_TAT.1: 8
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GNE.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 2
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 72
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 57
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 66
    • FIA_AFL.1.1: 8
    • FIA_AFL.1.2: 8
    • FIA_ATD.1: 29
    • FIA_ATD.1.1: 1
    • FIA_MSA.3: 1
    • FIA_SOS.1: 40
    • FIA_SOS.1.1: 4
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 41
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 43
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 32
    • FIA_UID.2: 63
    • FIA_UID.2.1: 7
    • FIA_USB.1: 26
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 48
    • FMT_MOF.1.1: 5
    • FMT_MSA: 5
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 42
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 123
    • FMT_MTD.1.1: 15
    • FMT_SMF.1: 128
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 185
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SOS.1: 1
  • FPT:
    • FPT_STM.1: 7
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 16
    • FAU_GEN.1: 5
    • FAU_GEN.2: 1
    • FAU_STG: 2
  • FCS:
    • FCS_CKM: 86
    • FCS_CKM.1: 14
    • FCS_CKM.2: 6
    • FCS_CKM.4: 13
    • FCS_COP: 77
    • FCS_COP.1: 12
  • FDP:
    • FDP_ACC: 11
    • FDP_ACC.1: 7
    • FDP_ACF: 5
    • FDP_ACF.1: 5
    • FDP_ETC: 8
    • FDP_ETC.2: 4
    • FDP_IFC: 18
    • FDP_IFC.1: 7
    • FDP_IFF: 20
    • FDP_IFF.1: 20
    • FDP_ITC: 16
    • FDP_ITC.1: 15
    • FDP_ITC.2: 17
    • FDP_RIP: 6
    • FDP_RIP.1: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 2
  • FIA:
    • FIA_UAU: 11
    • FIA_UAU.1: 2
    • FIA_UID: 9
    • FIA_UID.1: 5
  • FMT:
    • FMT_MOF: 12
    • FMT_MOF.1: 1
    • FMT_MSA: 40
    • FMT_MSA.1: 2
    • FMT_MSA.3: 7
    • FMT_MTD: 7
    • FMT_MTD.1: 2
    • FMT_SMF: 19
    • FMT_SMF.1: 4
    • FMT_SMR.1: 28
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_EMS: 16
    • FPT_EMS.1: 7
    • FPT_EMS.1.1: 2
    • FPT_EMS.1.2: 2
    • FPT_STM: 11
    • FPT_STM.1: 2
    • FPT_TDC: 22
    • FPT_TDC.1: 6
    • FPT_TST: 7
    • FPT_TST.1: 3
  • FTP:
    • FTP_ITC: 41
    • FTP_ITC.1: 21
    • FTP_TRP: 13
    • FTP_TRP.1: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 5
    • A.NETWORK: 6
    • A.SECRET: 3
    • A.SERVICE: 4
  • O:
    • O.AUDIT: 2
    • O.AUDIT-LOGGED: 5
    • O.AUTH: 2
    • O.AUTH-CAPABILITY: 7
    • O.CONFIG: 12
    • O.CRYPT: 4
    • O.CRYPTO: 5
    • O.CRYPTO-CAPABILITY: 1
    • O.CRYPTO-KEY: 2
    • O.CRYPTO-MAIL: 4
    • O.FAX: 2
    • O.FAX-CONTROL: 3
    • O.GROUP: 3
    • O.GROUP-BOX: 3
    • O.OVERWRITE: 7
    • O.PRIVATE: 3
    • O.PRIVATE-BOX: 3
    • O.PUBLIC: 3
    • O.PUBLIC-BOX: 5
    • O.REGISTERED: 3
    • O.REGISTERED-USER: 11
    • O.SECURE: 4
    • O.SECURE-PRINT: 5
    • O.TRU: 1
    • O.TRUSTED: 5
  • OE:
    • OE.ADMIN: 3
    • OE.AUDIT: 3
    • OE.AUDIT-REVIEWED: 2
    • OE.AUDIT_ACCESS-AUT: 1
    • OE.AUDIT_ACESS-AUTHORIZED: 1
    • OE.AUDIT_STORAGE-PR: 1
    • OE.AUDIT_STORAGE-PROTECTED: 1
    • OE.FAX: 2
    • OE.FAX-UNIT: 2
    • OE.FEED: 2
    • OE.FEED-BACK: 8
    • OE.NETWORK: 4
    • OE.S: 1
    • OE.SECRET: 3
    • OE.SERVER: 5
    • OE.SERVICE: 3
    • OE.SESSION: 10
    • OE.SETTING: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS: 19
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.BACKUP: 3
    • T.BACKUP-RESTORE: 1
    • T.BRING: 3
    • T.DISCARD: 3
    • T.DISCARD-MFP: 1
    • T.UNEXPECTED: 2
    • T.UNEXPECTED-TRANSMISSION: 1
  • A:
    • A.NK: 63
  • O:
    • O.NK: 190
  • OE:
    • OE.NK: 169
  • OSP:
    • OSP.NK: 22
  • T:
    • T.NK: 154
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 23
      • AES-128: 3
      • AES-256: 2
    • HPC:
      • HPC: 1
  • constructions:
    • MAC:
      • HMAC: 33
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-2: 2
      • SHA-256: 6
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 4
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 5
  • IKE:
    • IKE: 22
    • IKEv2: 8
  • IPsec:
    • IPsec: 31
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 147
      • TLS 1.2: 2
      • TLS 1.3: 2
  • VPN:
    • VPN: 59
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 14
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • GCM:
    • GCM: 4
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 2
    • brainpoolP384r1: 1
  • NIST:
    • P-256: 2
    • P-384: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384132: 1
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • side channel: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03111: 2
    • BSI TR-03116-1: 2
    • BSI TR-03144: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186: 2
    • FIPS 186-2: 4
    • FIPS PUB 197: 2
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 2
    • FIPS PUB 180-4: 5
    • FIPS PUB 186-4: 2
  • PKCS:
    • PKCS #12: 1
    • PKCS#1: 2
    • PKCS#12: 2
  • RFC:
    • RFC 1323: 1
    • RFC 2104: 2
    • RFC 2131: 2
    • RFC 2132: 2
    • RFC 2401: 1
    • RFC 2402: 1
    • RFC 2404: 2
    • RFC 2406: 2
    • RFC 2460: 1
    • RFC 2560: 1
    • RFC 2663: 1
    • RFC 3268: 1
    • RFC 3526: 1
    • RFC 3602: 3
    • RFC 4055: 2
    • RFC 4301: 5
    • RFC 4302: 2
    • RFC 4303: 6
    • RFC 4330: 1
    • RFC 4868: 2
    • RFC 5246: 4
    • RFC 5280: 1
    • RFC 5289: 2
    • RFC 5639: 3
    • RFC 5905: 1
    • RFC 7027: 1
    • RFC 7296: 7
    • RFC 791: 1
    • RFC 793: 1
    • RFC 8017: 3
    • RFC 8422: 2
    • RFC 8446: 1
    • RFC 958: 1
    • RFC-5639: 1
    • RFC-7027: 1
    • RFC7296: 1
  • X509:
    • X.509: 16
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20130415152125+09'00'
  • /Creator: CubePDF
  • /Keywords:
  • /ModDate: D:20130415152132+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1193119
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 115
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different