| name |
Zyxel ZyWALL VPN Firewall series |
Japan : bizhub PRESS C8000 Image Control Program, Overseas : bizhub PRESS C8000 Image Control Program Version: A1RF0Y0-00I1-G00-10 |
| category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
| scheme |
NO |
JP |
| status |
archived |
archived |
| not_valid_after |
19.04.2023 |
02.12.2015 |
| not_valid_before |
19.04.2018 |
16.11.2010 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180419_SERTIT_S-100_C_v.1.0.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180419_SERTIT-100_CR_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0279_erpt.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/180126%20[ZXL]%20Zyxel%20ST%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0279_est.pdf |
| manufacturer |
Zyxel Communications Corporation |
KONICA MINOLTA, INC. |
| manufacturer_web |
https://www.zyxel.com/homepage.shtml |
https://www.konicaminolta.com/index.html |
| security_level |
EAL2+, ALC_FLR.2 |
EAL3 |
| dgst |
ce99cb59837d8a6d |
9e9fa0dc76302277 |
| heuristics/cert_id |
SERTIT-100 |
JISEC-CC-CRP-C0279 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
- |
10 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- category: Network and Network-Related Devices and Systems
- certification_date: 19.04.2018
- developer: Zyxel Communications Corporation
- enhanced:
- category: Network and Network-Related Devices and Systems
- cert_id: SERTIT-100
- certification_date: 19.04.2018
- description: The TOE is one of a series of Zyxel ZyWALL VPN Firewalls. Each TOE is a self-contained box consisting of hardware and firmware, that provides stateful firewall and VPN-services for IPv4 and IPv6 networks. The TOE resides between one or more internal (virtual) networks (that the TOE is protecting) and an external network such as the Internet.
- developer: Zyxel Communications Corporation
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135250-1607953537/SERTIT/Sertifikater/2018/100/20180419_SERTIT_S-100_C_v.1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135253-1607953539/SERTIT/Sertifikater/2018/100/180126%20%5BZXL%5D%20Zyxel%20ST%20v1.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135256-1607953544/SERTIT/Sertifikater/2018/100/20180419_SERTIT-100_CR_v1.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 2, ALC_FLR.2
- mutual_recognition: CCRA, SOG-IS
- product: USG20-VPN V4.30(ABAQ.0); USG40 V4.30(AALA.0); USG60 V4.30(AAKY.0); VPN50 V4.30(ABHL.0); USG110 V4.30(AAPH.0); USG210 V4.30(AAPI.0); USG310 V4.30(AAPJ.0); ZyWALL 110 V4.30(AAAA.0); ZyWALL 310 V4.30(AAAB.0); VPN100 V4.30(ABFV.0); VPN300 V4.30(ABFC.0); USG1100 V4.30(AAPK.0); USG1900 V4.30(AAPL.0); ZyWALL1100 V4.30(AAAC.0); USG2200-VPN V4.30(ABAE.0)
- sponsor: Zyxel Communications Corporation
- product: Zyxel ZyWALL VPN Firewall series
- url: https://sertit.no/certified-products/product-archive/zyxel-zywall-vpn-firewall-series
|
- cert_id: JISEC-CC-CRP-C0279
- certification_date: 01.11.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0279_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE, that is installed with digital MFP manufactured by Konica Minolta Business Technologies, Inc., is a software product that provide the function of copier, printer and scanner. It prevents document data in HDD from disclosing during the abuse of functions such as copier, printer and scanner. TOE security functionality TOE provides the following security functions. - Identification and authentication function - Access control function - Audit function - Management function - CE function - Test function of HDD lock system
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japan : bizhub PRESS C8000 Image Control Program Overseas : bizhub PRESS C8000 Image Control Program
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0279_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0279_est.pdf
- toe_version: A1RF0Y0-00I1-G00-10
- vendor: KONICA MINOLTA, INC.
- expiration_date: 01.12.2015
- supplier: KONICA MINOLTA, INC. (Former: Konica Minolta Business Technologies, Inc.)
- toe_japan_name: bizhub PRESS C8000 Image Control Program A1RF0Y0-00I1-G00-10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0279_it0288.html
- toe_overseas_name: bizhub PRESS C8000 Image Control Program A1RF0Y0-00I1-G00-10
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
20180419_SERTIT_S-100_C_v.1.0.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- pdf_file_size_bytes: 721158
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
20180419_SERTIT-100_CR_v1.0.pdf |
c0279_erpt.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0279-01: 1
- Certification No. C0279: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 20
- EAL 2 augmented: 1
- EAL 4: 1
- EAL1: 1
- EAL7: 1
|
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 2
- AVA:
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FDP:
- FDP_RUL_EXT.1: 2
- FDP_UIT.1: 1
- FIA:
- FMT:
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FRU:
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.PHYSICAL: 1
- A.SINGLE_CONNECTION: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.DATA_FLOW_CONTROL: 1
- O.ENCRYPT: 1
- O.HIGH_AVAILABILITY: 1
- O.LOGGING: 1
- O.PROTECTED_MANAGEMENT: 1
- OE:
- OE.PHYSICAL: 1
- OE.SINGLE_CONNECTION: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.READ_MODIFY_DATA: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_DATA: 1
- T.UNDETECTED_ACTIONS: 2
|
- T:
- T.ACCESS: 4
- T.IMPADMIN: 4
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20180420105146Z00'00'
- /Creator: Word
- /ModDate: D:20180420105146Z00'00'
- /Producer: Mac OS X 10.13.4 Quartz PDFContext
- /Title: Microsoft Word - 20180419 SERTIT-100 CR v1.0.docx
- pdf_file_size_bytes: 1483850
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /CreationDate: D:20140129145204+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140129145241+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 312427
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
| pdf_data/st_filename |
180126 [ZXL] Zyxel ST v1.0.pdf |
c0279_est.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 1
- FDP_RUL: 1
- FDP_RUL_EXT: 3
- FDP_RUL_EXT.1: 9
- FDP_RUL_EXT.1.1: 2
- FDP_RUL_EXT.1.2: 2
- FDP_RUL_EXT.1.3: 2
- FDP_RUL_EXT.1.4: 2
- FDP_RUL_EXT.1.5: 2
- FDP_RUL_EXT.1.6: 2
- FDP_RUL_EXT.1.7: 2
- FDP_RUL_EXT.1.8: 2
- FDP_RUL_EXT.1.9: 2
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_UAU: 17
- FIA_UID: 16
- FIA_UID.1: 4
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FRU:
- FRU_FLT: 1
- FRU_FLT.2: 6
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC: 26
- FTP_ITC.1: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 1
|
- FAU:
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_ACC.1: 1
- FIA_AFL.1: 12
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS.1: 45
- FIA_SOS.1.1: 4
- FIA_UAU.1: 5
- FIA_UAU.2: 37
- FIA_UAU.2.1: 3
- FIA_UAU.6: 1
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID.1: 15
- FIA_UID.2: 29
- FIA_UID.2.1: 3
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 16
- FMT_MOF.1.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD.1: 67
- FMT_MTD.1.1: 7
- FMT_SMF.1: 39
- FMT_SMF.1.1: 1
- FMT_SMR.1: 59
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 3
- FPT:
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TEE.1: 9
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL: 2
- A.SINGLE_CONNECTION: 2
- A.TRUSTED_ADMIN: 2
- O:
- O.DATA_FLOW_CONTROL: 3
- O.ENCRYPT: 3
- O.HIGH_AVAILABILITY: 3
- O.LOGGING: 3
- O.PROTECTED_MANAGEMENT: 3
- OE:
- OE.PHYSICAL: 5
- OE.SINGLE_CONNECTION: 2
- OE.TRUSTED_ADMIN: 4
- T:
- T.READ_MODIFY_DATA: 2
- T.TSF_FAILURE: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_DATA: 2
- T.UNDETECTED_ACTIONS: 2
|
- O:
- O.ACCESS: 7
- O.AUDIT: 11
- O.CHECK-HDD: 6
- O.HDD-LOCK: 1
- O.IA: 12
- O.MANAGE: 12
- OE:
- OE.ADMIN: 3
- OE.HDD: 5
- OE.NET: 3
- OE.PLACE: 4
- OE.SECOND: 3
- OE.SECRET: 3
- OE.SERVICE: 3
- OE.SESSION: 6
- OE.SETTING-SECURITY: 3
- T:
- T.ACCESS: 2
- T.ACESS: 1
- T.HDDACESS: 2
- T.IMPADMIN: 2
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 1
- TLS v1.1: 1
- TLS v1.2: 2
- VPN:
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- RFC:
- RFC 3602: 1
- RFC 5280: 1
- RFC 5289: 5
- RFC2082: 1
- RFC2328: 1
- RFC2385: 1
- RFC2818: 1
- RFC5246: 1
- RFC5735: 2
- RFC5996: 1
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- issued from the panel of MFP body and through the network. To prevent leakage of the highly confidential document data stored in the MFP, TOE, using the MFP, provides the function that identifies and authenticates: 1
|
| pdf_data/st_metadata |
- /CreationDate: D:20180126144913+01'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180126144913+01'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 653210
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
- /Author: e06930
- /CreationDate: D:2014010717434009'00'
- /Creator: PrimoPDF http://www.primopdf.com/
- /ModDate: D:2014010717434009'00'
- /Producer: PrimoPDF
- /Title: (Microsoft Word - \201yC0279\201z\214\366\212J\227p\211p\225\266ST_Renoir_20131021_\203R\203\201\203\223\203g_ - \203R\203s\201[.doc)
- pdf_file_size_bytes: 742682
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |