name |
Xerox WorkCentre 5222/5225/5230 Version: Controller+PS ROM Ver.1.204.4, IOT ROM Ver.11.21.0, IIT ROM Ver.3.7.0, ADF ROM Ver.20.0.0
|
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m
|
category |
Multi-Function Devices
|
Multi-Function Devices
|
not_valid_before |
2008-09-11
|
2010-02-25
|
not_valid_after |
2013-10-07
|
2015-03-01
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0184_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Fuji Xerox Co., Ltd.
|
Ricoh Company, Ltd.
|
manufacturer_web |
https://www.fujixerox.co.jp/eng/
|
https://www.ricoh.com/
|
security_level |
EAL2 |
ALC_FLR.2, EAL3+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0184_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_erpt.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
738ea9f873c776e0917517f9b81ba6488fcd979211d023cd1207fb16c0e946af
|
7fa424b1dd452cb2c7793a3a8bece7e5e5410ba457ff44bb46ecb91b0d9d645f
|
state/report/txt_hash |
b530dadb01b48b7b8220082778d5fa9b5906b116654d3e61ee89fb5800d22015
|
5710d2d89500845be1fd471294a614fc1a27e0cf8b667c6d9e0c0dd45701409c
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
4b7fad59c7cda7b7007ce5a5376e48a7883a196f592e3b88669fefd32e36be8a
|
4b88251809d96351ffcb5e2065b5c303a9dc0305316eec39aeae2ab7bd136885
|
state/st/txt_hash |
145e3160f25e72298e91e0dd8a677d2666056878be7c89f3597aede2c62e2e25
|
e3085316072214aba0f74dd921d8747846705a1f62f96a828b9949928b327ab0
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0184
|
JISEC-CC-CRP-C0246
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
20.0.0, 11.21.0, 3.7.0, 1.204.4 |
1.01, 1.11, 01.24, 7.26, 1.3, 15.000, 1.04, 7.33, 1.59, 1.11.1, 1.15, 1.10, 2.16, 7.15.02 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- cert_id:
C0184
- supplier:
Fuji Xerox Co., Ltd.
- toe_overseas_name:
Xerox
WorkCentre 5222/5225/5230
Controller+PS ROMVer.1.204.4
IOT ROMVer.11.21.0
IIT ROMVer.3.7.0
ADF ROMVer.20.0.0
- expiration_date:
2013-10
- claim:
EAL2
- certification_date:
2008-09
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0184_it8205.html
- toe_japan_name:
-----
- enhanced:
- product:
Xerox WorkCentre 5222/5225/5230
- product_type:
IT product(Multi Function Peripheral)
- certification_date:
2008-09-11
- assurance_level:
EAL2
- vendor:
Fuji Xerox Co., Ltd.
- evaluation_facility:
Information Technology Security Center
Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0184_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0184_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0184_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE.
TOE security functions
To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions:
- Hard Disk Data Overwrite
- Hard Disk Data Encryption
- User Authentication
- System Administrator's Security Management
- Customer Engineer Operation Restriction
- Security Audit Log
- Internal Network Data Protection
- FAX Flow Security
|
- cert_id:
C0246
- supplier:
RICOH COMPANY, LTD.
- toe_overseas_name:
-----
- expiration_date:
2015-03
- claim:
EAL3+
ALC_FLR.2
PP
- certification_date:
2010-02
- toe_overseas_link:
None
- toe_japan_name:
Ricoh imagio MP 5000SP/4000SP
with security card Type 9
- Firmware Configuration
System VersionV2.16-00
System/Copy1.11.1,
Network Support7.26,
Network DocBox1.10C,
Web Support1.59,
Web Uapl1.15, animation1.3,
Scanner01.24,
RPDL7.33,
Printer;1.11,
MSIS7.15.02,
RPCS Font1.01,
Engine1.04:05,
OpePanel1.01,
LANG01.01,
LANG11.01,
ADF15.000:15
- ASIC
Ic Key1100
- Option
Data Erase Opt1.01m
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0246_it9257.html
- enhanced:
- product:
Ricoh imagio MP 5000SP/4000SP with security card Type 9
- toe_version:
- Firmware Configuration
System VersionV2.16-00
System/Copy1.11.1
Network Support7.26
Network DocBox1.10C
Web Support1.59
Web Uapl1.15
animation1.3
Scanner01.24
RPDL7.33
Printer1.11
MSIS7.15.02
RPCS Font1.01
Engine1.04:05
OpePanel1.01
LANG01.01
LANG11.01
ADF15.000:15
- ASIC
Ic Key1100
- Option
Data Erase Opt1.01m
- product_type:
Multi Function Product
- certification_date:
2010-02-25
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
2600.1, Protection Profile for Hardcopy Devices, Operational Environment A 1.0, dated June 2009
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0246_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0246_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0246_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions.
TOE security functionality
The main security functions are described as follows:
-
Audit Function: to generate / review audit log of the event.
-
Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout.
-
Access Control Function: to control available functions for each user, and to control the document operation.
-
Network Protection Function: to protect information on the Network with use of the encrypted communication.
-
Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data.
-
Security Management Function: to make the administrators control the security functions.
-
Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes.
|
heuristics/scheme_data/cert_id |
C0184
|
C0246
|
heuristics/scheme_data/certification_date |
2008-09
|
2010-02
|
heuristics/scheme_data/claim |
EAL2
|
EAL3+
ALC_FLR.2
PP
|
heuristics/scheme_data/enhanced |
- product:
Xerox WorkCentre 5222/5225/5230
- product_type:
IT product(Multi Function Peripheral)
- certification_date:
2008-09-11
- assurance_level:
EAL2
- vendor:
Fuji Xerox Co., Ltd.
- evaluation_facility:
Information Technology Security Center
Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0184_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0184_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0184_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE.
TOE security functions
To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions:
- Hard Disk Data Overwrite
- Hard Disk Data Encryption
- User Authentication
- System Administrator's Security Management
- Customer Engineer Operation Restriction
- Security Audit Log
- Internal Network Data Protection
- FAX Flow Security
|
- product:
Ricoh imagio MP 5000SP/4000SP with security card Type 9
- toe_version: - Firmware Configuration
System VersionV2.16-00
System/Copy1.11.1
Network Support7.26
Network DocBox1.10C
Web Support1.59
Web Uapl1.15
animation1.3
Scanner01.24
RPDL7.33
Printer1.11
MSIS7.15.02
RPCS Font1.01
Engine1.04:05
OpePanel1.01
LANG01.01
LANG11.01
ADF15.000:15
- ASIC
Ic Key1100
- Option
Data Erase Opt1.01m
- product_type:
Multi Function Product
- certification_date:
2010-02-25
- cc_version: 3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile: 2600.1, Protection Profile for Hardcopy Devices, Operational Environment A 1.0, dated June 2009
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0246_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0246_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0246_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions.
TOE security functionality
The main security functions are described as follows:
-
Audit Function: to generate / review audit log of the event.
-
Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout.
-
Access Control Function: to control available functions for each user, and to control the document operation.
-
Network Protection Function: to protect information on the Network with use of the encrypted communication.
-
Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data.
-
Security Management Function: to make the administrators control the security functions.
-
Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL2
|
EAL3 Augmented with ALC_FLR.2
|
heuristics/scheme_data/enhanced/cert_link |
https://www.ipa.go.jp/en/security/c0184_eimg.pdf
|
https://www.ipa.go.jp/en/security/c0246_eimg.pdf
|
heuristics/scheme_data/enhanced/certification_date |
2008-09-11
|
2010-02-25
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE.
TOE security functions
To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions:
- Hard Disk Data Overwrite
- Hard Disk Data Encryption
- User Authentication
- System Administrator's Security Management
- Customer Engineer Operation Restriction
- Security Audit Log
- Internal Network Data Protection
- FAX Flow Security
|
PRODUCT DESCRIPTION
Description of TOE
The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions.
TOE security functionality
The main security functions are described as follows:
-
Audit Function: to generate / review audit log of the event.
-
Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout.
-
Access Control Function: to control available functions for each user, and to control the document operation.
-
Network Protection Function: to protect information on the Network with use of the encrypted communication.
-
Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data.
-
Security Management Function: to make the administrators control the security functions.
-
Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Information Technology Security Center
Evaluation Department
|
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
|
heuristics/scheme_data/enhanced/product |
Xerox WorkCentre 5222/5225/5230
|
Ricoh imagio MP 5000SP/4000SP with security card Type 9
|
heuristics/scheme_data/enhanced/product_type |
IT product(Multi Function Peripheral)
|
Multi Function Product
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0184_erpt.pdf
|
https://www.ipa.go.jp/en/security/c0246_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0184_est.pdf
|
https://www.ipa.go.jp/en/security/c0246_est.pdf
|
heuristics/scheme_data/enhanced/vendor |
Fuji Xerox Co., Ltd.
|
RICOH COMPANY, LTD.
|
heuristics/scheme_data/expiration_date |
2013-10
|
2015-03
|
heuristics/scheme_data/supplier |
Fuji Xerox Co., Ltd.
|
RICOH COMPANY, LTD.
|
heuristics/scheme_data/toe_japan_name |
-----
|
Ricoh imagio MP 5000SP/4000SP
with security card Type 9
- Firmware Configuration
System VersionV2.16-00
System/Copy1.11.1,
Network Support7.26,
Network DocBox1.10C,
Web Support1.59,
Web Uapl1.15, animation1.3,
Scanner01.24,
RPDL7.33,
Printer;1.11,
MSIS7.15.02,
RPCS Font1.01,
Engine1.04:05,
OpePanel1.01,
LANG01.01,
LANG11.01,
ADF15.000:15
- ASIC
Ic Key1100
- Option
Data Erase Opt1.01m
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0184_it8205.html
|
None
|
heuristics/scheme_data/toe_overseas_name |
Xerox
WorkCentre 5222/5225/5230
Controller+PS ROMVer.1.204.4
IOT ROMVer.11.21.0
IIT ROMVer.3.7.0
ADF ROMVer.20.0.0
|
-----
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
c0184_erpt.pdf
|
c0246_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0184-01:
1
- Certification No. C0184:
1
|
- CRP-C0246-01:
1
- Certification No. C0246:
1
|
pdf_data/report_keywords/cc_claims/A |
|
- A.ACCESS: 1
- A.USER: 1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_claims/A/A.ADMIN |
1
|
2
|
pdf_data/report_keywords/cc_claims/T |
- T.RECOVER:
1
- T.CONFDATA:
1
- T.DATA_SEC:
1
- T.COMM_TAP:
1
- T.CONSUME:
1
|
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
- EAL3:
3
- EAL3 augmented:
2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center:
3
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 15408:2005:
1
- ISO/IEC 18045:2005:
2
- CC:
- CCMB-2005-08-001:
2
- CCMB-2005-08-002:
2
- CCMB-2005-08-003:
2
- CCMB-2005-08-004:
2
|
- CC:
- CCMB-2006-09-001:
2
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2007-09-004:
2
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2005-08-001:
2
- CCMB-2005-08-002:
2
- CCMB-2005-08-003:
2
- CCMB-2005-08-004:
2
|
- CCMB-2006-09-001:
2
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2007-09-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20081015105724+09'00'
|
D:20100629170727+09'00'
|
pdf_data/report_metadata//ModDate |
D:20081015105724+09'00'
|
D:20100629170727+09'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 6.0 (Windows)
|
Acrobat Distiller 6.0 (Windows)
|
pdf_data/report_metadata//Title |
untitled
|
untitled
|
pdf_data/report_metadata/pdf_file_size_bytes |
165386
|
230440
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
26
|
29
|
pdf_data/st_filename |
c0184_est.pdf
|
c0246_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
|
- A.ACCESS: 5
- A.USER: 4
- A.ADMIN:
10
|
pdf_data/st_keywords/cc_claims/A/A.ADMIN |
4
|
10
|
pdf_data/st_keywords/cc_claims/O |
- O.AUDITS: 10
- O.CIPHER: 7
- O.COMM_SEC: 8
- O.FAX_SEC: 6
- O.MANAGE: 10
- O.RESIDUAL: 7
- O.USER:
8
- O.RESTRICT: 8
|
- O.DOC: 18
- O.FUNC: 9
- O.PROT: 9
- O.CONF: 18
- O.USER:
21
- O.INTERFACE: 9
- O.SOFTWARE: 9
- O.AUDIT: 9
|
pdf_data/st_keywords/cc_claims/O/O.USER |
8
|
21
|
pdf_data/st_keywords/cc_claims/OE |
- OE.ADMIN:
4
- OE.AUTH: 8
- OE.COMMS_SEC: 6
- OE.FUNCTION: 8
|
- OE.AUDIT_STORAGE: 4
- OE.AUDIT_ACCESS: 3
- OE.INTERFACE: 4
- OE.PHYSICAL: 1
- OE.USER: 21
- OE.ADMIN:
8
- OE.AUDIT: 3
- OE.AUDIT_ACCESS_AUTHORIZED: 1
- OE.PHYISCAL: 3
|
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN |
4
|
8
|
pdf_data/st_keywords/cc_claims/T |
- T.RECOVER:
4
- T.CONFDATA:
3
- T.DATA_SEC:
3
- T.COMM_TAP:
4
- T.CONSUME:
4
|
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1:
7
- ADO_IGS.1:
7
- ADV:
- ADV_FSP.1:
12
- ADV_RCR.1:
7
- ADV_HLD.1:
6
- AGD:
- AGD_ADM.1:
8
- AGD_USR.1:
7
- ATE:
- ATE_COV.1:
5
- ATE_FUN.1:
6
- ATE_IND.2:
5
- AVA:
- AVA_SOF.1:
3
- AVA_VLA.1:
3
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
2
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.2:
3
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
2
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP.1:
12
- ADV_RCR.1:
7
- ADV_HLD.1:
6
|
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
2
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_ADM.1:
8
- AGD_USR.1:
7
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.1: 5
- ATE_FUN.1:
6
- ATE_IND.2:
5
|
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
6
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
5
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_SOF.1:
3
- AVA_VLA.1:
3
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
17
- FAU_GEN.1.2:
1
- FAU_SAR.1:
13
- FAU_SAR.2:
14
- FAU_STG.1:
14
- FAU_STG.4:
12
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG:
1
- FCS:
- FCS_CKM.1:
18
- FCS_COP.1:
15
- FCS_CKM.1.1:
1
- FCS_CKM.2:
1
- FCS_CKM.4:
4
- FCS_COP.1.1:
1
- FDP:
- FDP_ACC.1:
15
- FDP_ACF.1:
12
- FDP_IFC.1:
14
- FDP_IFF.1:
12
- FDP_RIP.1:
13
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1.1:
1
- FDP_IFF.1.1:
1
- FDP_IFF.1.2:
1
- FDP_IFF.1.3:
1
- FDP_IFF.1.4:
1
- FDP_IFF.1.5:
1
- FDP_IFF.1.6:
1
- FDP_RIP.1.1:
1
- FDP_IFF:
1
- FIA:
- FIA_AFL.1:
28
- FIA_UAU.2:
23
- FIA_UAU.7:
17
- FIA_UID.2:
21
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU.1:
4
- FIA_UAU.2.1:
1
- FIA_UID.1:
10
- FIA_UAU.7.1:
1
- FIA_UID.2.1:
1
- FIA_UIA.2:
1
- FIA_UID:
1
- FIA_UAU:
1
- FMT:
- FMT_MOF.1:
27
- FMT_MSA.1:
13
- FMT_MSA.3:
13
- FMT_MTD.1:
12
- FMT_SMF.1:
17
- FMT_SMR.1:
24
- FMT_MSA.2:
4
- FMT_MOF.1.1:
1
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_SMF:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
- FMT_MSA:
2
- FPT:
- FPT_STM.1:
15
- FPT_RVM.1:
48
- FPT_RVM.1.1:
1
- FPT_STM.1.1:
1
- FTP:
- FTP_TRP.1:
12
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3:
1
|
- FAU:
- FAU_STG.1:
9
- FAU_STG.4:
8
- FAU_SAR.1:
10
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FDP:
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_ACF.1:
27
- FDP_ACC.1:
29
- FDP_ACC.1.1:
2
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_RIP.1:
6
- FDP_RIP.1.1:
1
- FDP_IFC.1:
4
- FIA:
- FIA_AFL.1:
8
- FIA_UAU.7:
7
- FIA_SOS.1:
8
- FIA_UAU.1:
14
- FIA_UID.1:
17
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
9
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1:
7
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_SMF.1:
20
- FMT_SMR.1:
26
- FMT_MSA.3:
24
- FMT_MSA.1:
23
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
11
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_FDI_EXP:
4
- FPT_FDI_EXP.1:
11
- FPT_FDI_EXP.1.1:
2
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTA:
- FTA_SSL.3:
10
- FTA_SSL.3.1:
1
- FTP:
- FTP_ITC.1:
18
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
17
- FAU_GEN.1.2:
1
- FAU_SAR.1:
13
- FAU_SAR.2:
14
- FAU_STG.1:
14
- FAU_STG.4:
12
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG: 1
|
- FAU_STG.1:
9
- FAU_STG.4:
8
- FAU_SAR.1:
10
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2:
1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1: 1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
17
|
12
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 |
13
|
10
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 |
14
|
7
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 |
14
|
9
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 |
12
|
8
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
15
- FDP_ACF.1:
12
- FDP_IFC.1:
14
- FDP_IFF.1: 12
- FDP_RIP.1:
13
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1.1: 1
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_RIP.1.1:
1
- FDP_IFF:
1
|
- FDP_IFF:
1
- FDP_IFC: 1
- FDP_ACF.1:
27
- FDP_ACC.1:
29
- FDP_ACC.1.1:
2
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_RIP.1:
6
- FDP_RIP.1.1:
1
- FDP_IFC.1:
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
15
|
29
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
12
|
27
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
14
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
13
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1:
28
- FIA_UAU.2: 23
- FIA_UAU.7:
17
- FIA_UID.2: 21
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU.1:
4
- FIA_UAU.2.1: 1
- FIA_UID.1:
10
- FIA_UAU.7.1:
1
- FIA_UID.2.1: 1
- FIA_UIA.2: 1
- FIA_UID: 1
- FIA_UAU: 1
|
- FIA_AFL.1:
8
- FIA_UAU.7:
7
- FIA_SOS.1: 8
- FIA_UAU.1:
14
- FIA_UID.1:
17
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7.1:
1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
28
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
4
|
14
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 |
17
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
10
|
17
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MOF.1: 27
- FMT_MSA.1:
13
- FMT_MSA.3:
13
- FMT_MTD.1:
12
- FMT_SMF.1:
17
- FMT_SMR.1:
24
- FMT_MSA.2: 4
- FMT_MOF.1.1: 1
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_SMF: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
- FMT_MSA: 2
|
- FMT_SMF.1:
20
- FMT_SMR.1:
26
- FMT_MSA.3:
24
- FMT_MSA.1:
23
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
11
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
13
|
23
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
13
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
12
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
17
|
20
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
24
|
26
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_STM.1:
15
- FPT_RVM.1: 48
- FPT_RVM.1.1: 1
- FPT_STM.1.1:
1
|
- FPT_FDI_EXP: 4
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1:
9
- FPT_TST.1: 6
- FPT_STM.1.1:
1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
15
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_TRP.1:
12
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3:
1
|
- FTP_ITC.1:
18
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1:
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- RFC:
- ISO:
- X509:
- CC:
- CCMB-2005-08-001:
1
- CCMB-2005-08-002:
1
- CCMB-2005-08-003:
1
- CCMB-2005-08-004:
1
|
- CC:
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2005-08-001:
1
- CCMB-2005-08-002:
1
- CCMB-2005-08-003:
1
- CCMB-2005-08-004:
1
|
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA:
1
- TLS_RSA_WITH_AES_256_CBC_SHA:
1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
kurata-masami
|
|
pdf_data/st_metadata//CreationDate |
D:20080926134359+09'00'
|
D:20100618152326+09'00'
|
pdf_data/st_metadata//Creator |
PScript5.dll Version 5.2
|
PScript5.dll Version 5.2.2
|
pdf_data/st_metadata//ModDate |
D:20080926134359+09'00'
|
D:20100618152326+09'00'
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 6.0 (Windows)
|
Acrobat Distiller 7.0.5 (Windows)
|
pdf_data/st_metadata//Title |
Microsoft Word - 8205 セキュリティターゲットV1.0.2e.doc
|
Microsoft Word - C0246ST_eng_2010-6-18.doc
|
pdf_data/st_metadata/pdf_file_size_bytes |
673651
|
464939
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
86
|
65
|
dgst |
d43b950c2a7a95ff
|
93cdda41b5a03cdf
|