name |
Cellcrypt Mobile for Secret Client Version 1.0 |
Data Security Kit(D) Software V1.00E |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
14.04.2016 |
31.01.2013 |
not_valid_before |
14.04.2014 |
31.10.2006 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10535-vr.pdf |
https://www.commoncriteriaportal.org/files/epfiles/c0057_ecvr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10535-st.pdf |
https://www.commoncriteriaportal.org/files/epfiles/ |
manufacturer |
Cellcrypt, Inc. |
KYOCERA MITA Corporation |
manufacturer_web |
https://www.cellcrypt.com |
|
security_level |
{} |
EAL3 |
dgst |
d5bea3cca35460ab |
48b4705efb8d55e7 |
heuristics/cert_id |
CCEVS-VR-VID-10535-2014 |
JISEC-CC-CRP-C0057 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.2, ASE_TSS.1, ADV_FSP.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ALC_CMC.2, ATE_IND.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
{} |
heuristics/extracted_versions |
1.0 |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0057
- certification_date: 01.10.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0057_eimg.pdf
- description: PRODUCT DESCRIPTION This TOE is a software module that is installed on the MFPs "KM-C2520/KM-C3225/KM-C3232, CS-C2520/CS-C3225/CS-C3232" of KYOCERA MITA Corporation, and which provides the ordinary functions, and also security functions for protecting residue data. This TOE is installed on the above-mentioned MFPs and protects image data remaining on the HDDs from unjust exposure, after various copying, printing, and network scanning processings, by providing an HDD overwriting function. And it has the administrator authentication function that identifies and authenticates a TOE machine administrator who sets the HDD overwrite deletion method and operates it.
- evaluation_facility: Japan Electronics & Information Technology Industries Association, Information Technology Security Center
- product: Data Security Kit(D) Software
- product_type: IT Product (data protection function in digital Multi Function Device)
- toe_version: V1.00E
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.03.2013
- revalidations: [frozendict({'date': '2007-10', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0057_it5065_02.html'})]
- supplier: KYOCERA MITA Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0057_it5065.html
- toe_overseas_name: Data Security Kit(D) Software V2.10E
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
5c9f07187a15daeb |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_mobility_voip_v0.6-1.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10535-vr.pdf |
c0057_ecvr.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10535-2014
- cert_item: Cellcrypt Mobile for Secret Client Version 1.0
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10535-2014: 1
|
- JP:
- Certification No. C0057: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM_EXT: 1
- FCS_COP.1: 8
- FCS_RBG_EXT: 2
- FCS_SRTP_EXT: 2
- FCS_TLS_EXT: 2
- FIA:
- FPT:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.AUTHORIZED_USER: 1
- A.AVAILABILITY: 1
- A.OPER_ENV: 1
- A.TRUSTED_ADMIN: 1
- OE:
- OE.AUTHORIZED_USER: 1
- OE.AVAILABILITY: 1
- OE.OPER_ENV: 1
- OE.TRUSTED_ADMIN: 1
- OE.VERIFIABLE_UPDATES: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- FIPS:
- NIST:
- RFC:
- RFC 3711: 1
- RFC 4566: 1
- RFC 4568: 1
- RFC 5246: 2
- RFC 6460: 1
- X509:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Kirill Sinitski
- /Company: Entrust, Inc.
- /CreationDate: D:20140422101342-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /ModDate: D:20140422101347-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140422141332
- pdf_file_size_bytes: 287391
- pdf_hyperlinks: http://tools.ietf.org/html/rfc3711, http://tools.ietf.org/html/rfc4568
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /CreationDate: D:20061102202158+09'00'
- /ModDate: D:20061102202158+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12898
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/st_filename |
st_vid10535-st.pdf |
|
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 9
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 2
- ALC_CMC.2: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 5
- ATE:
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 8
- FCS_CKM_EXT: 2
- FCS_CKM_EXT.4: 4
- FCS_CKM_EXT.4.1: 1
- FCS_COP: 2
- FCS_COP.1: 17
- FCS_COP.1.1: 4
- FCS_DTLS_EXT.1: 3
- FCS_RBG_EXT: 4
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SIP_EXT.1: 2
- FCS_SRPT_EXT.1.1: 1
- FCS_SRTP_EXT: 4
- FCS_SRTP_EXT.1: 4
- FCS_SRTP_EXT.1.1: 1
- FCS_SRTP_EXT.1.2: 1
- FCS_SRTP_EXT.1.3: 1
- FCS_SRTP_EXT.1.4: 1
- FCS_TLS_EXT: 5
- FCS_TLS_EXT.1: 4
- FCS_TLS_EXT.1.1: 2
- FIA:
- FIA_SIPC_EXT: 3
- FIA_SIPC_EXT.1: 2
- FIA_SIPC_EXT.1.1: 2
- FIA_SIPC_EXT.1.2: 3
- FIA_SIPC_EXT.1.3: 2
- FIA_SIPC_EXT.1.4: 2
- FIA_UAU.5: 1
- FPT:
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 2
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHORIZED_USER: 3
- A.AVAILABILITY: 3
- A.OPER_ENV: 2
- A.TRUSTED_ADMIN: 3
- O:
- O.PROTECTED_COMMUNICATIONS: 3
- O.TRUSTED_UPDATES: 3
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.AUTHORIZED_USER: 3
- OE.AVAILABILITY: 3
- OE.OPER_ENV: 4
- OE.TRUSTED_ADMIN: 4
- OE.VERIFIABLE_U: 1
- OE.VERIFIABLE_UPDATES: 1
- T:
- T.UNAUTHORIZED_ACCESS: 3
- T.UNAUTHORIZED_UPDATE: 3
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_256_GCM_SHA38: 1
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 140-2: 3
- FIPS PUB 186-3: 2
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-90: 2
- RFC:
- RFC 3261: 4
- RFC 3550: 1
- RFC 3711: 4
- RFC 4566: 3
- RFC 4568: 5
- RFC 5246: 3
- RFC 5280: 1
- RFC 5759: 1
- RFC 5764: 1
- RFC 6460: 2
- RFC2560: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /AAPL:Keywords: ['']
- /Author: Richard Chen
- /CreationDate: D:20140422135444Z
- /Creator: Word
- /Keywords:
- /ModDate: D:20140422102706-04'00'
- /Producer: Mac OS X 10.9.2 Quartz PDFContext
- /Subject:
- /Title: ST v3.2
- pdf_file_size_bytes: 800293
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 37
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
True |
False |
state/st/convert_ok |
True |
False |
state/st/download_ok |
True |
False |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |