Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub 368/bizhub 308/ineo 368/ineo 308 G00-09
JISEC-CC-CRP-C0546
bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software Version: A2XK0Y0-0100-G00-56
JISEC-CC-CRP-C0378
name bizhub 368/bizhub 308/ineo 368/ineo 308 G00-09 bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software Version: A2XK0Y0-0100-G00-56
category Multi-Function Devices Other Devices and Systems
not_valid_after 29.03.2022 06.12.2017
not_valid_before 29.03.2017 15.11.2012
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0546_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0546_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0378_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0546_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0378_est.pdf
manufacturer KONICA MINOLTA, INC. Konica Minolta Business Technologies, Inc
manufacturer_web https://www.konicaminolta.com/index.html https://www.konicaminolta.com/
security_level EAL2+, ALC_FLR.2 EAL3
dgst deab76d5c0fdde2f ca756a37746bc3cd
heuristics/cert_id JISEC-CC-CRP-C0546 JISEC-CC-CRP-C0378
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_308:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_368:-:*:*:*:*:*:*:* cpe:2.3:h:konicaminolta:bizhub_c454:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c364:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c224:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c284:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c554:-:*:*:*:*:*:*:*
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 368, 09, 308 554, 454, 0100, 364, 284, 56, 224
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0546
  • certification_date: 01.03.2017
  • claim: EAL2+ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0546_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is an MFP (Multi-Function Printer) that offers Copy, Scan, Print, Fax, and Document storage and retrieval functions. The TOE provides security functions that conform to U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std 2600.2™-2009) which is the MFP security requirement specification, to prevent unauthorized disclosure and alteration of user’s document data. TOE Security functions The TOE provides the following security functions. - Identification and authenticationFunction to identify and authenticate users. - User restriction control functionFunction to restrict available functions of users and to control the access to document data other than accumulated documents only to the authorized users. - Accumulated documents access control functionFunction to control the access to accumulated documents only to the authorized users. - HDD encryption functionFunction to encrypt the data that is stored in HDD. - Residual information deletion functionFunction to overwrite and delete the data stored in HDD, so that they cannot be reused. - Audit log functionFunction to record audit log related to security functions. - Network communication protection functionFunction to encrypt communication data on the LAN. - Self-test functionFunction to verify the integrity of executable codes of HDD encryption function and security functions. - Security management functionFunction to control the management of security functions only to the authorized users. - External interface separation functionFunction to prevent unauthorized transfer to LAN from external interface like public phone etc.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: bizhub 368/bizhub 308/ineo 368/ineo 308
    • product_type: Multi-Function Printer
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0546_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0546_est.pdf
    • toe_version: G00-09
    • vendor: KONICA MINOLTA, INC.
  • expiration_date: 01.04.2022
  • supplier: KONICA MINOLTA,INC.
  • toe_japan_name: bizhub 368/bizhub 308/ineo 368/ineo 308G00-09
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0546_it6604.html
  • toe_overseas_name: bizhub 368/bizhub 308/ineo 368/ineo 308G00-09
  • cert_id: JISEC-CC-CRP-C0378
  • certification_date: 01.11.2012
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0378_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Japanese : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software English : bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0378_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0378_est.pdf
    • toe_version: A2XK0Y0-0100-G00-56
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.12.2017
  • revalidations: [frozendict({'date': '2013-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386_01.html'})]
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Zentai Seigyo Software A2XK0Y0-0100-G00-56
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0378_it1386.html
  • toe_overseas_name: bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 / D410 / D411 / D412 / D415 / D416 / D417 / D710 / D711 / D715 / D716 Control Software A2XK0Y0-0100-G00-56
heuristics/protection_profiles 43ce79b420f23a00 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf {}
pdf_data/cert_filename c0546_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20170406110531+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /Keywords:
  • /ModDate: D:20170406110642+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 454719
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
pdf_data/report_filename c0546_erpt.pdf c0378_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0546-01: 1
    • Certification No. C0546: 1
  • JP:
    • CRP-C0378-01: 1
    • Certification No. C0378: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
  • EAL:
    • EAL3: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
  • T:
    • T.ACCESS-GROUP-: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 2
    • T.BRING-OUT-STORA: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRA: 1
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 1
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of: 1
pdf_data/report_metadata
  • /CreationDate: D:20170510115035+09'00'
  • /ModDate: D:20170510115442+09'00'
  • pdf_file_size_bytes: 602757
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /CreationDate: D:20130419151909+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130419151955+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 477272
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 42
pdf_data/st_filename c0546_est.pdf c0378_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 1
  • EAL:
    • EAL3: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • APE:
    • APE_ECD: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 2
    • FAU_STG.4: 13
    • FAU_STG.4.1: 2
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 18
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 20
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 10
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GNE.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 2
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 72
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 57
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 66
    • FIA_AFL.1.1: 8
    • FIA_AFL.1.2: 8
    • FIA_ATD.1: 29
    • FIA_ATD.1.1: 1
    • FIA_MSA.3: 1
    • FIA_SOS.1: 40
    • FIA_SOS.1.1: 4
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 41
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 43
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 32
    • FIA_UID.2: 63
    • FIA_UID.2.1: 7
    • FIA_USB.1: 26
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 48
    • FMT_MOF.1.1: 5
    • FMT_MSA: 5
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 42
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 123
    • FMT_MTD.1.1: 15
    • FMT_SMF.1: 128
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 185
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SOS.1: 1
  • FPT:
    • FPT_STM.1: 7
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 7
    • D.DOC: 37
    • D.FUNC: 26
    • D.PROT: 8
  • O:
    • O.AUDIT: 6
    • O.CONF: 12
    • O.DOC: 13
    • O.FUNC: 6
    • O.HDD: 9
    • O.INTERFACE: 6
    • O.PROT: 6
    • O.SOFTWARE: 6
    • O.USER: 11
    • O.USER_AUTHORIZED: 1
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.ADMIN: 5
    • A.NETWORK: 6
    • A.SECRET: 3
    • A.SERVICE: 4
  • O:
    • O.AUDIT: 2
    • O.AUDIT-LOGGED: 5
    • O.AUTH: 2
    • O.AUTH-CAPABILITY: 7
    • O.CONFIG: 12
    • O.CRYPT: 4
    • O.CRYPTO: 5
    • O.CRYPTO-CAPABILITY: 1
    • O.CRYPTO-KEY: 2
    • O.CRYPTO-MAIL: 4
    • O.FAX: 2
    • O.FAX-CONTROL: 3
    • O.GROUP: 3
    • O.GROUP-BOX: 3
    • O.OVERWRITE: 7
    • O.PRIVATE: 3
    • O.PRIVATE-BOX: 3
    • O.PUBLIC: 3
    • O.PUBLIC-BOX: 5
    • O.REGISTERED: 3
    • O.REGISTERED-USER: 11
    • O.SECURE: 4
    • O.SECURE-PRINT: 5
    • O.TRU: 1
    • O.TRUSTED: 5
  • OE:
    • OE.ADMIN: 3
    • OE.AUDIT: 3
    • OE.AUDIT-REVIEWED: 2
    • OE.AUDIT_ACCESS-AUT: 1
    • OE.AUDIT_ACESS-AUTHORIZED: 1
    • OE.AUDIT_STORAGE-PR: 1
    • OE.AUDIT_STORAGE-PROTECTED: 1
    • OE.FAX: 2
    • OE.FAX-UNIT: 2
    • OE.FEED: 2
    • OE.FEED-BACK: 8
    • OE.NETWORK: 4
    • OE.S: 1
    • OE.SECRET: 3
    • OE.SERVER: 5
    • OE.SERVICE: 3
    • OE.SESSION: 10
    • OE.SETTING: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS: 19
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.BACKUP: 3
    • T.BACKUP-RESTORE: 1
    • T.BRING: 3
    • T.DISCARD: 3
    • T.DISCARD-MFP: 1
    • T.UNEXPECTED: 2
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 4
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 2
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • SSL:
      • SSL: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186: 2
    • FIPS 186-2: 4
    • FIPS PUB 197: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
pdf_data/st_metadata
  • /Author: e08884
  • /CreationDate: D:20170509173553+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20170509173553+09'00'
  • /Producer: Acrobat Distiller 15.0 (Windows)
  • /Title: Microsoft Word - 【C0546】英文_ASE_ZeusS 1_2 BK1st-2.00-170317(コメント付)_修正案2.docx
  • pdf_file_size_bytes: 546321
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 79
  • /Author:
  • /CreationDate: D:20130415152125+09'00'
  • /Creator: CubePDF
  • /Keywords:
  • /ModDate: D:20130415152132+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1193119
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 115
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different