name |
Data Security Kit (E) Software Type II V1.00J |
Cisco Unified Wireless Network & Wireless Intrusion Prevention System Version: 7.0.230.0 |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
AU |
status |
archived |
archived |
not_valid_after |
01.10.2015 |
01.09.2019 |
not_valid_before |
28.09.2010 |
13.08.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0268_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR_2012_81.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0268_est-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_0313.pdf |
manufacturer |
KYOCERA MITA Corporation |
Cisco Systems, Inc. |
manufacturer_web |
https://www.kyoceramita.com/ |
https://www.cisco.com |
security_level |
EAL3 |
EAL4+, ALC_FLR.2 |
dgst |
dfd674b20f0de202 |
19d36eb2dd0a5a96 |
heuristics/cert_id |
JISEC-CC-CRP-C0268 |
Certificate Number: 2012/81 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:a:cisco:intrusion_prevention_system:7.0:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2014-2103, CVE-2014-3402, CVE-2014-3406, CVE-2011-4022, CVE-2013-1218, CVE-2013-1243 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
1.00 |
7.0.230.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2012/81 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2012/81, ANSSI-CC-2009/56 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0268
- certification_date: 01.09.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0268_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 520i - TASKalfa 420i This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Data Security Kit (E) Software Type II
- product_type: Data protection function in digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0268_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0268_est.pdf
- toe_version: V1.00J
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.10.2015
- supplier: KYOCERA MITA Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0268_it9265.html
- toe_japan_name: Data Security Kit (E) Software Type II V1.00J
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
2c600f8f821812a8 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_WLANAS_BR_V1.0.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0268_erpt.pdf |
CR_2012_81.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0268-01: 1
- Certification No. C0268: 1
|
- AU:
- Certification Report 2012/81: 1
- FR:
- Certification Report 2012/81: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CE: 1
- A.LOCATION: 1
- A.NETWORK: 2
- T:
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 33
- Cisco Systems: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
|
- CC:
- CCIMB-2009-07-001: 1
- CCIMB-2009-07-004: 1
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20101215173625+09'00'
- /ModDate: D:20101215173625+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 183868
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /CreationDate: D:20120813150142
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20120813150142
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 250238
- pdf_hyperlinks: http://www.dsd.gov.au/
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
c0268_est-1.pdf |
ST_0313.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL4: 7
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 5
- ADV_IMP.1: 2
- ADV_RCR: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.3: 5
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 5
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 4
- ALC_CMS.4: 4
- ALC_DEL.1: 4
- ALC_DVS.1: 2
- ALC_FLR.2: 9
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 4
- ATE_DPT.2: 3
- ATE_FUN.1: 4
- ATE_IND.2: 4
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
|
- FAU:
- FAU_GEN.1: 20
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAR: 1
- FAU_SAR.1: 3
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 3
- FAU_SAR.2.1: 1
- FAU_SAR.3: 2
- FAU_SAR.3.1: 1
- FAU_SEL.1: 17
- FAU_SEL.1.1: 4
- FAU_STG.1: 3
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 3
- FAU_STG.3.1: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 42
- FCS_CKM.1.1: 4
- FCS_CKM.2: 12
- FCS_CKM.2.1: 1
- FCS_CKM.4: 27
- FCS_CKM.4.1: 1
- FCS_COP: 2
- FCS_COP.1: 42
- FCS_COP.1.1: 4
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 2
- FDP_ITC.1: 8
- FDP_ITC.2: 7
- FDP_PUD: 2
- FDP_PUD_EXT: 1
- FDP_RIP.1: 14
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 14
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 3
- FIA_ATD.1: 24
- FIA_ATD.1.1: 3
- FIA_UAU: 2
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 7
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 14
- FIA_UID.2.1: 1
- FIA_USB.1: 19
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 33
- FMT_MOF.1.1: 4
- FMT_MSA.1: 2
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MTD.1: 39
- FMT_MTD.1.1: 5
- FMT_REV.1: 2
- FMT_SMF.1: 36
- FMT_SMF.1.1: 3
- FMT_SMR.1: 24
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.1: 11
- FPT_STM: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST: 4
- FPT_TST.1: 18
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTA_TAB.1: 11
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITT.1: 2
- FTP_TRP.1: 10
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CE: 4
- A.LOCATION: 5
- A.NETWORK: 5
- O:
- OE:
- OE.CE: 3
- OE.LOCATION: 3
- OE.NETWORK: 3
- T:
|
- A:
- A.CLIENT_PROTECT: 3
- A.NO_EVIL: 2
- A.NO_GENERAL_: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 2
- A.TOE_NO_BYPASS: 2
- O:
- O.ADMIN_GUIDANCE: 8
- O.AUDIT_GENERATION: 3
- O.CONFIGURATION_: 1
- O.CONFIGURATION_IDENTIFICAT: 1
- O.CONFIGURATION_IDENTIFICATION: 6
- O.CORRECT_: 1
- O.CORRECT_TSF_: 1
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHY: 9
- O.CRYPTOGRAPHY_: 1
- O.CRYPTOGRAPHY_VALIDATED: 3
- O.DISPLAY_BANNER: 7
- O.DOCUMENTED_: 1
- O.DOCUMENTED_DESIGN: 4
- O.MANAGE: 6
- O.MEDIATE: 9
- O.PARTIAL_: 1
- O.PARTIAL_FUNCTIONAL_TESTI: 1
- O.PARTIAL_FUNCTIONAL_TESTING: 2
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION: 9
- O.SELF_PROTECTION: 5
- O.TIME_STAMPS: 8
- O.TOE: 1
- O.TOE_ACCESS: 6
- O.VULNERABILITY_: 1
- O.VULNERABILITY_ANALYSIS: 5
- O.VULNERABILITY_ANALYSIS_TEST: 3
- O.WIPS_FUNCTIONS: 10
- OE:
- OE.AUDIT_PROTECTION: 4
- OE.AUDIT_REVIEW: 2
- OE.CLIENT_PROTECT: 6
- OE.MANAGE: 8
- OE.NO_EVIL: 4
- OE.NO_GENERAL_PURPOSE: 5
- OE.PHYSICAL: 2
- OE.PROTECT_MGMT_COMMS: 4
- OE.RESIDUAL_INFORMATION: 4
- OE.SELF_PROTECTION: 6
- OE.TIME_STAMPS: 2
- OE.TOE: 1
- OE.TOE_ACCESS: 6
- OE.TOE_NO_BYPASS: 5
- T:
- T.ACCIDENTAL_: 3
- T.ACCIDENTAL_ADMIN_: 1
- T.ACCIDENTAL_ADMIN_ERROR: 1
- T.ACCIDENTAL_CRYPTO_: 1
- T.CLIENT_INSECURE: 4
- T.MASQUERADE: 1
- T.POOR_: 1
- T.POOR_DESIGN: 2
- T.POOR_IMPLEMENTATION: 2
- T.POOR_TEST: 3
- T.RESIDUAL_DATA: 3
- T.TSF_COMPROMISE: 4
- T.UNATTENDED_: 2
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTH_ADMIN_: 1
- T.UNAUTH_ADMIN_ACCESS: 2
- T.WIRELESS_: 1
- T.WIRELESS_INTRUSION: 3
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 192
- Cisco Systems: 3
- Cisco Systems, Inc: 2
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 24
- FIPS 186-2: 2
- FIPS 186-3: 2
- FIPS PUB 140-2: 8
- NIST:
- NIST SP 800-57: 2
- SP 800-57: 2
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2284: 1
- RFC 2716: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: KYOCERA MITA Corporation
- /CreationDate: D:20101129104216+09'00'
- /Creator: CubePDF
- /ModDate: D:20101129104216+09'00'
- /Producer: CubePDF
- /Title: Data Security Kit (E) Software Type II Japan Security Target
- pdf_file_size_bytes: 325118
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: nbruce
- /CreationDate: D:20130409140547+10'00'
- /Creator: PDFCreator Version 1.4.3
- /Keywords:
- /ModDate: D:20130410092144+10'00'
- /Producer: GPL Ghostscript 9.05
- /Subject:
- /Title: Cisco_WLAN_wIPS_STv1.1_draft__20130331
- pdf_file_size_bytes: 773731
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 97
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |