name |
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00 |
RICOH IM 370, nashuatec IM 370, Rex Rotary IM 370, Gestetner IM 370E-1.00 |
category |
Other Devices and Systems |
Multi-Function Devices |
scheme |
JP |
JP |
status |
archived |
active |
not_valid_after |
01.09.2015 |
26.03.2029 |
not_valid_before |
31.08.2010 |
26.03.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0810_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0810_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0810_est.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Ricoh Company, Ltd. |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.ricoh.com/ |
security_level |
EAL3 |
EAL2 |
dgst |
e1cef4b86461e7ab |
18042da7045fbbca |
heuristics/cert_id |
JISEC-CC-CRP-C0265 |
JISEC-CC-CRP-C0810-01-2024 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VLA.2, ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
283, 423, 7828, 0100, 00, 363, 223 |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0265
- certification_date: 01.08.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0265_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as 溺FP・ or through the network, and provides the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in MFP, TOE can encrypt all the data written in HDD including image data using ASIC (Application Specific Integrated Circuit). Besides, TOE provides the function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards, and the function that controls the access from the public telephone line against the danger using Fax function as a steppingstone to access internal network. TOE security functionality TOE provides the following security functions. - Administrator function - SNMP administrator function - Service mode function - User function - User box function - Secure print function - ID & print function - All area overwrite deletion function - Encryption key generation function - Authentication Failure Frequency Reset function - Trusted Channel function - S/MIME encryption processing function - External Server authentication operation support function - ASIC support function - WebDAV administrator function - Fax unit control function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0265_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0265_est.pdf
- toe_version: A1UD0Y0-0100-GM0-00
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.04.2011
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software A1UD0Y0-0100-GM0-00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0265_it9283.html
- toe_overseas_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software A1UD0Y0-0100-GM0-00
|
- cert_id: JISEC-CC-CRP-C0810
- certification_date: 01.03.2024
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0810
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0epbp000000b19h-att/c0810_eimg.pdf
- certification_date: 26.03.2024
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, and Document Server functions. The TOE provides security functions to prevent unauthorized disclosure and alteration of user data and security function setting data. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Network Protection Function: Enables the TOE to protect network communications using encryption. Stored Data Protection Function: Enables the TOE to protect the stored data using encryption. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software.
- evaluation_facility: ECSEC Laboratory Inc., Evaluation Center
- expiration_date: 26.03.2029
- product: RICOH IM 370, nashuatec IM 370, Rex Rotary IM 370, Gestetner IM 370
- product_type: Multifunction Product
- protection_profile: none
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0epbp000000b19h-att/c0810_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0epbp000000b19h-att/c0810_est.pdf
- toe_version: E-1.00
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.03.2029
- supplier: RICOH COMPANY, LTD.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0810_it3869.html
- toe_overseas_name: RICOH IM 370, nashuatec IM 370, Rex Rotary IM 370, Gestetner IM 370 E-1.00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
c0810_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0810-01-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate: D:20240606161757+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /Keywords:
- /ModDate: D:20240606161916+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /Subject:
- /Title:
- pdf_file_size_bytes: 234832
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0265_erpt.pdf |
c0810_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0265-01: 1
- Certification No. C0265: 1
|
- JP:
- JISEC-CC-CRP-C0810-01-2024: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-GROUP-BOX: 2
- T.ACCESS-PRIVATE-BO: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRI: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 2
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRANS: 1
- T.UNEXPECTED-TRANSMISSION: 1
|
- A:
- A.ADMIN: 1
- A.NETWORK_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.TRUSTED_ADMIN: 1
- A.USER: 1
- T:
- T.CONFIDENTIAL_DATA_ALT: 2
- T.CONFIDENTIAL_DATA_DIS: 2
- T.DOCUMENT_DATA_ALT: 2
- T.DOCUMENT_DATA_DIS: 2
- T.JOB_ALT: 2
- T.PROTECT_DATA_ALT: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- IPsec:
- TLS:
- TLS:
- TLS: 6
- TLS 1.2: 3
- TLS 1.3: 3
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
|
|
pdf_data/report_metadata |
- /CreationDate: D:20101213141346+09'00'
- /ModDate: D:20101213141346+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 235716
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /Author:
- /Company:
- /CreationDate: D:20240606162040+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /Keywords:
- /Manager:
- /ModDate: D:20240606162132+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20240529083745
- /Subject:
- /Title:
- pdf_file_size_bytes: 524687
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
pdf_data/st_filename |
c0265_est.pdf |
c0810_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 72
- FDP_ACC.1.1: 4
- FDP_ACF.1: 55
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ACP.1: 1
- FDP_IFC.1: 14
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 71
- FIA_AFL.1.1: 9
- FIA_AFL.1.2: 9
- FIA_ATD.1: 29
- FIA_ATD.1.1: 1
- FIA_MSA.3: 1
- FIA_SOS: 1
- FIA_SOS.1: 44
- FIA_SOS.1.1: 5
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU: 2
- FIA_UAU.1: 43
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 44
- FIA_UAU.2.1: 4
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID.1: 31
- FIA_UID.2: 48
- FIA_UID.2.1: 7
- FIA_USB.1: 26
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 31
- FMT_MOF.1.1: 3
- FMT_MSA: 5
- FMT_MSA.1: 34
- FMT_MSA.1.1: 3
- FMT_MSA.3: 42
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 7
- FMT_MTD.1: 119
- FMT_MTD.1.1: 13
- FMT_SMF.1: 110
- FMT_SMF.1.1: 1
- FMT_SMR.1: 171
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SMS.1: 1
- FMT_SOS.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 12
- FAU_SAR.2.1: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 16
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UID.1: 30
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 22
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 30
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TST_EXP: 2
- FPT_TST_EXP.1: 12
- FPT_TST_EXP.1.1: 2
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 18
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.NETWORK: 4
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.AUTH-CAPABILITY: 7
- O.CONFIG: 11
- O.CRYPT-KEY: 1
- O.CRYPTO-CAPABILITY: 7
- O.CRYPTO-KEY: 3
- O.CRYPTO-MAIL: 4
- O.FAX-CONTROL: 7
- O.GROUP-BOX: 5
- O.OVERWRITE-ALL: 7
- O.PRIVATE-BOX: 5
- O.PUBLIC-BOX: 8
- O.REGISTERED-USER: 14
- O.SECURE-PRINT: 8
- O.TRUSTED-PASS: 7
- OE:
- OE.ADMIN: 3
- OE.FAX-UNIT: 3
- OE.FEED-BACK: 10
- OE.NETWORK: 3
- OE.SECRET: 3
- OE.SERVER: 6
- OE.SERVICE: 3
- OE.SESSION: 10
- OE.SETTING-SECURITY: 3
- T:
- T.ACCESS-GROUP-BOX: 3
- T.ACCESS-PRIVATE-BOX: 3
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTED-TRANSMISSION: 3
|
- A:
- A.ADMIN: 4
- A.NETWORK_PROTECTION: 4
- A.PHYSICAL_PROTECTION: 4
- A.TRUSTED_ADMIN: 4
- A.USER: 4
- O:
- O.AUDIT: 14
- O.AUTHORIZATION: 28
- O.CONFIDENTIAL_DATA_ALT: 12
- O.CONFIDENTIAL_DATA_DIS: 15
- O.DOCUMENT_DATA_ALT: 13
- O.DOCUMENT_DATA_DIS: 16
- O.EMMC_ENCRYPTION: 10
- O.JOB_ALT: 16
- O.PROTECT_DATA_ALT: 13
- O.VALIDATION: 8
- OE:
- OE.AUDIT: 4
- OE.AUDIT_MANAGE: 3
- OE.AUTHORIZED_USER: 16
- OE.NETWORK_PROTECTION: 3
- OE.PHYSICAL_PROTECTION: 4
- OE.TRAINED_ADMIN: 4
- OE.TRAINED_USER: 4
- OE.TRUSTED_ADMIN: 3
- T:
- T.CONFIDENTIAL_DATA_ALT: 4
- T.CONFIDENTIAL_DATA_DIS: 4
- T.DOCUMENT_DATA_ALT: 4
- T.DOCUMENT_DATA_DIS: 4
- T.JOB_ALT: 3
- T.PROTECT_DATA_ALT: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IPsec:
- TLS:
- SSL:
- TLS:
- TLS: 8
- TLS1.2: 2
- TLS1.3: 2
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 186-2: 6
- FIPS PUB 197: 3
- X509:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- NIST:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20101202154851+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20101202155121+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - C0265_ASE.doc
- /_AdHocReviewCycleID: -379351262
- /_PreviousAdHocReviewCycleID: 467482879
- pdf_file_size_bytes: 772548
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 111
|
- /Author: 株式会社リコー
- /CreationDate: D:20240517114938+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20240517114938+09'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: RICOH IM 370, nashuatec IM 370, Rex Rotary IM 370, Gestetner IM 370 Security Target
- pdf_file_size_bytes: 1131843
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 82
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |