name |
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00 |
Cisco Systems (1100, 1200, 1300, 1400 series Wireless Devices running IOS 12.3 (8JA2; 3200 series Wireless Router running IOS 12..4(6)XE3; AS5350, 5400, 5850 Universal Gateway running IOS 12.4(17); IAD2430 Integrated Access Device running IOS 12.4(17) with Cisco Secure Access Control Server (ACS) version 4.1.4.13 for Microsoft Windows Server |
category |
Other Devices and Systems |
Access Control Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
01.09.2015 |
20.07.2012 |
not_valid_before |
31.08.2010 |
09.06.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6013-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6013-st.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Cisco Systems, Inc. |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.cisco.com |
security_level |
EAL3 |
EAL3+, ALC_FLR.1 |
dgst |
e1cef4b86461e7ab |
65db1ec8204cb03b |
heuristics/cert_id |
JISEC-CC-CRP-C0265 |
CCEVS-VR-VID-6013-2008 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
cpe:2.3:a:cisco:acs_for_windows:4.1:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_access_control_server:4.1.4:-:windows:*:*:*:*:*, cpe:2.3:a:cisco:secure_access_control_server:4.1.4.13:-:windows:*:*:*:*:*, cpe:2.3:a:cisco:secure_access_control_server:4.1:-:windows:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2013-3466, CVE-2008-0532, CVE-2008-0533, CVE-2006-4097 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VLA.2, ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
283, 423, 7828, 0100, 00, 363, 223 |
4.1.4.13, 12.3, 12.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0265
- certification_date: 01.08.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0265_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as 溺FP・ or through the network, and provides the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in MFP, TOE can encrypt all the data written in HDD including image data using ASIC (Application Specific Integrated Circuit). Besides, TOE provides the function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards, and the function that controls the access from the public telephone line against the danger using Fax function as a steppingstone to access internal network. TOE security functionality TOE provides the following security functions. - Administrator function - SNMP administrator function - Service mode function - User function - User box function - Secure print function - ID & print function - All area overwrite deletion function - Encryption key generation function - Authentication Failure Frequency Reset function - Trusted Channel function - S/MIME encryption processing function - External Server authentication operation support function - ASIC support function - WebDAV administrator function - Fax unit control function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0265_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0265_est.pdf
- toe_version: A1UD0Y0-0100-GM0-00
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.04.2011
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software A1UD0Y0-0100-GM0-00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0265_it9283.html
- toe_overseas_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software A1UD0Y0-0100-GM0-00
|
- category: Network Switch, Router
- certification_date: 09.06.2008
- evaluation_facility: Arca CCTL
- expiration_date:
- id: CCEVS-VR-VID6013
- product: Cisco Systems [1100, 1200, 1300, 1400 series Wireless Devices running IOS 12.3(8)JA2; 3200 series Wireless Router running IOS 12.4(6)XE3; AS5350, 5400, 5850 Universal Gateway running IOS 12.4(17); IAD2430 Integrated Access Device running IOS 12.4(17)] with Cisco Secure Access Control Server (ACS) version 4.1.4.13 for Microsoft Windows Server
- scheme: US
- url: https://www.niap-ccevs.org/product/6013
- vendor: Cisco Systems, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0265_erpt.pdf |
st_vid6013-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID6013-2008
- cert_item: Cisco Wireless (1100, 1200, 1300, 1400, 3200), Cisco Devices (IAD 2430), Cisco Access Servers (5350, 5400, 5850), and Cisco Secure Access Control Server (ACS) for Windows Server version 4.1.4.13
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0265-01: 1
- Certification No. C0265: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 2
- EAL 3 augmented: 2
- EAL 4: 1
- EAL3: 20
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_CAP.3: 1
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.2: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_FLR.1: 4
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 1
- AVA_SOF.1: 1
- AVA_VLA.1: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-GROUP-BOX: 2
- T.ACCESS-PRIVATE-BO: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRI: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 2
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRANS: 1
- T.UNEXPECTED-TRANSMISSION: 1
|
- A:
- A.CONFIDENTIALITY: 1
- A.GENPUR: 1
- A.INTEROPERABILITY: 1
- A.LOCATE: 1
- A.LOWEXP: 1
- A.NOEVIL: 1
- A.TRAIN_AUDIT: 1
- A.TRAIN_GUIDAN: 1
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 80
- Cisco Systems: 19
- Cisco Systems, Inc: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
|
|
pdf_data/report_metadata |
- /CreationDate: D:20101213141346+09'00'
- /ModDate: D:20101213141346+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 235716
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /Author:
- /CreationDate: D:20080709123454-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20080709123605-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20080709163427
- /Subject: CCEVS Validation Report - Cisco IOSAAA Wireless EAL3
- /Title: VID6013-VR-0001 DRAFT
- pdf_file_size_bytes: 288720
- pdf_hyperlinks: http://www.cisco.com/en/US/partner/products/hw/routers/ps272/products_technical_reference_book09186a0080227b02.html, http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_book09186a0080080ff9.html, http://www.cisco.com/en/US/products/ps6350/products_configuration_guide_book09186a0080430ee6.html, http://www.cisco.com/en/US/partner/docs/routers/access/as5400/hardware/installation/guide/hwig.html, http://www.cisco.com/en/US/products/sw/iosswrel/ps5187/prod_configuration_guide09186a008017d583.html, http://www.cisco.com/en/US/products/ps6706/prod_release_note09186a00806c23a8.html, http://www.cisco.com/en/US/partner/docs/wireless/access_point/1300/installation/guide/1300hig6.html, http://www.cisco.com/en/US/partner/docs/wireless/bridge/1400/12.3_8_JA/configuration/guide/sc1238ja.html, http://www.cisco.com/en/US/partner/docs/routers/access/as5350/hardware/quick/guide/53_54QSG.html, http://www.cisco.com/en/US/partner/products/hw/univgate/ps509/products_installation_guide_book09186a008007cc9f.html, http://www.cisco.com/en/US/partner/products/hw/routers/ps272/products_regulatory_approvals_and_compliance09186a00804717b6.html, http://www.cisco.com/en/US/partner/docs/wireless/access_point/1100/quick/guide/ap11qsg.html, http://www.cisco.com/en/US/partner/docs/wireless/access_point/1100/installation/guide/1100hig7.html, http://www.cisco.com/en/US/partner/products/hw/univgate/ps501/products_configuration_guide_book09186a008007dfbb.html, http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html, http://www.cisco.com/en/US/partner/products/hw/gatecont/ps887/products_quick_start09186a0080192891.html, http://www.cisco.com/en/US/partner/docs/wireless/access_point/1300/quick/guide/br13qsg.html, http://www.cisco.com/univercd/cc/td/doc/product/access/mar_3200/mar_assm/index.htm, http://www.cisco.com/en/US/partner/docs/wireless/access_point/1130/installation/guide/1130-TD-Book-Wrapper.html, http://www.cisco.com/en/US/partner/docs/routers/access/as5350/software/configuration/guide/53swcg_1.html, http://www.cisco.com/en/US/products/sw/iosswrel/ps5187/products_command_reference_book09186a008017d0a2.html, http://www.cisco.com/en/US/products/ps6350/products_configuration_guide_book09186a008043360a.html, http://www.cisco.com/en/US/partner/docs/wireless/access_point/1130/quick/guide/ap1130qs.html, http://www.cisco.com/en/US/partner/docs/wireless/access_point/1200/installation/guide/1200-TD-Book-Wrapper.html, http://www.cisco.com/en/US/partner/docs/wireless/bridge/1400/quick/guide/br1410qs.html, http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html, http://cisco.com/en/US/docs/wireless/access_point/12.3_8_JA/command/reference/1238jacr.html, http://www.cisco.com/en/US/partner/products/hw/gatecont/ps887/products_configuration_guide_book09186a0080192878.html, http://www.cisco.com/en/US/partner/products/hw/gatecont/ps887/products_installation_guide_book09186a00801d7e1d.html, http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_book09186a0080087df1.html, http://www.cisco.com/en/US/partner/docs/wireless/bridge/1400/installation/guide/1400hig4.html, http://www.cisco.com/en/US/products/hw/univgate/ps501/prod_command_reference09186a00800a97c9.html, http://www.cisco.com/en/US/partner/docs/wireless/access_point/1200/ios/quick/guide/12iosqsg.html, http://www.cisco.com/en/US/partner/products/hw/univgate/ps509/prod_configuration_guide09186a00800c98a3.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
c0265_est.pdf |
st_vid6013-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 6
- EAL3: 83
- EAL3 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_CAP.3: 20
- ACM_SCP.1: 7
- ADO:
- ADO_DEL.1: 9
- ADO_IGS.1: 11
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.2: 17
- ADV_RCR.1: 8
- AGD:
- AGD_ADM.1: 17
- AGD_USR.1: 13
- ALC:
- ALC_DVS.1: 10
- ALC_FLR.1: 15
- ATE:
- ATE_COV.2: 9
- ATE_DPT.1: 8
- ATE_FUN.1: 13
- ATE_IND.2: 11
- AVA:
- AVA_MSU.1: 13
- AVA_SOF.1: 10
- AVA_VLA.1: 12
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 72
- FDP_ACC.1.1: 4
- FDP_ACF.1: 55
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ACP.1: 1
- FDP_IFC.1: 14
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 71
- FIA_AFL.1.1: 9
- FIA_AFL.1.2: 9
- FIA_ATD.1: 29
- FIA_ATD.1.1: 1
- FIA_MSA.3: 1
- FIA_SOS: 1
- FIA_SOS.1: 44
- FIA_SOS.1.1: 5
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU: 2
- FIA_UAU.1: 43
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 44
- FIA_UAU.2.1: 4
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID.1: 31
- FIA_UID.2: 48
- FIA_UID.2.1: 7
- FIA_USB.1: 26
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 31
- FMT_MOF.1.1: 3
- FMT_MSA: 5
- FMT_MSA.1: 34
- FMT_MSA.1.1: 3
- FMT_MSA.3: 42
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 7
- FMT_MTD.1: 119
- FMT_MTD.1.1: 13
- FMT_SMF.1: 110
- FMT_SMF.1.1: 1
- FMT_SMR.1: 171
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SMS.1: 1
- FMT_SOS.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 3
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP.1: 8
- FCS_COP.1.1: 3
- FDP:
- FDP_IFC.1: 11
- FDP_IFC.1.1: 3
- FDP_IFF.1: 13
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_IFF.1.6: 2
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UID.1: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 11
- FMT_MOF.1.1: 2
- FMT_MSA.1: 4
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ATM.1: 1
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_RVM.1: 12
- FPT_RVM.1.1: 2
- FPT_SEP: 1
- FPT_SEP.1: 1
- FPT_SEP_EXP.1: 1
- FPT_STM: 1
- FPT_STM.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.NETWORK: 4
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.AUTH-CAPABILITY: 7
- O.CONFIG: 11
- O.CRYPT-KEY: 1
- O.CRYPTO-CAPABILITY: 7
- O.CRYPTO-KEY: 3
- O.CRYPTO-MAIL: 4
- O.FAX-CONTROL: 7
- O.GROUP-BOX: 5
- O.OVERWRITE-ALL: 7
- O.PRIVATE-BOX: 5
- O.PUBLIC-BOX: 8
- O.REGISTERED-USER: 14
- O.SECURE-PRINT: 8
- O.TRUSTED-PASS: 7
- OE:
- OE.ADMIN: 3
- OE.FAX-UNIT: 3
- OE.FEED-BACK: 10
- OE.NETWORK: 3
- OE.SECRET: 3
- OE.SERVER: 6
- OE.SERVICE: 3
- OE.SESSION: 10
- OE.SETTING-SECURITY: 3
- T:
- T.ACCESS-GROUP-BOX: 3
- T.ACCESS-PRIVATE-BOX: 3
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTED-TRANSMISSION: 3
|
- A:
- A.CONFIDENTIALITY: 2
- A.GENPUR: 2
- A.INTEROPERABILITY: 2
- A.LOCATE: 2
- A.LOWEXP: 2
- A.NOEVIL: 4
- A.TRAIN_AUDIT: 2
- A.TRAIN_GUIDAN: 4
- O:
- O.ACCESS_CONTROL: 4
- O.AUDIT_GEN: 5
- O.AUDIT_VIEW: 7
- O.CFG_MANAGE: 4
- O.IDAUTH: 6
- O.MEDIATE: 4
- O.SELFPRO: 10
- O.STARTUP_TEST: 4
- O.TIME: 6
- OE:
- OE.ACS_PROTECT: 7
- OE.ACS_TIME: 4
- OE.AUDIT_REVIEW: 3
- OE.CONFIDENTIALITY: 2
- OE.GENPUR: 3
- OE.INTEROPERABILITY: 2
- OE.LOCATE: 3
- OE.LOWEXP: 3
- OE.NOEVIL: 3
- OE.TRAIN_GUIDAN: 2
- T:
- T.AUDIT_REVIEW: 5
- T.MEDIATE: 2
- T.NOAUDIT: 5
- T.NOAUTH: 2
- T.NOMGT: 3
- T.TIME: 3
- T.UNAUTH_MGT_ACCESS: 2
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 75
- Cisco Systems: 69
- Cisco Systems, Inc: 5
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 186-2: 6
- FIPS PUB 197: 3
- X509:
|
- FIPS:
- FIPS 197: 1
- FIPS PUB 140-1: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 3
- ISO:
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20101202154851+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20101202155121+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - C0265_ASE.doc
- /_AdHocReviewCycleID: -379351262
- /_PreviousAdHocReviewCycleID: 467482879
- pdf_file_size_bytes: 772548
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 111
|
- /Author: joewheel
- /CreationDate: D:20080709103110-04'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20080709123904-04'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title: Cisco_IOS_Wireless_EAL3_ST_v1 8_042408.fm
- pdf_file_size_bytes: 274239
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |