Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RSA Adaptive Authentication System v6.0.2.1 with Service Pack 1
383-4-96
bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software Version: A2X00Y0-0100-G00-53
JISEC-CC-CRP-C0374
name RSA Adaptive Authentication System v6.0.2.1 with Service Pack 1 bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software Version: A2X00Y0-0100-G00-53
category Access Control Devices and Systems Other Devices and Systems
scheme CA JP
not_valid_after 28.09.2015 13.11.2017
not_valid_before 10.02.2009 29.10.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rsa-adaptive-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0374_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rsa-adaptive-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0374_est.pdf
manufacturer RSA, The Security Division of EMC Konica Minolta Business Technologies, Inc
manufacturer_web https://www.rsa.com/ https://www.konicaminolta.com/
security_level EAL2+, ALC_FLR.1 EAL3
dgst e4169ab5825780d2 847d7d7e9ca1605c
heuristics/cert_id 383-4-96 JISEC-CC-CRP-C0374
heuristics/cert_lab CANADA []
heuristics/cpe_matches {} cpe:2.3:h:konicaminolta:bizhub_754:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c654:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c754:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_654:-:*:*:*:*:*:*:*
heuristics/extracted_sars ADV_FSP.2, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ALC_CMC.2, AGD_OPE.1, ALC_CMS.2, ALC_FLR.1, AVA_VAN.2, ALC_DEL.1, ADV_TDS.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 6.0.2.1 0100, 654, 53, 754
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0374
  • certification_date: 01.10.2012
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0374_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Japanese:bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Zentai Seigyo Software English:bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0374_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0374_est.pdf
    • toe_version: A2X00Y0-0100-G00-53
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.11.2017
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Zentai Seigyo Software A2X00Y0-0100-G00-53
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0374_it1384.html
  • toe_overseas_name: bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software A2X00Y0-0100-G00-53
pdf_data/report_filename rsa-adaptive-cert-eng.pdf c0374_erpt.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-96-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-96: 1
    • 383-4-96-CR: 1
  • JP:
    • CRP-C0374-01: 1
    • Certification No. C0374: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL 2 augmented: 2
    • EAL 2+: 4
  • EAL:
    • EAL3: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
  • T:
    • T.ACCESS-GROUP-: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 2
    • T.BRING-OUT-STORA: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRA: 1
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of: 1
pdf_data/report_metadata
  • /AM_ACPP_Date: [dd month yyyy]
  • /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
  • /AM_ACPP_Version: [AM_AMCPP_Version]
  • /AM_IAR_Date: [dd month yyyy]
  • /AM_IAR_Doc#: [AM_IAR_Doc#]
  • /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
  • /AM_IAR_Version: [AM_IAR_Version]
  • /AM_ST Date: [dd month yyyy]
  • /AM_ST Title: [AM_ST Title]
  • /AM_ST Version: [AM_ST Version]
  • /AM_TOE: [AM_TOE]
  • /AM_TOE Short: [AM_TOE Short]
  • /AM_TOE Version: [AM_TOE Version]
  • /Author: User
  • /CC Version: 3.1 R2
  • /CC date: September 2007
  • /CEM Version: 3.1 R2
  • /CEM date: September 2007
  • /CR_Date: 10 February 2009
  • /CR_Version: 1.1
  • /Client City: Herzlia
  • /Client Country: Israel
  • /Client Full Name: RSA® The Security Division of EMC
  • /Client Postal Code: 46733
  • /Client Short Name: RSA
  • /Client State:
  • /Client Street: 7 Shenkar Street, 4th floor
  • /CreationDate: D:20090212071323-05'00'
  • /Creator: Acrobat PDFMaker 6.0 for Word
  • /Developer Long Name: RSA, The Security Division of EMC
  • /Developer Short Name: RSA
  • /EAL Level: 2+
  • /EAL Level Base: 2
  • /EAL Long: EAL 2 Augmented
  • /EAL Short: EAL 2+
  • /ETPlan_Doc#: 1589-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: 1.0
  • /ETPlan_date: 24 November 2008
  • /ETProcRes_Date: 8 December 2008
  • /ETProcRes_Doc#: 1589-000-D005
  • /ETProcRes_Title: Evaluation Test Procedure and Results
  • /ETProcRes_Version: 1.1
  • /ETProc_Date: [dd month yyyy]
  • /ETProc_Doc#: [1xxx-000-D004]
  • /ETProc_Title: Evaluation Test Procedures
  • /ETProc_Version: [0.x]
  • /ETReport_Date: 19 January 2009
  • /ETReport_Doc#: 1589-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_Version: 1.4
  • /EWP_Date: 15 April 2008
  • /EWP_Doc#: 1589-000-D001
  • /EWP_Title: Evaluation Work Plan
  • /EWP_Version: 1.1
  • /Eval number: 383-4-96
  • /Eval_End_Date: [dd month yyyy (date on certificate)]
  • /Eval_Start_Date: [dd month yyyy (registration)]
  • /ModDate: D:20090312092421-04'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /ProjectNumber: 1589
  • /ST_Date: 4 February 2009
  • /ST_Title: RSA®, The Security Division of EMC, RSA Adaptive Authentication System v6.0.2.1 with Service Pack 1 Security Target
  • /ST_Version: 1.0
  • /SVR_Date: 11 September 2008
  • /SVR_Doc#: 1589-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: 1.0
  • /SV_City: Herzlia
  • /Security Classification: EWA-Canada & EMC/RSA Proprietary
  • /SourceModified: D:20090212121247
  • /Sponsor: RSA, The Security Division of EMC
  • /Sponsor City: Hopkinton
  • /Sponsor Country: USA
  • /Sponsor Postal Code: 01748
  • /Sponsor State: Massachusetts
  • /Sponsor Street: 176 South Street
  • /TOE: RSA Adaptive Authentication System Version 6.0.2.1 with Service Pack 1
  • /TOE Line1: [TOE Line1 - enter later for PCR or web page]
  • /TOE Line2: [TOE Line2 - enter later for PCR or web page]
  • /TOE Line3: [TOE Line3 - enter later for PCR or web page]
  • /TOE Line4: [TOE Line4 - enter later for PCR or web page]
  • /TOE Line5: [TOE Line5 - enter later for PCR or web page]
  • /TOE Short: RSA Adaptive Authentication System
  • /TOE Short with version: RSA AA v6.0.2.1 SP1
  • /TOE Short-NoTM: RSA AA
  • /TOE Version: 6.0.2.1 SP1
  • /TOE with version: RSA Adaptive Authentication System v6.0.2.1 Service Pack 1
  • /TOE-NoTM: [TOE Name, no version, no trademarks]
  • /Title: EAL X+ Evaluation of [Developer Long Name]
  • pdf_file_size_bytes: 127448
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /CreationDate: D:20130419152138+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130419152219+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 473698
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
pdf_data/st_filename rsa-adaptive-sec-eng.pdf c0374_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 5
    • EAL2 augmented: 1
  • EAL:
    • EAL3: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 5
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 1
    • FAU_GEN: 4
    • FAU_SAA: 2
  • FDP:
    • FDP_ACC.1: 29
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 19
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_ETC.1: 11
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC.1: 12
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 11
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FIA:
    • FIA_ATD.1: 14
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 17
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 24
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 24
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 24
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GNE.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 3
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 2
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 84
    • FDP_ACC.1.1: 4
    • FDP_ACF: 4
    • FDP_ACF.1: 53
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 15
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP: 1
    • FDP_RIP.1: 1
    • FDP_RIP.1.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 90
    • FIA_AFL.1.1: 8
    • FIA_AFL.1.2: 8
    • FIA_ATD.1: 30
    • FIA_ATD.1.1: 1
    • FIA_MSA.3: 1
    • FIA_SOS.1: 52
    • FIA_SOS.1.1: 4
    • FIA_SOS.2: 10
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 47
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 55
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 20
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 32
    • FIA_UID.2: 84
    • FIA_UID.2.1: 7
    • FIA_USB.1: 27
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 63
    • FMT_MOF.1.1: 5
    • FMT_MSA: 5
    • FMT_MSA.1: 43
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 52
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 168
    • FMT_MTD.1.1: 15
    • FMT_SMF.1: 130
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 202
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SOS.1: 1
  • FPT:
    • FPT_STM.1: 7
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUDIT: 3
    • A.INSTALL: 3
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.NETCON: 3
    • A.NOEVIL: 3
    • A.PROTECT: 3
    • A.TIMESTAMP: 3
  • O:
    • O.ADMIN: 24
    • O.ADMIN_AUTH: 23
    • O.ENDUSER: 9
    • O.ENDUSER_AUTH: 12
    • O.MONITOR: 9
    • O.RECOMMEND: 12
    • O.RISK_FACTOR: 7
  • OE:
    • OE.AUDIT: 5
    • OE.NETWORK: 3
    • OE.PLATFORM: 7
    • OE.PROTECT: 11
    • OE.SECURE_COMMS: 9
    • OE.TIME: 7
  • T:
    • T.DOS: 3
    • T.FRAUD: 3
    • T.MASQUERADE: 3
    • T.TAMPERING: 3
    • T.UNAUTH: 3
  • A:
    • A.A: 2
    • A.ADMIN: 3
    • A.NETWORK: 6
    • A.SECRET: 3
    • A.SERVICE: 4
  • O:
    • O.AUDIT: 2
    • O.AUDIT-LOGGED: 3
    • O.AUTH: 2
    • O.AUTH-CAPABILITY: 5
    • O.CONFIG: 12
    • O.CRYPT: 4
    • O.CRYPTO: 5
    • O.CRYPTO-CAPABILITY: 4
    • O.CRYPTO-KEY: 2
    • O.CRYPTO-MAIL: 2
    • O.FAX: 2
    • O.FAX-CONTROL: 6
    • O.GROUP: 3
    • O.GROUP-BOX: 3
    • O.OVERWRITE: 8
    • O.PRIVATE: 3
    • O.PRIVATE-BOX: 3
    • O.PUBLIC: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED: 3
    • O.REGISTERED-USER: 12
    • O.SECURE: 4
    • O.SECURE-PRINT: 6
    • O.TRUSTED: 3
    • O.TRUSTED-PATH: 5
  • OE:
    • OE.ADMIN: 3
    • OE.AUDIT: 3
    • OE.AUDIT-REVIEWED: 2
    • OE.AUDIT_ACCESS-AUT: 1
    • OE.AUDIT_ACESS-AUTHORIZED: 1
    • OE.AUDIT_STORAGE-PR: 1
    • OE.AUDIT_STORAGE-PROTECTED: 1
    • OE.FAX: 2
    • OE.FAX-UNIT: 2
    • OE.FEED: 2
    • OE.FEED-BACK: 8
    • OE.NETWORK: 4
    • OE.S: 1
    • OE.SECRET: 3
    • OE.SERVER: 5
    • OE.SERVICE: 3
    • OE.SESSION: 10
    • OE.SETTING: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS: 19
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.BACKUP: 3
    • T.BACKUP-RESTORE: 1
    • T.BRING: 3
    • T.DISCARD: 3
    • T.DISCARD-MFP: 1
    • T.UNEXPECTED: 2
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 6
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 5
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186: 2
    • FIPS 186-2: 4
    • FIPS PUB 197: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
pdf_data/st_metadata
  • /Author: Darryl H. Johnson
  • /CreationDate: D:20090204170557Z
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20090219112655-05'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: RSA Adaptive Authentication System v6.0.2.1 with Service Pack 1
  • /Title: Security Target
  • pdf_file_size_bytes: 947595
  • pdf_hyperlinks: http://www.corsec.com/, http://www.rsa.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 72
  • /Author:
  • /CreationDate: D:20130415144110+09'00'
  • /Creator: CubePDF
  • /Keywords:
  • /ModDate: D:20130415144114+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1171475
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 114
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different