name |
KONICA MINOLTA bizhub C450i S/bizhub C360i S/bizhub C300i S/bizhub C250i S with FK-514 GG4-N4 |
Klas Voyager 1.0 |
category |
Multi-Function Devices |
Network and Network-Related Devices and Systems |
scheme |
JP |
US |
status |
active |
archived |
not_valid_after |
06.12.2027 |
19.09.2019 |
not_valid_before |
06.12.2022 |
19.09.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0769_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10767-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0769_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10767-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0769_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10767-st.pdf |
manufacturer |
KONICA MINOLTA, INC. |
Klas Telecom, Inc. |
manufacturer_web |
https://www.konicaminolta.com/index.html |
https://www.klastelecom.com |
security_level |
{} |
{} |
dgst |
e5f0cab62b17ea43 |
1c9deb592b87d458 |
heuristics/cert_id |
JISEC-CC-CRP-C0769-01-2022 |
CCEVS-VR-VID-10767-2017 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_c250i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c300i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c450i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c360i:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
514 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0769
- certification_date: 01.12.2022
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0769
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000lzj-att/c0769_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: KONICA MINOLTA bizhub C450i S/ bizhub C360i S/bizhub C300i S/bizhub C250i S with FK-514
- product_type: Multi-Function Printer
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000lzj-att/c0769_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000lzj-att/c0769_est.pdf
- toe_version: GG4-N4
- vendor: KONICA MINOLTA, INC.
- expiration_date:
- supplier: KONICA MINOLTA, INC.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0769_it2819.html
- toe_japan_name: KONICA MINOLTA bizhub C450i S / bizhub C360i S / bizhub C300i S / bizhub C250i S with FK-514GG4-N4
- toe_overseas_link: None
- toe_overseas_name: -----
|
- category: Network Device, Virtual Private Network
- certification_date: 19.09.2017
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 19.09.2019
- id: CCEVS-VR-VID10767
- product: Klas Voyager 1.0
- scheme: US
- url: https://www.niap-ccevs.org/product/10767
- vendor: Klas
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
c7cf611c6bb1e4b0, e448ce41abadfcb5 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ep_vpn_gw_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf |
pdf_data/cert_filename |
c0769_eimg.pdf |
st_vid10767-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0769-01-2022: 1
|
- US:
- CCEVS-VR-VID10767-2017: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- UL:
- UL Verification Services: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230106100811+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20230106101949+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 89815
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
- /CreationDate: D:20170922134135-04'00'
- /ModDate: D:20170922134135-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 178661
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0769_erpt.pdf |
st_vid10767-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10767-2017
- cert_item: Klas Telecom, Inc. Klas Voyager
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0769-01-2022: 1
|
- US:
- CCEVS-VR-VID10767-2017: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.CONNECTIONS: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.DATA_INTEGRITY: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_MISUSE: 1
- T.PASSWORD_CRACKING: 1
- T.REPLAY_ATTACK: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- UL:
- UL Verification Services: 2
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- NIST P-384: 1
- P-256: 8
- P-384: 9
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 2
- RFC:
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20230117151429+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20230117151603+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20230117044816
- pdf_file_size_bytes: 425478
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 32
|
- /CreationDate: D:20170922134048-04'00'
- /ModDate: D:20170922134048-04'00'
- pdf_file_size_bytes: 551060
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
c0769_est.pdf |
st_vid10767-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ASE:
- ASE_CCL.1: 7
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_CKM_EXT: 1
- FAU_GEN: 10
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 33
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 2
- FCS_CKM_EXT.4: 16
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 57
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 17
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT.1: 6
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.1.1: 1
- FDP_ACF.1: 22
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_FXS_EXT: 2
- FDP_FXS_EXT.1: 6
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT: 2
- FIA_PSK_EXT.1: 9
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 3
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN.1: 5
- FAU_GEN.1.1: 2
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 12
- FCS_CKM.1.1: 4
- FCS_CKM.2: 6
- FCS_CKM.2.1: 4
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 25
- FCS_COP.1.1: 8
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 4
- FCS_SSHS_EXT.1: 3
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 2
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 1
- FIA:
- FIA_AFL.1: 2
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_EXT_EXT.4: 1
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT.1: 3
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_PSK_EXT.1.4: 1
- FIA_UAU.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 21
- FMT_MOF.1.1: 9
- FMT_MTD: 3
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 2
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 2
- FPT:
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS: 2
- FPT_FLS.1: 2
- FPT_FLS.1.1: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 2
- FPT_TST_EXT.1.2: 1
- FPT_TST_EXT.2: 6
- FPT_TST_EXT.2.1: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 3
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 4
- FPT_TUD_EXT.2: 2
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 4
- FTP_ITC_EXT.1.1: 4
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 2
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 5
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 4
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.CONNECTIONS: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- O:
- O.ADDRESS_FILTERING: 1
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.FAIL_SECURE: 1
- O.PORT_FILTERING: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.DATA_INTEGRITY: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_MISUSE: 1
- T.PASSWORD_CRACKING: 1
- T.REPLAY_ATTACK: 1
- T.SECURITY_FUNCTIONALITY: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICA: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
- UL:
- UL Verification Services: 1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 6
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
|
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 9
- HMAC-SHA-256: 3
- HMAC-SHA-384: 3
- HMAC-SHA-512: 1
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 30
- DHE: 1
- Diffie-Hellman: 8
- DSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 18
- SHA-384: 9
- SHA-512: 11
|
- MD:
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 1
- SHA-256: 8
- SHA-384: 5
- SHA-512: 2
- SHA2: 2
- SHA256: 1
- SHA384: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- AEAD:
- KEX:
- Key Exchange: 1
- Key exchange: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 5
- IKEv1: 14
- IKEv2: 3
- IPsec:
- SSH:
- TLS:
|
- IKE:
- IKE: 16
- IKEv1: 30
- IKEv2: 29
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 6
- NIST P-384: 4
- P-256: 26
- P-384: 30
- curve P-384: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 2
- FIPS PUB 186-4: 5
- FIPS PUB 197: 3
- FIPS PUB 198-1: 2
- ISO:
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-90A: 3
- PKCS:
- RFC:
- RFC 2407: 1
- RFC 3602: 7
- RFC 4106: 2
- RFC 4109: 2
- RFC 4301: 3
- RFC 4303: 3
- RFC 4304: 3
- RFC 4868: 5
- RFC 5282: 1
- RFC3602: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 186-4: 7
- FIPS PUB 186-3: 2
- FIPS PUB 186-4: 7
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 14888-: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-: 1
- NIST:
- NIST SP 800-131A: 1
- NIST SP 800-56A: 1
- NIST SP 800-56B: 1
- NIST SP 800-57: 2
- SP 800-131A: 1
- SP 800-56A: 1
- SP 800-56B: 1
- PKCS:
- RFC:
- RFC 2409: 1
- RFC 2460: 2
- RFC 2986: 1
- RFC 3526: 1
- RFC 3602: 2
- RFC 4106: 2
- RFC 4109: 1
- RFC 4253: 3
- RFC 4301: 4
- RFC 4303: 1
- RFC 4868: 4
- RFC 4945: 2
- RFC 5280: 3
- RFC 5282: 1
- RFC 5424: 2
- RFC 5647: 4
- RFC 5759: 2
- RFC 5996: 4
- RFC 6668: 1
- RFC 768: 2
- RFC 791: 2
- RFC 793: 2
- RFC5280: 1
- RFC5759: 1
- RFC5996: 1
- RFC792: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: t94279
- /CreationDate: D:20230117120447+09'00'
- /ModDate: D:20230117120447+09'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - C0769ñASE_EagleII-2.00-221128.docx
- pdf_file_size_bytes: 2178310
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
- /Author: Bethany Henderson;Brad Mitchell
- /Comments:
- /Company:
- /CreationDate: D:20170915164028-07'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Keywords:
- /ModDate: D:20170915164044-07'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20170915233113
- /Subject:
- /Title: Klas Telecom Security Target
- pdf_file_size_bytes: 848116
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |