name |
KONICA MINOLTA bizhub C450i S/bizhub C360i S/bizhub C300i S/bizhub C250i S with FK-514 GG4-N4 |
Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C-Series Rack-Mount Servers, 2100 and 2200 Series Fabric Extenders, and 6100 Series Fabric Interconnects with UCSM 1.4(1m) |
category |
Multi-Function Devices |
Network and Network-Related Devices and Systems |
scheme |
JP |
US |
status |
active |
archived |
not_valid_after |
06.12.2027 |
22.04.2015 |
not_valid_before |
06.12.2022 |
30.12.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0769_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0769_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10403-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0769_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10403-st.pdf |
manufacturer |
KONICA MINOLTA, INC. |
Cisco Systems, Inc. |
manufacturer_web |
https://www.konicaminolta.com/index.html |
https://www.cisco.com |
security_level |
{} |
EAL4+, ALC_FLR.2 |
dgst |
e5f0cab62b17ea43 |
442b9af734a0ecb2 |
heuristics/cert_id |
JISEC-CC-CRP-C0769-01-2022 |
CCEVS-VR-VID-10403-2011 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_c250i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c300i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c450i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c360i:-:*:*:*:*:*:*:* |
cpe:2.3:h:cisco:ucs_6100:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, ATE_DPT.2, AVA_VAN.3, ATE_FUN.1, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1 |
heuristics/extracted_versions |
514 |
1.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0769
- certification_date: 01.12.2022
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0769
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000lzj-att/c0769_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: KONICA MINOLTA bizhub C450i S/ bizhub C360i S/bizhub C300i S/bizhub C250i S with FK-514
- product_type: Multi-Function Printer
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000lzj-att/c0769_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000lzj-att/c0769_est.pdf
- toe_version: GG4-N4
- vendor: KONICA MINOLTA, INC.
- expiration_date:
- supplier: KONICA MINOLTA, INC.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0769_it2819.html
- toe_japan_name: KONICA MINOLTA bizhub C450i S / bizhub C360i S / bizhub C300i S / bizhub C250i S with FK-514GG4-N4
- toe_overseas_link: None
- toe_overseas_name: -----
|
- category: Network Management
- certification_date: 30.12.2011
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 18.04.2015
- id: CCEVS-VR-VID10403
- product: Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C-Series Rack-Mount Servers, 2100 and 2200 Series Fabric Extenders, and 6100 and 6200 Series Fabric Interconnects with UCSM 2.0(4b)
- scheme: US
- url: https://www.niap-ccevs.org/product/10403
- vendor: Cisco Systems, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
{} |
maintenance_updates |
|
- maintenance_date: 18.04.2013
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10403-add1.pdf
- maintenance_st_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10403-st.pdf
- maintenance_title: Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C-Series Rack-Mount Servers, 2100 and 2200 Series Fabric Extenders, and 6100 and 6200 Series Fabric Interconnects with UCSM 2.0(4b) with TOE hardware: Cisco UCS 5108 Blade Server Chassis, Cisco UCS B200 M1/M2/M3, B230 M1/M2, B250 M1/M2, B420 M3, B440 M1/M2, and M22 M3 Blade Servers, Cisco UCS C200 M1/M2/M2SFF, C210 M1/M2, C220 M3, C240 M3, C250 M1/M2, C260 M2, C460 M2, C22 M3, and C24 M3 Rack-Mount Servers, Cisco UCS 6120XP, 6140XP, 6248UP, and 6296UP Fabric Interconnects, Cisco UCS 2104XP, 2204XP, 2208XP and 2232PP Fabric Extenders
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
{} |
pdf_data/cert_filename |
c0769_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0769-01-2022: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230106100811+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20230106101949+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 89815
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0769_erpt.pdf |
st_vid10403-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10403-2011
- cert_item: Cisco Unified Computing System (UCS
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0769-01-2022: 1
|
- US:
- CCEVS-VR-VID10403-2011: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 11
- EAL 4 augmented: 2
- EAL4: 4
- EAL4 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
pdf_data/report_keywords/vendor |
|
- Broadcom:
- Cisco:
- Cisco: 134
- Cisco Systems, Inc: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20230117151429+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20230117151603+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20230117044816
- pdf_file_size_bytes: 425478
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 32
|
- /Author: Evaluation Team
- /CreationDate: D:20120113071326
- /Creator: Microsoft® Office Word 2007
- /Keywords: VR
- /ModDate: D:20120113071326
- /Producer: Microsoft® Office Word 2007
- /Subject: Validator Report
- /Title: Validation Report for IronPort Messaging Gateway
- pdf_file_size_bytes: 412791
- pdf_hyperlinks: http://www.cisco.com/en/US/prod/ps10265/ps10280/cna_models_comparison.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
pdf_data/st_filename |
c0769_est.pdf |
st_vid10403-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.4: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_CKM_EXT: 1
- FAU_GEN: 10
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 33
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 2
- FCS_CKM_EXT.4: 16
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 57
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 17
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT.1: 6
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.1.1: 1
- FDP_ACF.1: 22
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_FXS_EXT: 2
- FDP_FXS_EXT.1: 6
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT: 2
- FIA_PSK_EXT.1: 9
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 3
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 10
- FAU_SAR.3: 6
- FAU_STG.1: 7
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 5
- FDP:
- FDP_ACC.1: 6
- FDP_ACC.2: 16
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 20
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 22
- FDP_IFC.1.1: 2
- FDP_IFF.1: 18
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ITC.1: 2
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 4
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 2
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 29
- FMT_MSA.1.1: 18
- FMT_MSA.3: 26
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 18
- FMT_MTD.1: 10
- FMT_MTD.1.1: 10
- FMT_SAE.1: 6
- FMT_SAE.1.1: 3
- FMT_SAE.1.2: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 29
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.2: 6
- FPT_ITT.2.1: 1
- FPT_ITT.2.2: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 3
- FTP:
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 5
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 4
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.ADMIN: 3
- A.AUTHENTICATION_SERVER: 2
- A.BOUNDARY: 3
- A.PHYSICAL: 3
- A.POWER: 3
- A.REDUNDANT_NET: 3
- A.VSAN: 3
- O:
- O.ACCOUN: 5
- O.ADMIN: 4
- O.AUDREC: 8
- O.ENCRYP: 9
- O.IDAUTH: 10
- O.SECFUN: 23
- O.VLANSEC: 4
- O.VSANSEC: 6
- OE:
- OE.ADMIN: 3
- OE.AUTHENTICATION_: 1
- OE.AUTHENTICATION_SERVER: 2
- OE.BOUNDARY: 3
- OE.PHYSICAL: 2
- OE.POWER: 3
- OE.REDUNDANT_NET: 2
- OE.VSAN: 2
- T:
- T.ACCOUNTABILITY: 4
- T.ATTACK_ANOTHER: 4
- T.CONFIGURE_NO: 2
- T.NOAUTH: 5
- T.NORMAL_USE: 2
- T.NORMAL_USER: 2
- T.ROLE_ADMIN: 2
- T.SNIFF: 4
|
pdf_data/st_keywords/vendor |
|
- Broadcom:
- Cisco:
- Cisco: 206
- Cisco Systems: 3
- Cisco Systems, Inc: 64
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 6
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 18
- SHA-384: 9
- SHA-512: 11
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 5
- IKEv1: 14
- IKEv2: 3
- IPsec:
- SSH:
- TLS:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 2
- FIPS PUB 186-4: 5
- FIPS PUB 197: 3
- FIPS PUB 198-1: 2
- ISO:
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-90A: 3
- PKCS:
- RFC:
- RFC 2407: 1
- RFC 3602: 7
- RFC 4106: 2
- RFC 4109: 2
- RFC 4301: 3
- RFC 4303: 3
- RFC 4304: 3
- RFC 4868: 5
- RFC 5282: 1
- RFC3602: 1
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-003: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 2
- FIPS PUB 197: 1
- RFC:
- RFC 2246: 1
- RFC 2631: 1
- RFC 3268: 1
- RFC 3826: 1
- RFC 4251: 1
- RFC 4252: 1
- RFC2401: 1
- RFC3414: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: t94279
- /CreationDate: D:20230117120447+09'00'
- /ModDate: D:20230117120447+09'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - C0769ñASE_EagleII-2.00-221128.docx
- pdf_file_size_bytes: 2178310
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
- /Author: Cisco Systems, Inc.
- /CreationDate: D:20130418125245
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130418125245
- /Producer: Microsoft® Office Word 2007
- /Title: Cisco UCS Security Target
- pdf_file_size_bytes: 1177547
- pdf_hyperlinks: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |