name |
Citrix NetScaler Platinum Edition Load Balancer, Version 9.3, running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS, MPX 5500, MPX 7500, MPX 9500, MPX 10500, MPX 11500, MPX 12500, MPX 13500, MPX 14500, MPX 15500, MPX 16500, MPX 17500, MPX 17550, MPX 18500, MPX 19500, MPX 19550, MPX 20500, MPX 20550, MPX 21500, MPX 21550, VPX 10, VPX 200, VPX 1000, VPX 3000 |
bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software, Version: A55V0Y0-0100-G00-10 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
UK |
JP |
status |
archived |
archived |
not_valid_after |
04.02.2015 |
07.08.2018 |
not_valid_before |
12.03.2012 |
12.07.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP267%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0398_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST267%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0398_est.pdf |
manufacturer |
Citrix Systems, Inc. |
KONICA MINOLTA, INC. |
manufacturer_web |
https://www.citrix.com |
https://www.konicaminolta.com/index.html |
security_level |
EAL2+, ALC_FLR.2 |
EAL3 |
dgst |
eb375c5d1192d491 |
f063d400c202d861 |
heuristics/cert_id |
CRP267 |
JISEC-CC-CRP-C0398 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:h:konicaminolta:bizhub_754:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_654:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
9.3 |
654, 754, 10, 0100 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
CRP274 |
{} |
heuristics/report_references/directly_referencing |
CRP262 |
{} |
heuristics/report_references/indirectly_referenced_by |
CRP274 |
{} |
heuristics/report_references/indirectly_referencing |
CRP253, CRP262, CRP247 |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0398
- certification_date: 01.07.2013
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0398_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function that records the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the image data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the image data area no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite data area including the image data of HDD to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Japanese : bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Zentai Seigyo Software English : bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0398_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0398_est.pdf
- toe_version: A55V0Y0-0100-G00-10
- vendor: KONICA MINOLTA, INC.
- expiration_date: 01.08.2018
- revalidations: [frozendict({'date': '2014-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0398_it3440_01.html'})]
- supplier: KONICA MINOLTA, INC.
- toe_japan_name: bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Zentai Seigyo SoftwareA55V0Y0-0100-G00-10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0398_it3440.html
- toe_overseas_name: bizhub 754 / bizhub 654 / ineo 754 / ineo 654 / N906 / N905 / N901 / N900 Control Software A55V0Y0-0100-G00-10
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP267 v1.0.pdf |
c0398_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0398-01: 1
- Certification No. C0398: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 3
- EAL2 augmented: 2
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- T:
- T.ACCESS-GROUP-: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-PRIVATE-: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 2
- T.BRING-OUT-STORA: 1
- T.BRING-OUT-STORAGE: 1
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRA: 1
- T.UNEXPECTED-TRANSMISSION: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- below. March 2012 Issue 1.0 Page 11 of 23 Figure 1 TOE Configuration 3 Layer 3 routing (L3 mode) is out of scope as this enables IP forwarding, allowing traffic to be routed according to static routes in the: 1
- out of scope: 1
|
- ConfidentialDocument:
- or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of: 1
|
pdf_data/report_metadata |
- /Author: Mike Brown, Nigel Whittaker-Axon, Bhavin Desai
- /Company: Certification Body, CESG
- /CreationDate: D:20120315141538Z
- /Creator: Acrobat PDFMaker 8.1 for Word
- /ModDate: D:20120315141627Z
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20120315141356
- /Title: Certification Report template v3.0
- pdf_file_size_bytes: 467310
- pdf_hyperlinks: http://support.citrix.com/, https://www.citrix.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /CreationDate: D:20131008135938+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20131008140306+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 452687
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
ST267 v1.0.pdf |
c0398_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 5
- EAL2 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_ACC: 15
- FDP_ACC.1: 8
- FDP_ACF: 16
- FDP_ACF.1: 13
- FDP_IFC: 22
- FDP_IFC.1: 10
- FDP_IFF: 22
- FDP_IFF.1: 21
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 32
- FMT_MSA.1: 20
- FMT_MSA.1.1: 1
- FMT_MSA.3: 21
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 9
- FPT_STM.1.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GNE.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 3
- FAU_SAR.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 2
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 84
- FDP_ACC.1.1: 4
- FDP_ACF.1: 69
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ACP.1: 1
- FDP_IFC.1: 15
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 3
- FDP_RIP.1.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 89
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 8
- FIA_ATD.1: 30
- FIA_ATD.1.1: 1
- FIA_MSA.3: 1
- FIA_SOS.1: 52
- FIA_SOS.1.1: 4
- FIA_SOS.2: 10
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU: 2
- FIA_UAU.1: 47
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 55
- FIA_UAU.2.1: 4
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UAU.7: 20
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 32
- FIA_UID.2: 84
- FIA_UID.2.1: 7
- FIA_USB.1: 27
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 63
- FMT_MOF.1.1: 5
- FMT_MSA: 5
- FMT_MSA.1: 43
- FMT_MSA.1.1: 3
- FMT_MSA.3: 52
- FMT_MSA.3.1: 8
- FMT_MSA.3.2: 7
- FMT_MTD.1: 166
- FMT_MTD.1.1: 15
- FMT_SMF.1: 130
- FMT_SMF.1.1: 1
- FMT_SMR.1: 202
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SOS.1: 1
- FPT:
- FTA:
- FTA_SSL: 3
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMIN: 5
- A.NETWORK: 6
- A.SECRET: 3
- A.SERVICE: 4
- O:
- O.AUDIT: 3
- O.AUDIT-LOGGED: 3
- O.AUTH: 4
- O.AUTH-CAPABILITY: 5
- O.CONFIG: 12
- O.CR: 1
- O.CRYPT: 4
- O.CRYPTO: 5
- O.CRYPTO-CAPABILITY: 4
- O.CRYPTO-KEY: 2
- O.CRYPTO-MAIL: 2
- O.FAX: 2
- O.FAX-CONTROL: 6
- O.GROUP: 3
- O.GROUP-BOX: 3
- O.OVERW: 1
- O.OVERWRITE: 7
- O.PRIVATE: 3
- O.PRIVATE-BOX: 3
- O.PUBLIC: 3
- O.PUBLIC-BOX: 6
- O.REGISTERED: 3
- O.REGISTERED-USER: 12
- O.SECURE: 4
- O.SECURE-PRINT: 6
- O.TRUSTED: 3
- O.TRUSTED-PATH: 5
- OE:
- OE.ADMIN: 3
- OE.AUDIT: 6
- OE.AUDIT-REVIEWED: 2
- OE.AUDIT_ACCESS-AUT: 1
- OE.AUDIT_ACESS-AUTHORIZED: 1
- OE.AUDIT_STORAGE-PR: 1
- OE.AUDIT_STORAGE-PROTECTED: 1
- OE.FAX: 2
- OE.FAX-UNIT: 2
- OE.FEED: 2
- OE.FEED-BACK: 8
- OE.NETWORK: 4
- OE.S: 1
- OE.SECRET: 3
- OE.SERVER: 5
- OE.SERVICE: 3
- OE.SESSION: 10
- OE.SETTING: 2
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS: 19
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.BACKUP: 3
- T.BACKUP-RESTORE: 1
- T.BRING: 3
- T.DISCARD: 3
- T.DISCARD-MFP: 1
- T.UNEXPECTED: 4
- T.UNEXPECTED-TRANSMISSION: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 186: 2
- FIPS 186-2: 4
- FIPS PUB 197: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
|
pdf_data/st_metadata |
- /Author: Tony Boswell
- /CreationDate: D:20120222221755
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20120222221755
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 869566
- pdf_hyperlinks: http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
- /Author:
- /CreationDate: D:20131007140604+09'00'
- /Creator: CubePDF
- /Keywords:
- /ModDate: D:20131007140609+09'00'
- /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
- /Subject:
- /Title:
- pdf_file_size_bytes: 1150770
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 114
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |