name |
MX-FRX2 Version M.10 |
Tactical Network-layer Gateway (2E2 IA): a GD Canada MESHnet Gateway product |
category |
Multi-Function Devices |
Network and Network-Related Devices and Systems |
scheme |
JP |
CA |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
29.09.2015 |
not_valid_before |
31.10.2006 |
10.02.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0058_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/gdc-cert-eng.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0058_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/gdc-sec-eng.pdf |
manufacturer |
Sharp Corporation |
General Dynamics Canada |
manufacturer_web |
https://sharp-world.com/ |
https://www.gdcanada.com/ |
security_level |
EAL3+, ADV_SPM.1 |
EAL2+, ALC_FLR.1 |
dgst |
f012659528e4f9b7 |
87f1232d490d5d00 |
heuristics/cert_id |
JISEC-CC-CRP-C0058 |
383-4-67 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1 |
ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1, ADV_SPM.1 |
heuristics/extracted_versions |
10 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0058
- certification_date: 01.10.2006
- claim: EAL3+ ADV_SPM.1
- enhanced:
- assurance_level: EAL3 +ADV_SPM.1
- cert_link: https://www.ipa.go.jp/en/security/c0058_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is an IT product composed of 2 parts for a Multi Function Device (hereafter referred as to "MFD") to reduce the risk that image data stored or remaining in the HDD and the Flash Memory be disclosed. One part is a hardware part in an MFD and provided in the form of an MFD. The other part is a firmware product and provided as an upgrade kit for the firmware of the MFD. The TOE counters unauthorized disclosure of image data by: - the encryption function, that encrypts and spools image data that the MFD handles for jobs (of copy, printer, image-scanning, fax transmission/reception and PC-Fax), - the erasure function, that overwrites the spooled data area when each job is completed, - the confidential file function, that protects image data that a user files with a password, - the IP/MAC address filter function, that refuses unauthorized network accesses, and - the SSL function, that protects communications data against wiretapping.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: MX-FRX2
- product_type: IT Product ( data protection function in Multi Function Device )
- report_link: https://www.ipa.go.jp/en/security/c0058_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0058_est.pdf
- toe_version: Version M.10
- vendor: Sharp Corporation
- expiration_date: 01.01.2011
- supplier: Sharp Corporation
- toe_japan_name: MX-FRX2 Version M.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0058_it6074.html
- toe_overseas_name: MX-FRX2 Version M.10
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0058_erpt.pdf |
gdc-cert-eng.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-67-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0058-01: 1
- Certification No. C0058: 1
|
- CA:
- 383-4-67: 1
- 383-4-67-CR: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 5
- EAL 2 augmented: 3
- EAL 2+: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.OPERATOR: 1
- T:
- T.RECOVER: 1
- T.REMOTE: 1
- T.SPOOF: 1
- T.TAMPER: 1
- T.TAP: 1
|
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
- FIPS:
- FIPS 140-2: 3
- FIPS 180-2: 1
- FIPS 197: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061117165933+09'00'
- /ModDate: D:20061117165933+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 130478
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_AMCPP_Date: [AM_AMCPP_Date]
- /AM_AMCPP_Doc#: [AM_AMCPP_Doc#]
- /AM_AMCPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [AM_IAR_Date]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [AM_ST Date]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: mgauvreau
- /CC Version: 2.3
- /CC date: August 2005
- /CEM Version: 2.3
- /CEM date: August 2005
- /CR_Date: 22 December 2008
- /CR_Version: 0.3
- /Client City: Calgary
- /Client Country: Canada
- /Client Full Name: General Dynamics Canada
- /Client Postal Code: T2E 8P2
- /Client Short Name: GDC
- /Client State: Alberta
- /Client Street: 1020 - 68th Avenue NE
- /Comments: PCR Template
Version 1.8-EWA-C
- /CreationDate: D:20090304140623-05'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer Long Name: General Dynamics Canada (GDC)
- /Developer Short Name: GDC
- /EAL Level: 2+
- /EAL Level Base: 2
- /EAL Level Text: 2 augmented
- /EAL Long: EAL 2+
- /EAL Short: EAL 2+
- /ETPRoc_Date: day month yyyy
- /ETPlan_Doc#: 1531-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: [0.0]
- /ETPlan_date: day month yyyy
- /ETProcRes_Date: day month yyyy
- /ETProcRes_Doc#: 1531-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: [0.0]
- /ETProc_Doc#: 1531-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: [0.0]
- /ETReport_Date: 19 December 2008
- /ETReport_Doc#: 1531-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_Version: 2.3
- /EWP_Date: 15 October 2007
- /EWP_Doc#: 1531-000-D001
- /EWP_Title: Evaluation Work Plan for Common Criteria EAL 2+ Evaluation of General Dynamics Canada Ltd Tactical Network-layer Gateway (TNG) Release 1, Rev A
- /EWP_Version: 0.6
- /Eval number: 383-4-67
- /Eval_End_Date: 18 December 2008
- /Eval_Start_Date: dd month yyyy
- /ModDate: D:20090304140704-05'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ProjectNumber: 1531
- /ST_Date: 10 December 2008
- /ST_Title: Security Target for the Tactical Network-layer Gateway v1.0: a GD Canada MESHnet G2 Gateway product
- /ST_Version: 0.39
- /SVR_Date: [day month yyyy]
- /SVR_Doc#: 1531-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: [0.0]
- /SV_City: [site vist city/cities]
- /Security Classification: EWA-Canada & GDC Proprietary
- /SourceModified: D:20090304181701
- /Sponsor: General Dynamics Canada
- /Sponsor City: Calgary
- /Sponsor Country: Canada
- /Sponsor Postal Code: T2E 8P2
- /Sponsor State: Alberta
- /Sponsor Street: 1020 - 68th Avenue NE
- /TOE: Tactical Network-layer Gateway (TNG)
- /TOE Line1: [TOE Line1 - enter later for PCR or web page]
- /TOE Line2: [TOE Line2 - enter later for PCR or web page]
- /TOE Line3: [TOE Line3 - enter later for PCR or web page]
- /TOE Line4: [TOE Line4 - enter later for PCR or web page]
- /TOE Line5: [TOE Line5 - enter later for PCR or web page]
- /TOE Short: TNG 2E2 IA
- /TOE Short with version: TNG Release 1 Revision A
- /TOE Short-NoTM: [TOE Short, no version, no trademarks]
- /TOE Version: Release 1, Rev A
- /TOE with version: Tactical Network-layer Gateway (TNG) Release 1, Rev A
- /TOE-NoTM: [TOE Name, no version, no trademarks]
- /Title: EAL X+ Evaluation of [Developer Long Name]
- /_AdHocReviewCycleID: -1098653131
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Reade, Rick A.
- /_EmailSubject: Post request ... rick
- pdf_file_size_bytes: 126808
- pdf_hyperlinks: http://www.cse-cst.gc.ca/its-sti/services/cc/cp-pc-eng.html, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
c0058_est.pdf |
gdc-sec-eng.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL2: 2
- EAL2+: 4
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 3
- ADV_HLD.2: 2
- ADV_RCR.1: 4
- ADV_SPM.1: 13
- AGD:
- AGD_ADM.1: 7
- AGD_USR.1: 5
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN: 1
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 3
|
- ACM:
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 10
- ADV_HLD.1: 3
- ADV_RCR.1: 5
- ADV_SPM.1: 4
- AGD:
- AGD_ADM.1: 7
- AGD_USR.1: 3
- ALC:
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 5
- ATE_IND.2: 4
- AVA:
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 4
- FDP_IFC.1: 3
- FDP_ITC.1: 2
- FDP_RIP.1: 16
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 28
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_SOS.1: 27
- FIA_SOS.1.1: 2
- FIA_UAU.1: 10
- FIA_UAU.2: 37
- FIA_UAU.2.1: 2
- FIA_UAU.7: 27
- FIA_UAU.7.1: 2
- FIA_UID.1: 10
- FIA_UID.2: 25
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 47
- FMT_MOF.1.1: 3
- FMT_MSA.1: 4
- FMT_MSA.2: 17
- FMT_MSA.2.1: 1
- FMT_MTD.1: 40
- FMT_MTD.1.1: 3
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 38
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_RVM: 2
- FPT_RVM.1: 31
- FPT_RVM.1.1: 1
- FTA:
- FTA_TSE.1: 11
- FTA_TSE.1.1: 1
- FTP:
- FTP_RVM.1: 5
- FTP_TRP.1: 14
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 8
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAA.1: 10
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_SEL.1: 4
- FAU_SEL.1.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 8
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_IFC.1: 15
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 10
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 3
- FDP_ITT.1: 7
- FDP_ITT.1.1: 1
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 11
- FIA_ATD.1.1: 2
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 22
- FIA_UAU.2.1: 2
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 24
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 20
- FMT_MOF.1.1: 3
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 17
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.2: 7
- FPT_ITT.2.1: 1
- FPT_RVM.1: 11
- FPT_RVM.1.1: 2
- FPT_SEP.1: 12
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM.1: 14
- FPT_STM.1.1: 2
- FTP:
- FTP_ITT.2.2: 1
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 6
- A.OPERATOR: 5
- O:
- O.FILTER: 6
- O.MANAGE: 11
- O.REMOVE: 8
- O.RESIDUAL: 8
- O.TRP: 7
- O.USER: 7
- OE:
- OE.CIPHER: 6
- OE.ERASEALL: 3
- OE.FIREWALL: 3
- OE.OPERATE: 3
- OE.PC-USER: 3
- OE.SUBNET: 3
- OE.USER: 3
- T:
- T.RECOVER: 6
- T.REMOTE: 4
- T.SPOOF: 5
- T.TAMPER: 4
- T.TAP: 5
|
- A:
- A.AVAILABILITY: 2
- A.CONNECT: 2
- A.GOOD_ADMIN: 2
- A.NO_BYPASS: 2
- A.NO_GEN_PURPOSE: 2
- A.NO_MAINT_PORT: 2
- A.PHYSICAL: 2
- O:
- O.ADMIN_GUIDANCE: 6
- O.ADMIN_ROLE: 7
- O.AUDIT_DATA: 6
- O.AUDIT_PROTECT: 8
- O.AUDIT_REVIEW: 6
- O.GOOD_TESTING: 3
- O.MANAGE: 8
- O.MANAGE_CHANGE: 5
- O.MEDIATE_INFO: 4
- O.PEER_AUTH: 6
- O.SELF_PROTECT: 8
- O.SOUND_DESIGN: 4
- O.SOUND_TOE: 4
- O.TIME_STAMPS: 4
- O.TOE_ACCESS: 5
- O.TRUSTED_PATH: 8
- O.USER_GUIDANCE: 5
- O.VULN_ANAL_TEST: 6
- OE:
- OE.AVAILABILITY: 2
- OE.CONNECT: 1
- OE.GOOD_ADMIN: 2
- OE.NO_BYPASS: 1
- OE.NO_GEN_PURPOSE: 2
- OE.NO_MAINT_PORT: 1
- OE.PHYSICAL: 2
- T:
- T.ADMIN_ERROR: 4
- T.ADMIN_ROGUE: 3
- T.AUDIT_COMP: 3
- T.CRYPTO_COMP: 3
- T.FLAWED_DESIGN: 3
- T.FLAWED_TOE: 3
- T.MALICIOUS_USER: 3
- T.MASQUERADE: 3
- T.MISSED_ACTIONS: 3
- T.POOR_TEST: 3
- T.SPOOFING: 3
- T.UNATTENDED_SESSION: 3
- T.UNAUTH_ACCESS: 3
- T.UNAUTH_PEER: 3
- T.UNKNOWN_STATE: 3
- T.USER_ERROR: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- ISO:
|
- CC:
- CCMB-2005-02-002: 1
- CCMB-2005-02-003: 1
- CCMB-2005-08-001: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: K.Nakagawa
- /Company: Sharp Corporation
- /CreationDate: D:20061116111756+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20061116115023+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /SourceModified: D:20061116021458
- /Title: MX-FRX2 Security Target
- pdf_file_size_bytes: 1047457
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 49
|
- /Author: ggibbs
- /CreationDate: D:20090105074649-05'00'
- /Creator: PDFCreator Version 0.9.5
- /Keywords:
- /ModDate: D:20090304140542-05'00'
- /Producer: GPL Ghostscript 8.61
- /Subject:
- /Title: TNG-Security-Target_v0.41_5Jan09
- pdf_file_size_bytes: 413865
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |