| name |
Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit User Interface: 4030-20G0-05-00 Network Module: 4030-A0G0-03-00 |
Ciena 6500 Packet-Optical Platform |
| category |
Multi-Function Devices |
Network and Network-Related Devices and Systems |
| scheme |
JP |
US |
| status |
archived |
archived |
| not_valid_after |
28.12.2010 |
30.09.2020 |
| not_valid_before |
03.08.2004 |
30.09.2018 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10922-ci.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0011_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10922-vr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0011_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10922-st.pdf |
| manufacturer |
Konica Minolta Business Technologies, Inc |
Ciena, Inc. |
| manufacturer_web |
https://www.konicaminolta.com/ |
https://www.ciena.com/ |
| security_level |
EAL3 |
{} |
| dgst |
f7d41e1f69ac3e28 |
4632d6ef8ca5ef64 |
| heuristics/cert_id |
JISEC-CC-CRP-C0011-01 |
CCEVS-VR-VID-10922-2018 |
| heuristics/cert_lab |
[] |
US |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1 |
AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
00, 4030, 05, 03 |
6500 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0011
- certification_date: 01.08.2004
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0011_eimg.pdf
- description: PRODUCT DESCRIPTION Multi Function Peripheral (MFP) is IT machine for office work which is composed by selecting and combining each function such as copy, print, scan, FAX. This TOE* consists of "User Interface" and "Network Module" which are the software components carrying out the operation control processing, from the operation panel and a client PC in the control software of Di3510 series/Di3510f series MFP. This security function protects the high confidential document data that is spooled in MFP from exposing by using the specific function. That specific function is the Locked Print function which accepts printing only when the set-up password and input password from the panel are matched and the User Box function which controls the access to the user box. * Japan: Di3510 shirizu/ Di3510f shirizu Multi Function Peripheral Security Kit, Aboard:Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit are the same products with different name.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: Japan :Di3510 shirizu / Di3510f shirizu Multi Function Peripheral Security Kit Abroad:Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit
- product_type: IT Product (data protection function in digital MFD)
- protection_profile: Not available
- report_link: https://www.ipa.go.jp/en/security/c0011_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0011_est.pdf
- toe_version: User Interface : 4030-20G0-05-00 Network Module : 4030-A0G0-03-00
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.01.2011
- supplier: Konica Minolta business technologies,inc.
- toe_japan_name: Di3510 shirizu / Di3510f shirizu Multi Function Peripheral Security Kit (User Interface : 4030-20G0-05-00 Network Module : 4030-A0G0-03-00)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0011_it4021.html
- toe_overseas_name: Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit (User Interface : 4030-20G0-05-00 Network Module : 4030-A0G0-03-00)
|
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10922/
- categories: ['Network Device']
- category: Network Device
- certification_date: 30.09.2018
- evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
- expiration_date: 30.09.2020
- id: CCEVS-VR-VID10922
- product: Ciena 6500 Packet-Optical Platform
- scheme: US
- url: https://www.niap-ccevs.org/products/10922
- vendor: Ciena Corporation
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
|
st_vid10922-ci.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10922-2018: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20181016152053-04'00'
- /ModDate: D:20181016152053-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 184013
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
c0011_erpt.pdf |
st_vid10922-vr.pdf |
| pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10922-2018
- cert_item: Ciena 6500 Packet Optical Platform
- cert_lab: US NIAP
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0011-01: 1
- Certification No. C011: 1
|
- US:
- CCEVS-VR-VID10922-2018: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 1
- FCS_COP: 5
- FCS_RBG_EXT.1: 1
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS-CHECK: 1
- A.ADMIN: 1
- A.AUTH: 1
- A.HDD: 1
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.SERVICE: 1
- A.SESSION: 1
- T:
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-USER-BOX: 1
|
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
- SSH:
- SSH: 17
- SSHv1: 2
- SSHv2: 2
- TLS:
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20050823120725+09'00'
- /ModDate: D:20050823120725+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 197148
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /CreationDate: D:20181016153205-04'00'
- /ModDate: D:20181016153205-04'00'
- pdf_file_size_bytes: 795453
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
| pdf_data/st_filename |
c0011_est.pdf |
st_vid10922-st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- AGD:
- AGD_OPE.1: 11
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.1: 5
- ALC_CMS.1: 6
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 26
- FDP_ACC.1.1: 2
- FDP_ACF.1: 22
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 2
- FIA:
- FIA_AFL.1: 47
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_SOS.1: 39
- FIA_SOS.1.1: 4
- FIA_UAU.1: 16
- FIA_UAU.2: 68
- FIA_UAU.2.1: 4
- FIA_UAU.6: 13
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 28
- FIA_UID.2: 57
- FIA_UID.2.1: 4
- FMT:
- FMT_MOF.1: 15
- FMT_MOF.1.1: 1
- FMT_MSA.1: 16
- FMT_MSA.1.1: 1
- FMT_MSA.3: 23
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 52
- FMT_MTD.1.1: 5
- FMT_RVM.1.1: 1
- FMT_SMF.1: 39
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 73
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 4
- FMT_SMT.1: 1
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 23
- FPT_SEP: 1
- FPT_SEP.1: 28
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
|
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 21
- FCS_COP.1: 4
- FCS_DTLS: 1
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 9
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHC_EXT.1.2: 1
- FCS_SSHC_EXT.1.3: 1
- FCS_SSHC_EXT.1.7: 1
- FCS_SSHC_EXT.1.8: 1
- FCS_SSHC_EXT.1.9: 1
- FCS_SSHS_EXT.1: 11
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 6
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 17
- FMT_MOF.1: 3
- FMT_MTD: 11
- FMT_MTD.1: 2
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 5
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 5
- FTP_TRP.1: 3
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS-CHECK: 3
- A.ADMIN: 2
- A.AUTH: 3
- A.HDD: 2
- A.NETWORK: 3
- A.PHYSICAL: 2
- A.SERVICE: 3
- A.SESSION: 2
- O:
- O.ACCESS-ADMIN: 8
- O.ACCESS-SERVICE: 7
- O.ACCESS-USE-BOX: 1
- O.ACCESS-USER-BOX: 3
- O.ACESS-ADMIN: 2
- OE:
- OE.ACCESS-: 1
- OE.ACCESS-SECURE-PRINT: 5
- OE.SECURE-PRINT-QUALITY: 5
- T:
- T.ACCESS-SECURE-PRINT: 3
- T.ACCESS-USER-BOX: 2
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.COMPONENTS_RUNNING: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.COMPONENTS_RUNNING: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 4
- SHA-512: 4
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-032: 2
- CCIMB-99-033: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
- ISO/IEC 10116:2017: 1
- ISO/IEC 14888-3: 2
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 2
- NIST:
- PKCS:
- RFC:
- RFC 3526: 5
- RFC 4251: 2
- RFC 4253: 3
- RFC 6187: 1
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- the MFP is considered temporary data that is stored to maintain security during the printing of a confidential document. In other words, this data is not intended to be stored in the MFP for a long period of time, and: 1
|
- OutOfScope:
- out of scope: 1
- traffic infrastructure equipment. This has not been depicted in detail because this capability is out of scope of the TOE from a security functional perspective. Security Target Ciena 6500 Packet Optical: 1
|
| pdf_data/st_metadata |
- /CreationDate: D:20050823121328+09'00'
- /ModDate: D:20050823121328+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 409164
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
- /CreationDate: D:20181016153104-04'00'
- /ModDate: D:20181016153104-04'00'
- pdf_file_size_bytes: 1218545
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=352, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=348, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=350, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=344, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=296, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=349, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=346, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=297, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=328, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=266, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=345, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=351, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=262, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=343, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=353, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=265, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=295, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=287, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=263, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=330, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=234, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=327, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=347, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=329
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |