| name |
CA eHealth Network Performance Manager r6.1.2 |
bizhub C353/ ineo+ 353 Control Software |
| category |
Network and Network-Related Devices and Systems |
Multi-Function Devices |
| scheme |
US |
JP |
| status |
archived |
archived |
| not_valid_after |
01.11.2014 |
28.12.2010 |
| not_valid_before |
19.05.2010 |
26.11.2007 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10367-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0127_erpt.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10367-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0127_est.pdf |
| manufacturer |
CA Technologies |
Konica Minolta Business Technologies, Inc |
| manufacturer_web |
https://www.ca.com |
https://www.konicaminolta.com/ |
| security_level |
EAL2 |
EAL3 |
| dgst |
fb721dfc90adae4a |
185fc5d6d2f97fda |
| heuristics/cert_id |
CCEVS-VR-VID-10367-2010 |
JISEC-CC-CRP-C0127 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ASE_TSS.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ADV_ARC.1 |
AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
6.1.2 |
353 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10367/
- categories: ['Network Management']
- category: Network Management
- certification_date: 19.05.2010
- evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10367
- product: CA eHealth Network Performance Manager r6.1.2
- scheme: US
- url: https://www.niap-ccevs.org/products/10367
- vendor: CA Technologies
|
- cert_id: JISEC-CC-CRP-C0127
- certification_date: 01.11.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0127_eimg.pdf
- description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C353/ ineo+ 353)(Hereinafter referred to as “MFP”). This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: bizhub C353/ ineo+ 353 Control Software(Japanese Name) bizhub C353/ ineo+ 353 Control Software(English Name)
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0127_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0127_est.pdf
- toe_version: A02E0Y0-0100-GM0-02
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.01.2011
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C353/ ineo+ 353 Control Software A02E0Y0-0100-GM0-02
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0127_it7142.html
- toe_overseas_name: bizhub C353/ ineo+ 353 Control Software A02E0Y0-0100-GM0-02
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
st_vid10367-vr.pdf |
20080306_c0127_erpt.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10367-2010
- cert_item: CA eHealth Network Performance Manager 6.1.2
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10367-2010: 1
|
- JP:
- CRP-C0127-01: 1
- Certification No. C0127: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 6
- EAL2 augmented: 1
|
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 3
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVER: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-NET: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC: 1
- T.ACCESS-SECURE-PRINT: 1
- T.BACKUP: 1
- T.BRING-OUT: 1
- T.DISCARD-MFP: 1
|
| pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 7
- Cisco Systems, Inc: 1
- Microsoft:
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- FIPS 180-1: 1
- FIPS 186: 1
- FIPS 186-1: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- Interface. The Reports Center is not needed for this functionality. This is untrusted because it is out of scope of the TSF and was such was not tested. Reports Scheduler – This is accessed through the Motif: 1
- out of scope: 4
- to fail over to backup systems in the event of a failure. This is untrusted because it is out of scope of the TSF and was such was not tested. VALIDATION REPORT CA eHealth 6.1.2 11 Disaster Recovery: 1
- to the standby system occurs, which then becomes the active system. This is untrusted because it is out of scope of the TSF and was such was not tested. 6.1.3 Not installed These components are not installed with: 1
- which is not included in the evaluated configuration. This is untrusted because it is out of scope of the TSF and was such was not tested. High Availability configuration – High availability (HA) is: 1
|
- ConfidentialDocument:
- 353)(Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
|
| pdf_data/report_metadata |
|
- /CreationDate: D:20080305165156+09'00'
- /ModDate: D:20080305165156+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 309678
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
| pdf_data/st_filename |
st_vid10367-st.pdf |
20080306_c0127_est.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 6
- EAL2 augmented: 1
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 12
- ADV_FSP.2: 13
- ADV_TDS.1: 13
- AGD:
- AGD_OPE.1: 16
- AGD_PRE.1: 12
- ALC:
- ALC_CMC.2: 10
- ALC_CMS.2: 8
- ALC_DEL.1: 11
- ASE:
- ASE_CCL.1: 13
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.2: 12
- ASE_REQ.2: 15
- ASE_SPD.1: 9
- ASE_TSS.2: 12
- ATE:
- ATE_COV.1: 6
- ATE_FUN.1: 10
- ATE_IND.2: 9
- AVA:
|
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_GEN_EXT: 2
- FAU_GEN_EXT.1: 66
- FAU_GEN_EXT.1.1: 5
- FAU_GEN_EXT.1.2: 5
- FAU_GEN_EXT.1.3: 1
- FAU_SAR: 3
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_SAR_EXT: 1
- FAU_SAR_EXT.1: 13
- FAU_SAR_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 8
- FIA_UID.1: 4
- FIA_UID.2: 8
- FMT:
- FMT_MOF.1: 18
- FMT_MOF.1.1: 2
- FMT_MSA: 1
- FMT_MSA.1: 6
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 29
- FMT_MTD.1.1: 3
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 50
- FDP_ACC.1.1: 3
- FDP_ACF: 3
- FDP_ACF.1: 48
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC: 3
- FDP_IFC.1: 3
- FDP_ITC: 1
- FDP_ITC.1: 5
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 87
- FIA_AFL.1.1: 9
- FIA_AFL.1.2: 9
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_NEW.1: 12
- FIA_NEW.1.1: 1
- FIA_NEW.1.2: 1
- FIA_SOS: 1
- FIA_SOS.1: 67
- FIA_SOS.1.1: 7
- FIA_SOS.2: 11
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 11
- FIA_UAU.1: 17
- FIA_UAU.2: 119
- FIA_UAU.2.1: 7
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UAU.7: 17
- FIA_UAU.7.1: 2
- FIA_UID: 16
- FIA_UID.1: 21
- FIA_UID.2: 62
- FIA_UID.2.1: 7
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_CKM.1: 1
- FMT_MAS.1: 1
- FMT_MOF.1: 111
- FMT_MOF.1.1: 3
- FMT_MSA: 12
- FMT_MSA.1: 34
- FMT_MSA.1.1: 3
- FMT_MSA.2: 4
- FMT_MSA.3: 22
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 3
- FMT_MTD.1: 191
- FMT_MTD.1.1: 13
- FMT_SMF: 19
- FMT_SMF.1: 41
- FMT_SMF.1.1: 1
- FMT_SMR: 23
- FMT_SMR.1: 112
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FPT:
- FPT_RVM.1: 19
- FPT_RVM.1.1: 1
- FPT_SEP.1: 13
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.CLIENT: 3
- A.LOCATE: 3
- A.NOEVIL: 3
- A.PASSWORD: 3
- A.PATCHES: 3
- A.PROTECT: 3
- O:
- O.ACCESS: 4
- O.AUDIT: 6
- O.CRYPTOGRAPHIC: 2
- O.CRYPTOGRAPHIC_FUNCTIO: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 2
- O.IDEN: 4
- O.MANAGE: 6
- O.MONITOR: 4
- O.ROBUST_ADMIN_GUIDANC: 1
- O.ROBUST_ADMIN_GUIDANCE: 5
- OE:
- OE.ADMIN: 5
- OE.CLIENT: 3
- OE.LOCATE: 3
- OE.NOEVIL: 3
- OE.PASSWORD: 3
- OE.PROTECT: 3
- T:
- T.ACCESS: 3
- T.ADMIN_ERRO: 1
- T.ADMIN_ERROR: 3
- T.AUDIT_COMP: 1
- T.AUDIT_COMPROMISE: 2
- T.CRYPTO_COM: 1
- T.CRYPTO_COMPROMISE: 1
- T.DOS: 2
- T.EAVESDROPPI: 1
- T.EAVESDROPPING: 2
- T.MASK: 4
- T.MODIFY: 3
|
- A:
- A.ADMIN: 1
- A.NETWORK: 2
- A.SERVER: 1
- A.SETTING: 1
- O:
- O.CHECK-HDD: 5
- O.CONFIG: 9
- O.CRYPT-KEY: 1
- O.CRYPTO-MAIL: 6
- O.GROUP-BOX: 4
- O.OVERWRITE-ALL: 5
- O.PRIVATE-BOX: 3
- O.PUBLIC-BOX: 6
- O.REGISTERED-USER: 12
- O.SECURE-PRINT: 6
- O.TRUSTED-PASS: 3
- OE:
- OE.CRYPT: 5
- OE.FEED-BACK: 12
- OE.LOCK-HDD: 1
- OE.SESSION: 1
- T:
- T.ACCESS-GROUP-BOX: 2
- T.ACCESS-NET-SETTING: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-SETTING: 1
- T.BACKUP-RESTORE: 1
- T.DISCARD-MFP: 1
|
| pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 8
- Cisco Systems, Inc: 1
- Microsoft:
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 180-1: 2
- FIPS 186: 4
- FIPS 186-1: 2
- FIPS PUB 197: 5
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- Interface. The Reports Center is not needed for this functionality. This is untrusted because it is out of scope of the TSF and was such was not tested. Reports Scheduler – This is accessed through the Motif: 1
- out of scope: 4
- to fail over to backup systems in the event of a failure. This is untrusted because it is out of scope of the TSF and was such was not tested. Disaster Recovery configuration - An eHealth environment: 1
- to the standby system occurs, which then becomes the active system. This is untrusted because it is out of scope of the TSF and was such was not tested. 2.2.3 Not installed These components are not installed with: 1
- which is not included in the evaluated configuration. This is untrusted because it is out of scope of the TSF and was such was not tested. High Availability configuration – High availability (HA) is: 1
|
- ConfidentialDocument:
- functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
|
| pdf_data/st_metadata |
- /CreationDate: D:20100526203404
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20100526203404
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 898971
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 96
|
- /Author:
- /Company:
- /CreationDate: D:20080304170621+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20080304171340+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - 【C0127】Thames1_英文ST-1.03-080304.doc
- /_AdHocReviewCycleID: -1264862075
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: megumi tanabe
- /_EmailSubject: 【Mosel ISO15408】 ST翻訳確認のお願い
- pdf_file_size_bytes: 922218
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 131
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |