Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C353 PKI Card System Control Software Version:A02E0Y0-0100-GM0-U4
JISEC-CC-CRP-C0231
Ascertia ADSS Server Signature Activation Module (SAM) v7.0.2
OCSI/CERT/CCL/11/2021/RC
name bizhub C353 PKI Card System Control Software Version:A02E0Y0-0100-GM0-U4 Ascertia ADSS Server Signature Activation Module (SAM) v7.0.2
category Other Devices and Systems Products for Digital Signatures
scheme JP IT
status archived active
not_valid_after 28.08.2014 29.04.2027
not_valid_before 17.08.2009 29.04.2022
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0231_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_adss_sam_702_v1.0_en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0231_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_adss_sam_702_v8.pdf
manufacturer Konica Minolta Business Technologies, Inc Ascertia Ltd.
manufacturer_web https://www.konicaminolta.com/ https://www.ascertia.com/
security_level EAL3 EAL4+, AVA_VAN.5
dgst fd449aad52796b9c bcd2b38afb5e78e8
heuristics/cert_id JISEC-CC-CRP-C0231 OCSI/CERT/CCL/11/2021/RC
heuristics/extracted_sars AVA_VLA.2, ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 0100 7.0.2
heuristics/report_references/directly_referencing {} OCSI/CERT/SYS/08/2017/RC
heuristics/report_references/indirectly_referencing {} OCSI/CERT/SYS/08/2017/RC
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0231
  • certification_date: 01.08.2009
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0231_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFD” or through the network and supports the protection from exposure of the highly confidential documents exchanged between MFP and client PC. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD or the encryption function by the encryption board. Besides, TOE has a deletion method compliant with various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator function - Service mode function - Encryption Print Function - S/MIME Encryption Function - Digital Signature Function - All area overwrite deletion function - Encryption key generation function - HDD Verification Function - Authentication Failure Frequency Reset function - Encryption Board Support Function - HDD lock Operation Support Function - PKI Support Function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: bizhub C353 PKI Card System Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0231_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0231_est.pdf
    • toe_version: A02E0Y0-0100-GM0-U4
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.08.2014
  • revalidations: [frozendict({'date': '2010-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0231_it9242_01.html'})]
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C353 PKI Card System Control Software A02E0Y0-0100-GM0-U4
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0231_it9242.html
  • toe_overseas_name: bizhub C353 PKI Card System Control Software A02E0Y0-0100-GM0-U6
  • certification_date: 29.04.2022
  • level: EAL4+
  • report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/ascertia/adsssam70/cr_adss_sam_702_v1.0_en.pdf
  • report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/ascertia/adsssam70/rc_adss_sam_702_v1.0_it.pdf
  • supplier: Ascertia Ltd.
  • target_link: https://www.ocsi.gov.it/documenti/certificazioni/ascertia/adsssam70/st_adss_sam_702_v8.pdf
  • title: Ascertia ADSS Server Signature Activation Module v7.0.2
heuristics/protection_profiles {} eabbd431e1f174cd
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf
pdf_data/report_filename c0231_erpt.pdf cr_adss_sam_702_v1.0_en.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0231-01: 1
    • Certification No. C0231: 1
  • IT:
    • OCSI/CERT/CCL/11/2021/RC: 30
    • OCSI/CERT/SYS/08/2017/RC: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 2: 1
    • EAL2: 3
    • EAL4: 11
    • EAL4 augmented: 1
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.IC-CARD: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.BRING-OUT-STORAGE: 3
    • T.DISCARD-MFP: 2
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft Corporation: 1
  • Thales:
    • Thales: 1
pdf_data/report_keywords/eval_facility
  • CCLab:
    • CCLab Software Laboratory: 5
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
  • TLS:
    • TLS:
      • TLS: 8
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 15408: 6
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document exchanged between MFP and client PC. Moreover, TOE can prevent the unauthorized access to the image: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20091023095042+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20091023095552+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20091023004917
  • /Title:
  • pdf_file_size_bytes: 518089
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
  • /Author: OCSI
  • /CreationDate: D:20220429060547+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20220429060547+00'00'
  • /Title: Certification Report "Ascertia ADSS Server Signature Activation Module (SAM) v7.0.2"
  • pdf_file_size_bytes: 779106
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
pdf_data/st_filename c0231_est.pdf st_adss_sam_702_v8.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 2
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 5
    • EAL 4+: 1
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VLA.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
  • FCS:
    • FCS_CAP.1: 1
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 12
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 24
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_EID: 2
    • FIA_EID.1: 10
    • FIA_EID.1.1: 2
    • FIA_EID.1.2: 2
    • FIA_SOS.1: 19
    • FIA_SOS.1.1: 3
    • FIA_SSL.3: 1
    • FIA_UAU.1: 9
    • FIA_UAU.2: 19
    • FIA_UAU.2.1: 2
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 11
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 18
    • FIA_UID.2.1: 3
  • FMT:
    • FMT_MOF.1: 23
    • FMT_MOF.1.1: 4
    • FMT_MTD.1: 37
    • FMT_MTD.1.1: 4
    • FMT_SMF.1: 49
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 64
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM: 20
    • FCS_CKM.1: 16
    • FCS_CKM.2: 6
    • FCS_CKM.4: 30
    • FCS_CKM.4.1: 1
    • FCS_COP: 35
    • FCS_COP.1: 13
    • FCS_RNG: 3
    • FCS_RNG.1: 10
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 90
    • FDP_ACC.1: 43
    • FDP_ACF: 58
    • FDP_ACF.1: 48
    • FDP_ETC: 16
    • FDP_ETC.2: 8
    • FDP_IFC: 29
    • FDP_IFC.1: 24
    • FDP_IFF: 15
    • FDP_IFF.1: 14
    • FDP_ITC: 16
    • FDP_ITC.1: 12
    • FDP_ITC.2: 22
    • FDP_UCT.1: 7
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_UAU: 15
    • FIA_UAU.1: 12
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 4
    • FIA_UID.1: 5
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
    • FIA_USB.1: 18
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 1
    • FIA_UTD.1: 1
  • FMT:
    • FMT_MSA: 38
    • FMT_MSA.1: 10
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 26
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.2: 13
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_ITC: 1
    • FPT_PHP.1: 11
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 13
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRP: 2
  • FTP:
    • FTP_ITC: 7
    • FTP_ITC.1: 11
    • FTP_TDC.1: 2
    • FTP_TRP: 25
    • FTP_TRP.1: 15
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.IC-CARD: 3
    • A.NETWORK: 3
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 2
  • O:
    • O.CHECK-HDD: 4
    • O.CRYPTO-CAPABILITY: 5
    • O.CRYPTO-KEY: 5
    • O.DECRYPT-PRINT: 5
    • O.LOCK-HDD-CAPABILITY: 4
    • O.MAIL-CRYPTO: 5
    • O.MAIL-SIGN: 4
    • O.OVERWRITE-ALL: 4
    • O.PKI-CAPABILITY: 10
  • OE:
    • OE.ADMIN: 3
    • OE.CARD-USER: 3
    • OE.DRIVER: 3
    • OE.IC-CARD: 6
    • OE.NETWORK: 3
    • OE.SECRET: 3
    • OE.SERVICE: 3
    • OE.SETTING-SECURITY: 3
    • OE.SIGN: 3
  • T:
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 3
  • A:
    • A.ACCESS_PROTECTED: 4
    • A.AUTH_DATA: 4
    • A.CA: 4
    • A.CERTIFICATION_AUTHORITY: 4
    • A.PRIVILEGED_USER: 4
    • A.SEC_REQ: 4
    • A.SIGNER_AUTHENTICATION_DATA_PROTECTI: 1
    • A.SIGNER_AUTHENTICATION_DATA_PROTECTION: 3
    • A.SIGNER_DEVICE: 4
    • A.SIGNER_ENROLMENT: 4
    • A.TSP_AUDITED: 4
  • OE:
    • OE.CA_REQUEST_CERTIFICATE: 4
    • OE.CERTIFICATE_VERFICATION: 2
    • OE.CERTIFICATE_VERIFICATION: 4
    • OE.CRYPTOMODULE_CERTIFIED: 6
    • OE.DELEGATED_AUTHENTICATION: 4
    • OE.DEVICE: 11
    • OE.ENV: 8
    • OE.SIGNER_AUTHENTICATION_DATA: 5
    • OE.SVD_AUTHENTICITY: 5
  • OSP:
    • OSP.CRYPTO: 4
    • OSP.RANDOM: 5
  • OT:
    • OT.AUDIT_PROTECTION: 5
    • OT.CRYPTO: 6
    • OT.DTBSR_INTEGRITY: 4
    • OT.PRIVILEGED_USER_AUTHENTICATION: 6
    • OT.PRIVILEGED_USER_MANAGEMENT: 11
    • OT.PRIVILEGED_USER_PROTECTION: 10
    • OT.RANDOM: 12
    • OT.REFERENCE_SIGNER: 1
    • OT.REFERENCE_SIGNER_AUTHENTICATION_DATA: 6
    • OT.SAD_VERIFICATION: 10
    • OT.SAP: 8
    • OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION: 11
    • OT.SIGNATURE_INTEGRITY: 10
    • OT.SIGNER_KEY_PAIR_GENERATION: 11
    • OT.SIGNER_MANAGEMENT: 5
    • OT.SIGNER_PROTECTION: 12
    • OT.SVD: 4
    • OT.SYSTEM_PROTECTION: 11
  • R:
    • R.AUDIT: 2
    • R.RANDOM: 2
    • R.SAD: 25
    • R.SVD: 37
    • R.TSF_DATA: 13
  • T:
    • T.ADMIN_IMPERSONATION: 9
    • T.AUDIT_ALTERATION: 8
    • T.AUTHENTICATION_SIGNER_IMPERSONATION: 11
    • T.AUTHORISATION_DATA_DISCLOSE: 2
    • T.AUTHORISATION_DATA_UPDATE: 10
    • T.CONTEXT_ALTERATION: 9
    • T.DTBSR_FORGERY: 8
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_: 1
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DIS: 1
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL: 1
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED: 3
    • T.ENROLMENT_SIGNER_IMPERSONATION: 9
    • T.MAINTENANCE_AUTHENTICATION_DISCLOSE: 4
    • T.PRIVILEGED_USER_INSERTION: 9
    • T.RANDOM: 9
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_: 1
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA: 1
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION: 2
    • T.SAD_FORGERY: 7
    • T.SAP_BYPASS: 7
    • T.SAP_REPLAY: 6
    • T.SIGNATURE_FORGERY: 6
    • T.SIGNATURE_REQUEST_DISCLOSURE: 6
    • T.SIGNER_AUTHENTICATION_DATA_MODIFIED: 4
    • T.SVD_FORGERY: 8
pdf_data/st_keywords/eval_facility
  • CCLab:
    • CCLab Software Laboratory: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • AES_competition:
    • AES:
      • AES: 5
  • constructions:
    • MAC:
      • HMAC: 20
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 7
  • RSA:
    • RSA 2048: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-256: 3
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 2
      • SHA224: 2
      • SHA256: 6
      • SHA384: 4
      • SHA512: 5
    • SHA3:
      • SHA-3: 1
      • SHA3-224: 2
      • SHA3-256: 1
      • SHA3-384: 2
      • SHA3-512: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 23
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 9
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 2
    • brainpoolP256r1: 2
    • brainpoolP256t1: 2
    • brainpoolP320r1: 2
    • brainpoolP320t1: 2
    • brainpoolP384r1: 2
    • brainpoolP384t1: 2
    • brainpoolP512r1: 2
    • brainpoolP512t1: 2
  • NIST:
    • NIST P-256: 2
    • P-256: 2
    • P-384: 2
    • P-521: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-2: 5
    • FIPS 186-2: 6
    • FIPS PUB 197: 3
  • BSI:
    • AIS 20: 3
    • AIS 31: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 3
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 186-4: 5
    • FIPS 202: 3
    • FIPS PUB 140-2: 1
    • FIPS PUB 186-4: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 19790: 8
    • ISO/IEC 19790:2012: 1
  • PKCS:
    • PKCS#1: 6
  • RFC:
    • RFC 2104: 2
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document exchanged between MFP and client PC. Also, it provides the protection function for scan image data: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20091022141845+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20091022143205+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - 【C0231】英文公開用_ASE_Thames1_PKI-107-090805.doc
  • /_AdHocReviewCycleID: -693642671
  • /_PreviousAdHocReviewCycleID: -688275005
  • pdf_file_size_bytes: 465777
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 59
  • /Author: Ascertia Limited
  • /CreationDate: D:20220419152208+05'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20220419152208+05'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 1927804
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 131
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different