Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software Version: A0R50Y0-0100-G00-11 (System Controller), A0R50Y0-1D00-G00-10 (BIOS Controller)
JISEC-CC-CRP-C0190
Dell EMC Networking SmartFabric OS10.5.4
CCEVS-VR-VID-11338-2023
name bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software Version: A0R50Y0-0100-G00-11 (System Controller), A0R50Y0-1D00-G00-10 (BIOS Controller) Dell EMC Networking SmartFabric OS10.5.4
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme JP US
not_valid_after 09.12.2013 06.09.2025
not_valid_before 30.10.2008 06.09.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11338-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0190_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11338-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0190_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11338-st.pdf
manufacturer Konica Minolta Business Technologies, Inc Dell Technologies
manufacturer_web https://www.konicaminolta.com/ https://delltechnologies.com/
security_level EAL3 {}
dgst fe2f02fb20d5a072 ee3774eabd319cf2
heuristics/cert_id JISEC-CC-CRP-C0190 CCEVS-VR-VID-11338-2023
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:dell:smartfabric_os10:10.5.4.2:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.12:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.11:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.8:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.14:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.9:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.6:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.5:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.10:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.0:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.4:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.7:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.13:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.3:*:*:*:*:*:*:*, cpe:2.3:o:dell:smartfabric_os10:10.5.4.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2025-22474, CVE-2025-36608, CVE-2025-46427, CVE-2024-48830, CVE-2025-36609, CVE-2025-22472, CVE-2024-48837, CVE-2023-28078, CVE-2025-46428, CVE-2024-48013, CVE-2024-39577, CVE-2024-49561, CVE-2025-30103, CVE-2024-48838, CVE-2024-49558, CVE-2024-37125, CVE-2024-48017, CVE-2023-32462, CVE-2024-48015, CVE-2024-49559, CVE-2024-49557, CVE-2024-48829, CVE-2024-49560, CVE-2025-22473, CVE-2024-48828
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_FSP.3, ALC_LCD.1, AVA_VLA.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1
heuristics/extracted_versions 11, 501, 10, 0100, 421, 361 10.5.4
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0190
  • certification_date: 01.10.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0190_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functions TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Zentai Control Software English: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0190_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0190_est.pdf
    • toe_version: A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.12.2013
  • revalidations: [frozendict({'date': '2009-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0190_it8215_01.html'})]
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Zentai Control Software A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0190_it8215.html
  • toe_overseas_name: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11338/
  • categories: ['Network Device']
  • category: Network Device
  • certification_date: 06.09.2023
  • evaluation_facility: Lightship Security USA, Inc.
  • expiration_date: 06.09.2025
  • id: CCEVS-VR-VID11338
  • product: Dell EMC Networking SmartFabric OS10.5.4
  • scheme: US
  • url: https://www.niap-ccevs.org/products/11338
  • vendor: Dell Technologies Inc.
heuristics/protection_profiles {} 89f2a255423f4a20
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf
pdf_data/cert_filename st_vid11338-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11338-2023: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Lightship:
    • Lightship Security: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20230908151050-04'00'
  • /ModDate: D:20230908151050-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181434
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0190_erpt.pdf st_vid11338-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID11338-2023
    • cert_item: Dell EMC Networking SmartFabric OS10.5.4
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0190-01: 1
    • Certification No. C0190: 1
  • US:
    • CCEVS-VR-VID11338-2023: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-B: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-NET-SET: 1
    • T.ACCESS-PRIVATE: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTOR: 1
    • T.BACKUP-RESTORE: 1
    • T.BRING-OUT-CF: 2
    • T.BRING-OUT-STOR: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTEC-TRANSMISSION: 1
  • A:
    • A.ADMIN_: 1
    • A.LIMITED_: 1
    • A.NO_THRU_: 1
    • A.PHYSICAL_: 1
    • A.REGULAR_: 1
    • A.RESIDUAL_: 1
    • A.TRUSTED_: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • Lightship:
    • Lightship Security: 6
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
  • SSH:
    • SSH: 6
    • SSHv2: 1
  • TLS:
    • TLS:
      • TLS: 5
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in: 1
pdf_data/report_metadata
  • /CreationDate: D:20081211163158+09'00'
  • /ModDate: D:20081211163158+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 308979
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
  • /Author: Clare C Parran
  • /CreationDate: D:20230908150939-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20230908150939-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 406628
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
pdf_data/st_filename c0190_est.pdf st_vid11338-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VLA.1: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 57
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 41
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ACP.1: 1
    • FDP_IFC.1: 6
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 61
    • FIA_AFL.1.1: 8
    • FIA_AFL.1.2: 8
    • FIA_ATD.1: 26
    • FIA_ATD.1.1: 1
    • FIA_EID: 2
    • FIA_EID.1: 16
    • FIA_EID.1.1: 3
    • FIA_EID.1.2: 1
    • FIA_NEW.1.2: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 47
    • FIA_SOS.1.1: 6
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU.1: 23
    • FIA_UAU.2: 67
    • FIA_UAU.2.1: 6
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 18
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 49
    • FIA_UID.2.1: 7
    • FIA_USB.1: 22
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 31
    • FMT_MOF.1.1: 4
    • FMT_MSA: 3
    • FMT_MSA.1: 32
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 5
    • FMT_MSA.3.2: 5
    • FMT_MTD.1: 101
    • FMT_MTD.1.1: 12
    • FMT_SMF.1: 107
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 164
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SMS.1: 1
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCO:
    • FCO_CPC_EXT.1: 1
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP: 20
    • FCS_COP.1: 4
    • FCS_NTP_EXT.1: 1
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT.1: 5
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1: 2
    • FCS_SSHS_EXT.1: 7
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 5
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.2.3: 1
    • FCS_TLSS_EXT.1: 4
    • FCS_TLSS_EXT.2: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 5
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 13
    • FMT_MOF.1: 2
    • FMT_MTD: 10
    • FMT_MTD.1: 2
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 5
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_ITT.1: 2
    • FPT_SKP_EXT.1: 5
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT.1: 6
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 1
  • FTA:
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 5
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 5
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 7
    • FTP_TRP.1: 2
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 4
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.AUTH-CAPABILITY: 9
    • O.CHECK-CF: 4
    • O.CHECK-HDD: 6
    • O.CONFIG: 11
    • O.CRYPT-KEY: 5
    • O.CRYPTO-CAPABILITY: 4
    • O.CRYPTO-MAIL: 4
    • O.GROUP-BOX: 5
    • O.LOCK-CF-CAPABILITY: 4
    • O.LOCK-HDD-CAPABILITY: 6
    • O.OVERWRITE-ALL: 6
    • O.PRIVATE-BOX: 5
    • O.PUBLIC-BOX: 7
    • O.REGISTERED-USER: 13
    • O.SECURE-PRINT: 7
    • O.TRUSTED-PASS: 6
  • OE:
    • OE.ADMIN: 2
    • OE.CRYPT: 3
    • OE.CRYPTO: 1
    • OE.FEED-BACK: 10
    • OE.LOCK-CF: 3
    • OE.LOCK-HDD: 3
    • OE.NETWORK: 2
    • OE.SECRET: 2
    • OE.SERVER: 5
    • OE.SERVICE: 2
    • OE.SESSION: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS-GROUP-BOX: 3
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PRIVATE-BOX: 3
    • T.ACCESS-PUBLIC-BOX: 2
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 3
    • T.BRING-OUT-CF: 2
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 3
    • T.UNEXPECTEC-TRANSMISSION: 1
    • T.UNEXPECTED-TRANSMISSION: 1
  • A:
    • A.ADMIN_: 1
    • A.LIMITED_: 1
    • A.NO_THRU_: 1
    • A.PHYSICAL_: 1
    • A.REGULAR_: 1
    • A.RESIDUAL_: 1
    • A.TRUSTED_: 1
  • OE:
    • OE.ADMIN_: 1
    • OE.NO_GENERAL_: 1
    • OE.NO_THRU_: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_: 1
    • T.PASSWORD_CRACKING: 3
    • T.SECURITY_: 2
    • T.SECURITY_FUNCTIONAL: 2
    • T.UNAUTHORIZED_: 1
    • T.UNAUTHORIZED_ADMINIS: 1
    • T.UNDETECTED_: 1
    • T.UNDETECTED_ACTIVITY: 2
    • T.UNTRUSTED_: 1
    • T.UNTRUSTED_COMMUNI: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
    • T.UPDATE_: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_: 2
    • T.WEAK_AUTHENTICATIO: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • AES_competition:
    • AES:
      • AES: 8
  • constructions:
    • MAC:
      • HMAC: 6
      • HMAC-SHA-256: 3
      • HMAC-SHA-512: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • Diffie-Hellman: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 5
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 5
      • SHA1: 1
    • SHA2:
      • SHA-2: 2
      • SHA-256: 4
      • SHA-384: 3
      • SHA-512: 3
      • SHA256: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 43
    • SSHv2: 3
  • TLS:
    • DTLS:
      • DTLS: 2
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 45
      • TLS 1.2: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 6
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 6
    • P-521: 6
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 186: 1
    • FIPS 186-1: 1
    • FIPS 186-2: 4
    • FIPS PUB 197: 3
  • X509:
    • X.509: 1
  • FIPS:
    • FIPS 140-2: 3
    • FIPS PUB 186-4: 4
    • FIPS140-2: 1
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • NIST:
    • SP 800-90B: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2986: 1
    • RFC 3268: 4
    • RFC 3447: 1
    • RFC 3526: 3
    • RFC 3986: 1
    • RFC 4253: 1
    • RFC 5077: 1
    • RFC 5246: 7
    • RFC 5280: 4
    • RFC 6125: 1
  • X509:
    • X.509: 14
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • the main body of MFP or through the network. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in: 1
pdf_data/st_metadata
  • /Author: e02518
  • /CreationDate: D:20081205143523+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20081205143523+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: Microsoft Word - 【C0190】英文ST掲載用081205.doc
  • pdf_file_size_bytes: 735960
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 108
  • /Author: Marina Ibrishimova
  • /CreationDate: D:20230906095055-07'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20230906095055-07'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: Dell EMC Networking SmartFabric OS10.5.4
  • /Title: Dell EMC Networking SmartFabric OS10.5.4
  • pdf_file_size_bytes: 629085
  • pdf_hyperlinks: https://www.lightshipsec.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 48
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different