bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software, Version: A55V0Y0-0100-G00-10
CSV information ?
Status | archived |
---|---|
Valid from | 12.07.2013 |
Valid until | 07.08.2018 |
Scheme | 🇯🇵 JP |
Manufacturer | KONICA MINOLTA, INC. |
Category | Other Devices and Systems |
Security level | EAL3 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSLVendor
MicrosoftSecurity level
EAL3Claims
T.DISCARD-MFP, T.BRING-OUT-STORA, T.ACCESS-PRIVATE-, T.ACCESS-PUBLIC-, T.ACCESS-GROUP-, T.ACCESS-SECURE-, T.UNEXPECTED-TRA, T.ACCESS-SETTING, T.BACKUP-RESTORE, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.UNEXPECTED-TRANSMISSION, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRETCertificates
CRP-C0398-01, Certification No. C0398Certification process
or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection ofStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date | D:20131008135938+09'00' |
---|---|
Modification date | D:20131008140306+09'00' |
Pages | 40 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DESProtocols
SSLSecurity level
EAL3Claims
O.REGISTERED, O.PRIVATE, O.PUBLIC, O.GROUP, O.SECURE, O.CONFIG, O.OVERW, O.CRYPT, O.TRUSTED, O.CR, O.FAX, O.AUTH, O.CRYPTO, O.AUDIT, O.REGISTERED-USER, O.PRIVATE-BOX, O.PUBLIC-BOX, O.GROUP-BOX, O.SECURE-PRINT, O.OVERWRITE, O.CRYPTO-KEY, O.TRUSTED-PATH, O.CRYPTO-MAIL, O.FAX-CONTROL, O.CRYPTO-CAPABILITY, O.AUTH-CAPABILITY, O.AUDIT-LOGGED, T.DISCARD, T.BRING, T.ACCESS, T.UNEXPECTED, T.BACKUP, T.DISCARD-MFP, T.ACCESS-PRIVATE-BOX, T.ACCESS-GROUP-BOX, T.UNEXPECTED-TRANSMISSION, T.BACKUP-RESTORE, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, OE.FEED, OE.S, OE.SESSION, OE.ADMIN, OE.SERVICE, OE.NETWORK, OE.FAX, OE.SECRET, OE.SETTING, OE.AUDIT, OE.FEED-BACK, OE.SERVER, OE.FAX-UNIT, OE.SETTING-SECURITY, OE.AUDIT_STORAGE-PR, OE.AUDIT_ACCESS-AUT, OE.AUDIT-REVIEWED, OE.AUDIT_STORAGE-PROTECTED, OE.AUDIT_ACESS-AUTHORIZEDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GNE.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FAU_STG.4, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_COP, FCS_CKM, FCS_CAP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC, FDP_ACP.1, FDP_UAU.7, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1, FIA_UAU.2.1, FIA_UID.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID, FIA_SSL.3, FIA_UAU, FIA_MSA.3, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MAS.1, FMT_MSA, FMT_SOS.1, FPT_STM.1, FTA_SSL, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Certification process
main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data inStandards
FIPS 186, FIPS 186-2, FIPS PUB 197, X.509, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date | D:20131007140604+09'00' |
---|---|
Modification date | D:20131007140609+09'00' |
Pages | 114 |
Creator | CubePDF |
Producer | GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2CPE matches
Similar certificates
Scheme data ?
Cert Id | JISEC-CC-CRP-C0398 | |
---|---|---|
Supplier | KONICA MINOLTA, INC. | |
Toe Overseas Name | bizhub 754 / bizhub 654 / ineo 754 / ineo 654 / N906 / N905 / N901 / N900 Control Software A55V0Y0-0100-G00-10 | |
Expiration Date | 01.08.2018 | |
Claim | EAL3 | |
Revalidations | [frozendict({'date': '2014-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0398_it3440_01.html'})] | |
Certification Date | 01.07.2013 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0398_it3440.html | |
Toe Japan Name | bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Zentai Seigyo SoftwareA55V0Y0-0100-G00-10 | |
Enhanced | ||
Product | Japanese : bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Zentai Seigyo Software English : bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software | |
Toe Version | A55V0Y0-0100-G00-10 | |
Product Type | Control Software for digital MFP | |
Cc Version | 3.1 Release4 | |
Assurance Level | EAL3 | |
Vendor | KONICA MINOLTA, INC. | |
Evaluation Facility | Mizuho Information & Research Institute, Inc. Information Security Evaluation Office | |
Report Link | https://www.ipa.go.jp/en/security/c0398_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0398_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0398_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function that records the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the image data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the image data area no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite data area including the image data of HDD to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone. |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'JISEC-CC-CRP-C0398', 'supplier': 'KONICA MINOLTA, INC.', 'toe_overseas_name': 'bizhub 754 / bizhub 654 / ineo 754 / ineo 654 / N906 / N905 / N901 / N900 Control Software A55V0Y0-0100-G00-10', 'expiration_date': '2018-08-01', 'claim': 'EAL3', 'revalidations': [{'date': '2014-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0398_it3440_01.html'}], 'certification_date': '2013-07-01', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0398_it3440.html', 'toe_japan_name': 'bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Zentai Seigyo SoftwareA55V0Y0-0100-G00-10', 'enhanced': {'product': 'Japanese : bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Zentai Seigyo Software English : bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software', 'toe_version': 'A55V0Y0-0100-G00-10', 'product_type': 'Control Software for digital MFP', 'cc_version': '3.1 Release4', 'assurance_level': 'EAL3', 'vendor': 'KONICA MINOLTA, INC.', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Information Security Evaluation Office', 'report_link': 'https://www.ipa.go.jp/en/security/c0398_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0398_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0398_est.pdf', 'description': 'PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function that records the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the image data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the image data area no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite data area including the image data of HDD to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '64f982137d635d4af726bca260821ca68d6bad505c1be5007734c0d1aed6ac9f', 'txt_hash': '888d3675f7f61ddf2857a5ee435c5476ee1e43b3f61193b05e5ff9ad5db510a7'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'cc9b1b33fc7f882929ae0d33ca65bd1381dc790fdae79154db81aa9e649082b1', 'txt_hash': 'f04c3489d1dd4841ba26f8b6edce3a7e4f0c0b6ef9b1c707f478128ac748ff94'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 452687, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 40, '/CreationDate': "D:20131008135938+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20131008140306+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1150770, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 114, '/Producer': 'GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA', '/CreationDate': "D:20131007140604+09'00'", '/ModDate': "D:20131007140609+09'00'", '/Title': '', '/Creator': 'CubePDF', '/Author': '', '/Subject': '', '/Keywords': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0398-01': 1, 'Certification No. C0398': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DISCARD-MFP': 2, 'T.BRING-OUT-STORA': 1, 'T.ACCESS-PRIVATE-': 1, 'T.ACCESS-PUBLIC-': 1, 'T.ACCESS-GROUP-': 1, 'T.ACCESS-SECURE-': 1, 'T.UNEXPECTED-TRA': 1, 'T.ACCESS-SETTING': 2, 'T.BACKUP-RESTORE': 2, 'T.BRING-OUT-STORAGE': 1, 'T.ACCESS-PRIVATE-BOX': 1, 'T.ACCESS-PUBLIC-BOX': 1, 'T.ACCESS-GROUP-BOX': 1, 'T.ACCESS-SECURE-PRINT': 1, 'T.UNEXPECTED-TRANSMISSION': 1}, 'A': {'A.ADMIN': 1, 'A.SERVICE': 1, 'A.NETWORK': 1, 'A.SECRET': 1}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 11, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GNE.2.1': 1, 'FAU_SAR.1': 7, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 3, 'FAU_SAR.2.1': 1, 'FAU_STG.1': 8, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 2, 'FAU_STG.4': 4}, 'FCS': {'FCS_CKM.1': 11, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 11, 'FCS_CKM.4': 4, 'FCS_COP.1.1': 1, 'FCS_COP': 1, 'FCS_CKM': 2, 'FCS_CAP.1': 2}, 'FDP': {'FDP_ITC.1': 4, 'FDP_ITC.2': 2, 'FDP_ACC.1': 84, 'FDP_ACC.1.1': 4, 'FDP_ACF.1': 69, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 4, 'FDP_ACF.1.3': 4, 'FDP_ACF.1.4': 4, 'FDP_IFC.1': 15, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 7, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_RIP.1': 3, 'FDP_RIP.1.1': 1, 'FDP_ITC': 1, 'FDP_ACP.1': 1, 'FDP_UAU.7': 1}, 'FIA': {'FIA_AFL.1': 89, 'FIA_AFL.1.1': 8, 'FIA_AFL.1.2': 8, 'FIA_UAU.1': 47, 'FIA_UAU.2': 55, 'FIA_ATD.1': 30, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 52, 'FIA_SOS.1.1': 4, 'FIA_SOS.2': 10, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UID.1': 32, 'FIA_UAU.2.1': 4, 'FIA_UID.2': 84, 'FIA_UAU.6': 12, 'FIA_UAU.6.1': 1, 'FIA_UAU.7': 20, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 7, 'FIA_USB.1': 27, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID': 1, 'FIA_SSL.3': 1, 'FIA_UAU': 2, 'FIA_MSA.3': 1}, 'FMT': {'FMT_MSA.3': 52, 'FMT_MOF.1': 63, 'FMT_MOF.1.1': 5, 'FMT_SMF.1': 130, 'FMT_SMR.1': 202, 'FMT_MSA.1': 43, 'FMT_MSA.1.1': 3, 'FMT_MSA.3.1': 8, 'FMT_MSA.3.2': 7, 'FMT_MTD.1': 166, 'FMT_MTD.1.1': 15, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 6, 'FMT_SMR.1.2': 6, 'FMT_MAS.1': 1, 'FMT_MSA': 5, 'FMT_SOS.1': 1}, 'FPT': {'FPT_STM.1': 7}, 'FTA': {'FTA_SSL': 3, 'FTA_SSL.3': 6, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.REGISTERED': 3, 'O.PRIVATE': 3, 'O.PUBLIC': 3, 'O.GROUP': 3, 'O.SECURE': 4, 'O.CONFIG': 12, 'O.OVERW': 1, 'O.CRYPT': 4, 'O.TRUSTED': 3, 'O.CR': 1, 'O.FAX': 2, 'O.AUTH': 4, 'O.CRYPTO': 5, 'O.AUDIT': 3, 'O.REGISTERED-USER': 12, 'O.PRIVATE-BOX': 3, 'O.PUBLIC-BOX': 6, 'O.GROUP-BOX': 3, 'O.SECURE-PRINT': 6, 'O.OVERWRITE': 7, 'O.CRYPTO-KEY': 2, 'O.TRUSTED-PATH': 5, 'O.CRYPTO-MAIL': 2, 'O.FAX-CONTROL': 6, 'O.CRYPTO-CAPABILITY': 4, 'O.AUTH-CAPABILITY': 5, 'O.AUDIT-LOGGED': 3}, 'T': {'T.DISCARD': 3, 'T.BRING': 3, 'T.ACCESS': 19, 'T.UNEXPECTED': 4, 'T.BACKUP': 3, 'T.DISCARD-MFP': 1, 'T.ACCESS-PRIVATE-BOX': 1, 'T.ACCESS-GROUP-BOX': 1, 'T.UNEXPECTED-TRANSMISSION': 1, 'T.BACKUP-RESTORE': 1}, 'A': {'A.ADMIN': 5, 'A.SERVICE': 4, 'A.NETWORK': 6, 'A.SECRET': 3}, 'OE': {'OE.FEED': 2, 'OE.S': 1, 'OE.SESSION': 10, 'OE.ADMIN': 3, 'OE.SERVICE': 3, 'OE.NETWORK': 4, 'OE.FAX': 2, 'OE.SECRET': 3, 'OE.SETTING': 2, 'OE.AUDIT': 6, 'OE.FEED-BACK': 8, 'OE.SERVER': 5, 'OE.FAX-UNIT': 2, 'OE.SETTING-SECURITY': 2, 'OE.AUDIT_STORAGE-PR': 1, 'OE.AUDIT_ACCESS-AUT': 1, 'OE.AUDIT-REVIEWED': 2, 'OE.AUDIT_STORAGE-PROTECTED': 1, 'OE.AUDIT_ACESS-AUTHORIZED': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 2}, '3DES': {'3DES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 5}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186': 2, 'FIPS 186-2': 4, 'FIPS PUB 197': 2}, 'X509': {'X.509': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in': 1}}}
. - The report_filename property was set to
c0398_erpt.pdf
. - The st_filename property was set to
c0398_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0398
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0398_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0398_est.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software, Version: A55V0Y0-0100-G00-10 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "f063d400c202d861",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0398",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:konicaminolta:bizhub_654:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_754:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"754",
"654",
"10",
"0100"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0398",
"certification_date": "2013-07-01",
"claim": "EAL3",
"enhanced": {
"assurance_level": "EAL3",
"cc_version": "3.1 Release4",
"cert_link": "https://www.ipa.go.jp/en/security/c0398_eimg.pdf",
"description": "PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as \u201cMFP\u201d), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function that records the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the image data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the image data area no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite data area including the image data of HDD to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Information Security Evaluation Office",
"product": "Japanese : bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Zentai Seigyo Software English : bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software",
"product_type": "Control Software for digital MFP",
"report_link": "https://www.ipa.go.jp/en/security/c0398_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0398_est.pdf",
"toe_version": "A55V0Y0-0100-G00-10",
"vendor": "KONICA MINOLTA, INC."
},
"expiration_date": "2018-08-01",
"revalidations": [
{
"date": "2014-01",
"link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0398_it3440_01.html"
}
],
"supplier": "KONICA MINOLTA, INC.",
"toe_japan_name": "bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Zentai Seigyo SoftwareA55V0Y0-0100-G00-10",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0398_it3440.html",
"toe_overseas_name": "bizhub 754 / bizhub 654 / ineo 754 / ineo 654 / N906 / N905 / N901 / N900 Control Software A55V0Y0-0100-G00-10"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "KONICA MINOLTA, INC.",
"manufacturer_web": "https://www.konicaminolta.com/index.html",
"name": "bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software, Version: A55V0Y0-0100-G00-10",
"not_valid_after": "2018-08-07",
"not_valid_before": "2013-07-12",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0398_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0398-01": 1,
"Certification No. C0398": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN": 1,
"A.NETWORK": 1,
"A.SECRET": 1,
"A.SERVICE": 1
},
"T": {
"T.ACCESS-GROUP-": 1,
"T.ACCESS-GROUP-BOX": 1,
"T.ACCESS-PRIVATE-": 1,
"T.ACCESS-PRIVATE-BOX": 1,
"T.ACCESS-PUBLIC-": 1,
"T.ACCESS-PUBLIC-BOX": 1,
"T.ACCESS-SECURE-": 1,
"T.ACCESS-SECURE-PRINT": 1,
"T.ACCESS-SETTING": 2,
"T.BACKUP-RESTORE": 2,
"T.BRING-OUT-STORA": 1,
"T.BRING-OUT-STORAGE": 1,
"T.DISCARD-MFP": 2,
"T.UNEXPECTED-TRA": 1,
"T.UNEXPECTED-TRANSMISSION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL3": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 7
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20131008135938+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20131008140306+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 452687,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 40
},
"st_filename": "c0398_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 5,
"A.NETWORK": 6,
"A.SECRET": 3,
"A.SERVICE": 4
},
"O": {
"O.AUDIT": 3,
"O.AUDIT-LOGGED": 3,
"O.AUTH": 4,
"O.AUTH-CAPABILITY": 5,
"O.CONFIG": 12,
"O.CR": 1,
"O.CRYPT": 4,
"O.CRYPTO": 5,
"O.CRYPTO-CAPABILITY": 4,
"O.CRYPTO-KEY": 2,
"O.CRYPTO-MAIL": 2,
"O.FAX": 2,
"O.FAX-CONTROL": 6,
"O.GROUP": 3,
"O.GROUP-BOX": 3,
"O.OVERW": 1,
"O.OVERWRITE": 7,
"O.PRIVATE": 3,
"O.PRIVATE-BOX": 3,
"O.PUBLIC": 3,
"O.PUBLIC-BOX": 6,
"O.REGISTERED": 3,
"O.REGISTERED-USER": 12,
"O.SECURE": 4,
"O.SECURE-PRINT": 6,
"O.TRUSTED": 3,
"O.TRUSTED-PATH": 5
},
"OE": {
"OE.ADMIN": 3,
"OE.AUDIT": 6,
"OE.AUDIT-REVIEWED": 2,
"OE.AUDIT_ACCESS-AUT": 1,
"OE.AUDIT_ACESS-AUTHORIZED": 1,
"OE.AUDIT_STORAGE-PR": 1,
"OE.AUDIT_STORAGE-PROTECTED": 1,
"OE.FAX": 2,
"OE.FAX-UNIT": 2,
"OE.FEED": 2,
"OE.FEED-BACK": 8,
"OE.NETWORK": 4,
"OE.S": 1,
"OE.SECRET": 3,
"OE.SERVER": 5,
"OE.SERVICE": 3,
"OE.SESSION": 10,
"OE.SETTING": 2,
"OE.SETTING-SECURITY": 2
},
"T": {
"T.ACCESS": 19,
"T.ACCESS-GROUP-BOX": 1,
"T.ACCESS-PRIVATE-BOX": 1,
"T.BACKUP": 3,
"T.BACKUP-RESTORE": 1,
"T.BRING": 3,
"T.DISCARD": 3,
"T.DISCARD-MFP": 1,
"T.UNEXPECTED": 4,
"T.UNEXPECTED-TRANSMISSION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 11,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GNE.2.1": 1,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 3,
"FAU_SAR.2.1": 1,
"FAU_STG.1": 8,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.4": 4,
"FAU_STG.4.1": 2
},
"FCS": {
"FCS_CAP.1": 2,
"FCS_CKM": 2,
"FCS_CKM.1": 11,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 4,
"FCS_COP": 1,
"FCS_COP.1": 11,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 84,
"FDP_ACC.1.1": 4,
"FDP_ACF.1": 69,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.3": 4,
"FDP_ACF.1.4": 4,
"FDP_ACP.1": 1,
"FDP_IFC.1": 15,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 7,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC": 1,
"FDP_ITC.1": 4,
"FDP_ITC.2": 2,
"FDP_RIP.1": 3,
"FDP_RIP.1.1": 1,
"FDP_UAU.7": 1
},
"FIA": {
"FIA_AFL.1": 89,
"FIA_AFL.1.1": 8,
"FIA_AFL.1.2": 8,
"FIA_ATD.1": 30,
"FIA_ATD.1.1": 1,
"FIA_MSA.3": 1,
"FIA_SOS.1": 52,
"FIA_SOS.1.1": 4,
"FIA_SOS.2": 10,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_SSL.3": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 47,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UAU.2": 55,
"FIA_UAU.2.1": 4,
"FIA_UAU.6": 12,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 20,
"FIA_UAU.7.1": 1,
"FIA_UID": 1,
"FIA_UID.1": 32,
"FIA_UID.2": 84,
"FIA_UID.2.1": 7,
"FIA_USB.1": 27,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MAS.1": 1,
"FMT_MOF.1": 63,
"FMT_MOF.1.1": 5,
"FMT_MSA": 5,
"FMT_MSA.1": 43,
"FMT_MSA.1.1": 3,
"FMT_MSA.3": 52,
"FMT_MSA.3.1": 8,
"FMT_MSA.3.2": 7,
"FMT_MTD.1": 166,
"FMT_MTD.1.1": 15,
"FMT_SMF.1": 130,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 202,
"FMT_SMR.1.1": 6,
"FMT_SMR.1.2": 6,
"FMT_SOS.1": 1
},
"FPT": {
"FPT_STM.1": 7
},
"FTA": {
"FTA_SSL": 3,
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 5
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS 186": 2,
"FIPS 186-2": 4,
"FIPS PUB 197": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"3DES": 2
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20131007140604+09\u002700\u0027",
"/Creator": "CubePDF",
"/Keywords": "",
"/ModDate": "D:20131007140609+09\u002700\u0027",
"/Producer": "GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 1150770,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 114
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0398_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0398_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "64f982137d635d4af726bca260821ca68d6bad505c1be5007734c0d1aed6ac9f",
"txt_hash": "888d3675f7f61ddf2857a5ee435c5476ee1e43b3f61193b05e5ff9ad5db510a7"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "cc9b1b33fc7f882929ae0d33ca65bd1381dc790fdae79154db81aa9e649082b1",
"txt_hash": "f04c3489d1dd4841ba26f8b6edce3a7e4f0c0b6ef9b1c707f478128ac748ff94"
}
},
"status": "archived"
}