TASKalfa MZ4000i, TASKalfa MZ3200i Series with Hard Disk, FAX System and Data Security Kit

CSV information ?

Status active
Valid from 19.10.2023
Valid until 19.10.2028
Scheme 🇸🇪 SE
Manufacturer KYOCERA Document Solutions Inc.
Category Multi-Function Devices
Security level
Protection profiles

Heuristics summary ?

Certificate ID: CSEC2022004

Certificate ?

Extracted keywords

Security level
EAL 1
Security Assurance Requirements (SAR)
ALC_FLR, ASE_SPD.1
Certificates
CSEC2022004
Evaluation facilities
Combitech AB

File metadata

Creation date D:20231019154446+02'00'
Modification date D:20231020083301+02'00'
Pages 1
Creator RICOH MP C4504ex
Producer RICOH MP C4504ex

Certification report ?

Extracted keywords

Protocols
TLS

Security level
EAL 1, EAL 1 augmented
Claims
T.UNAUTHORIZED_ACCESS, T.TSF_COMPROMISE, T.TSF_FAILURE, T.UNAUTHORIZED_UPDATE, T.NET_COMPROMISE, A.PHYSICAL, A.NETWORK, A.TRUSTED_ADMIN, A.TRAINED_USERS
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, ALC_CMC.1, ATE_IND.1, AVA_VAN.1, ASE_SPD.1, ASE_INT.1, ASE_ECD.1, ASE_TSS.1
Certificates
CSEC2022004
Evaluation facilities
Combitech AB

Side-channel analysis
malfunction

Standards
FIPS 140-2, ISO/IEC 17025, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Certification Report Kyocera TASKalfa4 HCDPP
Subject 22FMV4135-21
Author Jerry Johansson
Creation date D:20231016103535+02'00'
Modification date D:20231019145450+02'00'
Pages 18
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Security target ?

Extracted keywords

Symmetric Algorithms
AES, 3DES, HMAC, HMAC-SHA-256, HMAC-SHA-512
Asymmetric Algorithms
ECDSA, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-256, SHA-512, SHA-224, SHA-384, SHA-2
Schemes
MAC
Protocols
SSH, TLS, IKEv1, IKEv2, IKE, IPsec
Randomness
DRBG, RNG, RBG
Elliptic Curves
P-256, P-384, P-521
Block cipher modes
CBC, GCM, XTS

Vendor
Microsoft

Claims
D.USER, D.TSF, O.ACCESS_CONTROL, O.USER_AUTHORIZATION, O.ADMIN_ROLES, O.UPDATE_VERIFICATION, O.TSF_SELF_TEST, O.COMMS_PROTECTION, O.AUDIT, O.STORAGE_ENCRYPTION, O.KEY_MATERIAL, O.FAX_NET_SEPARATION, O.IMAGE_OVERWRITE, O.ACCESS_, O.PURGE_DATA, O.STORAGE_EXCRYPTION, T.UNAUTHORIZED_ACCESS, T.TSF_COMPROMISE, T.TSF_FAILURE, T.UNAUTHORIZED_UPDATE, T.NET_COMPROMISE, A.PHYSICAL, A.NETWORK, A.TRUSTED_ADMIN, A.TRAINED_USERS, OE.PHYSICAL_PROTECTION, OE.NETWORK_PROTECTION, OE.ADMIN_TRUST, OE.USER_TRAINING, OE.ADMIN_TRAINING
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_STG_EXT.1, FAU_GEN, FAU_GEN.1, FAU_STG_EXT.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FCS_CKM_EXT, FCS_KDF_EXT, FCS_KYC_EXT, FCS_RBG_EXT, FCS_CKM_EXT.4, FCS_CKM.1, FCS_CKM.4, FCS_CKM_EXT.4.1, FCS_COP.1, FCS_RBG_EXT.1, FCS_KDF_EXT.1, FCS_KDF_EXT.1.1, FCS_KYC_EXT.1, FCS_SMC_EXT.1, FCS_KYC_EXT.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM.2, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_TLS_EXT.1, FCS_SSH_EXT.1, FCS_SNI_EXT.1.1, FCS_PCC_EXT.1, FDP_DSK_EXT, FDP_FXS_EXT, FDP_DSK_EXT.1, FDP_DSK_EXT.1.1, FDP_DSK_EXT.1.2, FDP_FXS_EXT.1, FDP_FXS_EXT.1.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_IFC.1, FDP_RIP.1, FDP_RIP.1.1, FIA_PMG_EXT, FIA_PSK_EXT, FIA_PSK_EXT.1, FIA_PMG_EXT.1, FIA_PMG_EXT.1.1, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_PSK_EXT.1.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_KYP_EXT, FPT_SKP_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_KYP_EXT.1, FPT_KYP_EXT.1.1, FPT_SKP_EXT.1, FPT_SKP_EXT.1.1, FPT_TST_EXT.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM.1, FPT_STM.1.1, FPT_TUD_EXP.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Side-channel analysis
malfunction

Standards
FIPS 140-2, FIPS PUB 186-4, FIPS PUB 197, FIPS PUB 198-1, FIPS PUB 180-3, FIPS 140, FIPS PUB 180-4, NIST SP 800-108, NIST SP 800-132, NIST SP 800-90A, NIST SP 800-38A, NIST SP 800-38B, NIST SP 800-38C, NIST SP 800-38D, RFC 4301, RFC 4303, RFC 3602, RFC 4106, RFC 4109, RFC 4304, RFC 4868, RFC 5282, RFC2409, ISO/IEC 18033-3, ISO/IEC 10116, ISO/IEC 19772, ISO/IEC 10118, ISO/IEC 18031:2011

File metadata

Title Security Target
Subject ISO15408認証対応資料
Author KDC
Creation date D:20231013105739+02'00'
Modification date D:20231019145726+02'00'
Pages 108
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics ?

Certificate ID: CSEC2022004

Extracted SARs

ADV_FSP.1, ALC_CMS.1, AGD_OPE.1, ASE_CCL.1, ASE_INT.1, AGD_PRE.1, ASE_SPD.1, ATE_IND.1, ASE_OBJ.1, ASE_ECD.1, AVA_VAN.1, ALC_CMC.1, ASE_REQ.1, ASE_TSS.1

Similar certificates

Name Certificate ID
TASKalfa MZ4000i, TASKalfa MZ3200i, TASKalfa M30040i, TASKalfa M30032i (KYOCERA), CS MZ4000i, CS MZ3200i (Copystar), 4063i, 3263i (TA Triumph Adler/UTAX) with Hard Disk and FAX System CSEC2022005 Compare
TASKalfa 3051ci, TASKalfa 3551ci, TASKalfa 4551ci, TASKalfa 5551ci, TASKalfa 3051ciG, TASKalfa 3551ciG, TASKalfa 4551ciG, TASKalfa 5551ciG, CS 3051ci, CS 3551ci, CS 4551ci, CS 5551ci, 3005ci, 3505ci, 4505ci, 5505ci with Data Security Kit (E), FAX System (W) System:2N4_2000.C02.013 Panel:2N4_7000.C02.010 FAX:3N6_5100.B04.001 JISEC-CC-CRP-C0441 Compare
TASKalfa 3501i, TASKalfa 4501i, TASKalfa 5501i, TASKalfa 3501iG, TASKalfa 4501iG, TASKalfa 5501iG, CS 3501i, CS 4501i, CS 5501i, 3555i, 4555i, 5555i with Data Security Kit (E), FAX System (W) System:2N9_2000.C02.201 Panel:2N4_7000.C02.010 FAX:3N6_5100.B04.001 JISEC-CC-CRP-C0444 Compare
TASKalfa 6052ci, TASKalfa 5052ci, TASKalfa 4052ci, TASKalfa 3552ci, TASKalfa 6052ciG, TASKalfa 5052ciG, TASKalfa 4052ciG(KYOCERA), CS 6052ci, CS 5052ci, CS 4052ci, CS 3552ci(Copystar), 6006ci, 5006ci, 4006ci(TA Triumph-Adler/UTAX) all of the above with Data Security Kit (E), FAX System 12 System: 2ND_20IS.C01.010HS Panel: 2ND_70IS.CI1.010 FAX: 3R2_5100.002.005 JISEC-CC-CRP-C0549 Compare
TASKalfa 6002i, TASKalfa 5002i, TASKalfa 4002i, TASKalfa 6002iG, TASKalfa 5002iG, TASKalfa 4002iG(KYOCERA), CS 6002i, CS 5002i, CS 4002i(Copystar), 6056i, 5056i, 4056i(TA Triumph-Adler/UTAX) all of the above with Data Security Kit (E), FAX System 12 System: 2NK_20IS.C01.010HS Panel: 2ND_70IS.CI1.010 FAX: 3R2_5100.002.005 JISEC-CC-CRP-C0548 Compare
TASKalfa 3010i, TASKalfa 3510i, TASKalfa 3010iG, TASKalfa 3510iG, CS 3010i, CS 3510i, 3060i, 3560i with Data Security Kit (E), FAX System (W) System:2NL_2000.C01.201 Panel:2NP_7000.C01.200 FAX:3N6_5100.B04.001 JISEC-CC-CRP-C0446 Compare
TASKalfa 6551ci, TASKalfa 7551ci, TASKalfa 6551ciG, TASKalfa 7551ciG, CS 6551ci, CS 7551ci, 6505ci, 7505ci with Data Security Kit (E), FAX System (W) System:2N2_2000.C02.201 Panel:2N4_7000.C02.010 FAX:3N6_5100.B04.001 JISEC-CC-CRP-C0464 Compare
TASKalfa 6501i, TASKalfa 8001i, TASKalfa 6501iG, TASKalfa 8001iG, CS 6501i, CS 8001i, 6555i, 8055i with Data Security Kit (E), FAX System (W) System:2N7_2000.C02.201 Panel:2N4_7000.C02.010 FAX:3N6_5100.B04.001 JISEC-CC-CRP-C0465 Compare
TASKalfa 8052ci, TASKalfa 7052ci, TASKalfa 8052ciG, TASKalfa 7052ciG(KYOCERA), CS 8052ci, CS 7052ci(Copystar), 8006ci, 7006ci(TA Triumph-Adler/UTAX) all of the above with Data Security Kit (E), FAX System 12 System: 2NH_20IS.C01.010HS Panel: 2ND_70IS.CM1.010 FAX: 3R2_5100.002.005 JISEC-CC-CRP-C0555 Compare
TASKalfa 8002i, TASKalfa 7002i, TASKalfa 8002iG, TASKalfa 7002iG(KYOCERA), CS 8002i, CS 7002i(Copystar), 8056i, 7056i(TA Triumph-Adler/UTAX) all of the above with Data Security Kit (E), FAX System 12 System: 2NJ_20IS.C01.010HS Panel: 2ND_70IS.CM1.010 FAX: 3R2_5100.002.005 JISEC-CC-CRP-C0554 Compare
TASKalfa 356ci, TASKalfa 406ci, TASKalfa 356ciG, TASKalfa 406ciG(KYOCERA), CS 356ci, CS 406ci(Copystar), 350ci, 400ci(TA Triumph-Adler/UTAX) all of the above with HD11, Data Security Kit (E) and FAX System 10 System:2R6_20IS.C01.011H Panel:2R6_70IS.C01.010 FAX:3R2_5100.001.009 JISEC-CC-CRP-C0531 Compare
TASKalfa 3511i, TASKalfa 3011i, TASKalfa 3511iG, TASKalfa 3011iG(KYOCERA), CS 3511i, CS 3011i(Copystar), 3561i, 3061i (TA Triumph-Adler/UTAX) all of the above with HD-12, Data Security Kit (E), FAX System 12 System: 2RH_20IS.C01.010HS Panel: 2ND_70IS. CT1.010 FAX: 3R2_5100.002.005 JISEC-CC-CRP-C0542 Compare
TASKalfa 3252ci, TASKalfa 2552ci, TASKalfa 3252ciG, TASKalfa 2552ciG(KYOCERA), CS 3252ci, CS 2552ci(Copystar), 3206ci, 2506ci(TA Triumph-Adler/UTAX) all of the above with HD-12, Data Security Kit (E), FAX System 12 System: 2RL_20IS.C01.010HS Panel: 2ND_70IS.C01.010 FAX: 3R2_5100.002.005 JISEC-CC-CRP-C0540 Compare
Kyocera TASKalfa 3554ci, 2554ci, 3554ciG, 2554ciG,Copystar CS 3554ci, CS 2554ci, Triumph Adler/UTAX 3508ci, and 2508ci with Hard Disk, FAX, and Data Security Kit with the following firmware:System firmware 2XD_S000.002.266FAX firmware 3R2_5100.003.012 CSEC2021004 Compare
Kyocera TASKalfa 7004i, 6004i, 5004i, 4004i, 7004iG, 6004iG, and 5004iG. Copystar CS 7004i, CS 6004i, CS 5004i, and CS 4004i. Triumph Adler/UTAX 7058i, 6058i, and 5058i with Hard Disk, FAX, and Data Security Kit and with the following firmware:System firmware 2XF_S000.002.333FAX firmware 3R2_5100.003.012 CSEC2021005 Compare
Kyocera TASKalfa 7054ci, 6054ci, 5054ci, 4054ci, 7054ciG, 6054ciG, 5054ciG,and 4054ciG, Copystar: CS 7054ci, CS 6054ci, CS 5054ci, and CS 4054ci. Triumph Adler/UTAX 7008ci, 6008ci, 5008ci, and 4008ci with Hard Disk, FAX, and Data Security Kit and with the following firmware:System firmware 2XC_S000.002.333FAX firmware 3R2_5100.003.012 CSEC2021006 Compare
Showing 5 out of 16.

References ?

No references are available for this certificate.

Updates ?

  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Hardcopy Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/c0553_pp.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_HCD_V1.0']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8e5a6d20cff3cd3561c0c57375c7adb7a070ca7cf8d7714317e02f846b90f9ee', 'txt_hash': '98c6ea305290a616d391a6b4e0734577f88f624f55d8bbeb6bcdc33549a461e9'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '115e23bebd070cda947b83cb6d9942e0bd31bc909b09a62e3ef4182c4c26320a', 'txt_hash': 'd05410f5cc3f0ed0ad32f1a9353b3fc000252125da97a53edf756927aa65a460'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2201211, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 108, '/Author': 'KDC', '/CreationDate': "D:20231013105739+02'00'", '/Creator': 'Microsoft® Word 2016', '/ModDate': "D:20231019145726+02'00'", '/Producer': 'Microsoft® Word 2016', '/Subject': 'ISO15408認証対応資料', '/Title': 'Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['file:///D:/ISO15408/拒果盩/HCD-PP/01.ST/ST_HCD-PP_TASKalfa7054ci_030.docx%23_Toc41663224', 'file:///D:/ISO15408/拒果盩/HCD-PP/01.ST/ST_HCD-PP_TASKalfa7054ci_030.docx%23_Toc41663222', 'file:///D:/ISO15408/拒果盩/HCD-PP/01.ST/ST_HCD-PP_TASKalfa7054ci_030.docx%23_Toc41663223']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 1926812, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20231019154446+02'00'", '/Creator': 'RICOH MP C4504ex', '/ModDate': "D:20231020083301+02'00'", '/Producer': 'RICOH MP C4504ex', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.1': 1, 'ALC_CMS.1': 1}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_REQ.1': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT': 3, 'FAU_STG_EXT.1': 6, 'FAU_GEN': 14, 'FAU_GEN.1': 9, 'FAU_STG_EXT.1.1': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 4, 'FAU_GEN.2.1': 1}, 'FCS': {'FCS_CKM_EXT': 3, 'FCS_KDF_EXT': 3, 'FCS_KYC_EXT': 4, 'FCS_RBG_EXT': 2, 'FCS_CKM_EXT.4': 27, 'FCS_CKM.1': 41, 'FCS_CKM.4': 9, 'FCS_CKM_EXT.4.1': 2, 'FCS_COP.1': 109, 'FCS_RBG_EXT.1': 33, 'FCS_KDF_EXT.1': 15, 'FCS_KDF_EXT.1.1': 3, 'FCS_KYC_EXT.1': 8, 'FCS_SMC_EXT.1': 7, 'FCS_KYC_EXT.1.1': 1, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 2, 'FCS_CKM.2': 2, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 6, 'FCS_TLS_EXT.1': 6, 'FCS_SSH_EXT.1': 6, 'FCS_SNI_EXT.1.1': 1, 'FCS_PCC_EXT.1': 1}, 'FDP': {'FDP_DSK_EXT': 2, 'FDP_FXS_EXT': 2, 'FDP_DSK_EXT.1': 9, 'FDP_DSK_EXT.1.1': 1, 'FDP_DSK_EXT.1.2': 1, 'FDP_FXS_EXT.1': 8, 'FDP_FXS_EXT.1.1': 1, 'FDP_ACF.1': 8, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5, 'FDP_ACC.1': 10, 'FDP_ACC.1.1': 1, 'FDP_IFC.1': 1, 'FDP_RIP.1': 4, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_PMG_EXT': 2, 'FIA_PSK_EXT': 2, 'FIA_PSK_EXT.1': 11, 'FIA_PMG_EXT.1': 7, 'FIA_PMG_EXT.1.1': 2, 'FIA_PSK_EXT.1.1': 3, 'FIA_PSK_EXT.1.2': 2, 'FIA_UAU.1': 9, 'FIA_UID.1': 13, 'FIA_AFL.1': 4, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 6, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.7': 4, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1': 4, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_PSK_EXT.1.3': 1}, 'FMT': {'FMT_SMF.1': 13, 'FMT_SMR.1': 13, 'FMT_MSA.3': 8, 'FMT_MOF.1': 4, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 5, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 4, 'FMT_MTD.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_KYP_EXT': 2, 'FPT_SKP_EXT': 2, 'FPT_TST_EXT': 2, 'FPT_TUD_EXT': 2, 'FPT_KYP_EXT.1': 7, 'FPT_KYP_EXT.1.1': 2, 'FPT_SKP_EXT.1': 7, 'FPT_SKP_EXT.1.1': 2, 'FPT_TST_EXT.1': 7, 'FPT_TST_EXT.1.1': 2, 'FPT_TUD_EXT.1': 4, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 3, 'FPT_STM.1': 7, 'FPT_STM.1.1': 1, 'FPT_TUD_EXP.1': 3}, 'FTA': {'FTA_SSL.3': 4, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 12, 'FTP_TRP.1': 9, 'FTP_ITC.1.1': 2, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 3, 'FTP_TRP.1.2': 2, 'FTP_TRP.1.3': 2}}, 'cc_claims': {'D': {'D.USER': 7, 'D.TSF': 8}, 'O': {'O.ACCESS_CONTROL': 10, 'O.USER_AUTHORIZATION': 10, 'O.ADMIN_ROLES': 8, 'O.UPDATE_VERIFICATION': 3, 'O.TSF_SELF_TEST': 3, 'O.COMMS_PROTECTION': 14, 'O.AUDIT': 7, 'O.STORAGE_ENCRYPTION': 6, 'O.KEY_MATERIAL': 3, 'O.FAX_NET_SEPARATION': 3, 'O.IMAGE_OVERWRITE': 3, 'O.ACCESS_': 1, 'O.PURGE_DATA': 2, 'O.STORAGE_EXCRYPTION': 3}, 'T': {'T.UNAUTHORIZED_ACCESS': 2, 'T.TSF_COMPROMISE': 2, 'T.TSF_FAILURE': 2, 'T.UNAUTHORIZED_UPDATE': 2, 'T.NET_COMPROMISE': 2}, 'A': {'A.PHYSICAL': 2, 'A.NETWORK': 2, 'A.TRUSTED_ADMIN': 2, 'A.TRAINED_USERS': 2}, 'OE': {'OE.PHYSICAL_PROTECTION': 2, 'OE.NETWORK_PROTECTION': 2, 'OE.ADMIN_TRUST': 2, 'OE.USER_TRAINING': 2, 'OE.ADMIN_TRAINING': 2}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 19}}, 'DES': {'3DES': {'3DES': 4}}, 'constructions': {'MAC': {'HMAC': 12, 'HMAC-SHA-256': 5, 'HMAC-SHA-512': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 4}}, 'FF': {'DH': {'DH': 10, 'Diffie-Hellman': 2}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 13}, 'SHA2': {'SHA-256': 18, 'SHA-512': 7, 'SHA-224': 2, 'SHA-384': 4, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 9}, 'TLS': {'TLS': {'TLS': 9}}, 'IKE': {'IKEv1': 27, 'IKEv2': 9, 'IKE': 4}, 'IPsec': {'IPsec': 47}}, 'randomness': {'PRNG': {'DRBG': 1}, 'RNG': {'RNG': 5, 'RBG': 5}}, 'cipher_mode': {'CBC': {'CBC': 5}, 'GCM': {'GCM': 4}, 'XTS': {'XTS': 7}}, 'ecc_curve': {'NIST': {'P-256': 4, 'P-384': 2, 'P-521': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 4, 'FIPS PUB 186-4': 7, 'FIPS PUB 197': 2, 'FIPS PUB 198-1': 1, 'FIPS PUB 180-3': 1, 'FIPS 140': 1, 'FIPS PUB 180-4': 1}, 'NIST': {'NIST SP 800-108': 4, 'NIST SP 800-132': 2, 'NIST SP 800-90A': 4, 'NIST SP 800-38A': 3, 'NIST SP 800-38B': 2, 'NIST SP 800-38C': 2, 'NIST SP 800-38D': 2}, 'RFC': {'RFC 4301': 2, 'RFC 4303': 2, 'RFC 3602': 10, 'RFC 4106': 6, 'RFC 4109': 3, 'RFC 4304': 4, 'RFC 4868': 7, 'RFC 5282': 3, 'RFC2409': 2}, 'ISO': {'ISO/IEC 18033-3': 2, 'ISO/IEC 10116': 4, 'ISO/IEC 19772': 4, 'ISO/IEC 10118': 4, 'ISO/IEC 18031:2011': 5}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'SE': {'CSEC2022004': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 1': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}, 'ASE': {'ASE_SPD.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Combitech': {'Combitech AB': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to ST_HCD-PP_TASKalfaMZ4000i_100.pdf.
    • The cert_filename property was set to CertCCRA-KyoceraTASKalfa4HCDPP.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9cf262186eae2f73080194d14299045b1b70fae4b6987a5dc11d5d9397b3b3b5', 'txt_hash': 'a39433513e9f4bd337fbcb878c0cdf7b9c715b5cff89a4e2b89ca7564088b88e'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 469640, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Author': 'Jerry Johansson', '/CreationDate': "D:20231016103535+02'00'", '/Creator': 'Microsoft® Word 2016', '/ModDate': "D:20231019145450+02'00'", '/Producer': 'Microsoft® Word 2016', '/Subject': '22FMV4135-21', '/Title': 'Certification Report Kyocera TASKalfa4 HCDPP', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'SE': {'CSEC2022004': 19}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 1': 2, 'EAL 1 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1}, 'ALC': {'ALC_CMC.1': 1}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 1}, 'ASE': {'ASE_SPD.1': 3, 'ASE_INT.1': 1, 'ASE_ECD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.UNAUTHORIZED_ACCESS': 1, 'T.TSF_COMPROMISE': 1, 'T.TSF_FAILURE': 1, 'T.UNAUTHORIZED_UPDATE': 1, 'T.NET_COMPROMISE': 1}, 'A': {'A.PHYSICAL': 1, 'A.NETWORK': 1, 'A.TRUSTED_ADMIN': 1, 'A.TRAINED_USERS': 1}}, 'vendor': {}, 'eval_facility': {'Combitech': {'Combitech AB': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}, 'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to CertificationReport-KyoceraTASKalfa4HCDPP.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CSEC2022004.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CertificationReport-KyoceraTASKalfa4HCDPP.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_HCD-PP_TASKalfaMZ4000i_100.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name TASKalfa MZ4000i, TASKalfa MZ3200i Series with Hard Disk, FAX System and Data Security Kit was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Multi-Function Devices",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CertCCRA-KyoceraTASKalfa4HCDPP.pdf",
  "dgst": "9de43052b6aa3a48",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CSEC2022004",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "KYOCERA Document Solutions Inc.",
  "manufacturer_web": "https://www.kyoceradocumentsolutions.com/",
  "name": "TASKalfa MZ4000i, TASKalfa MZ3200i Series with Hard Disk, FAX System and Data Security Kit",
  "not_valid_after": "2028-10-19",
  "not_valid_before": "2023-10-19",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "CertCCRA-KyoceraTASKalfa4HCDPP.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "SE": {
          "CSEC2022004": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1
        },
        "ASE": {
          "ASE_SPD.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Combitech": {
          "Combitech AB": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20231019154446+02\u002700\u0027",
      "/Creator": "RICOH MP C4504ex",
      "/ModDate": "D:20231020083301+02\u002700\u0027",
      "/Producer": "RICOH MP C4504ex",
      "pdf_file_size_bytes": 1926812,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "CertificationReport-KyoceraTASKalfa4HCDPP.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "SE": {
          "CSEC2022004": 19
        }
      },
      "cc_claims": {
        "A": {
          "A.NETWORK": 1,
          "A.PHYSICAL": 1,
          "A.TRAINED_USERS": 1,
          "A.TRUSTED_ADMIN": 1
        },
        "T": {
          "T.NET_COMPROMISE": 1,
          "T.TSF_COMPROMISE": 1,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNAUTHORIZED_UPDATE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1
        },
        "ASE": {
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 2,
          "EAL 1 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Combitech": {
          "Combitech AB": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 1
        },
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Jerry Johansson",
      "/CreationDate": "D:20231016103535+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20231019145450+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "22FMV4135-21",
      "/Title": "Certification Report Kyocera TASKalfa4 HCDPP",
      "pdf_file_size_bytes": 469640,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "ST_HCD-PP_TASKalfaMZ4000i_100.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "DH": 10,
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NETWORK": 2,
          "A.PHYSICAL": 2,
          "A.TRAINED_USERS": 2,
          "A.TRUSTED_ADMIN": 2
        },
        "D": {
          "D.TSF": 8,
          "D.USER": 7
        },
        "O": {
          "O.ACCESS_": 1,
          "O.ACCESS_CONTROL": 10,
          "O.ADMIN_ROLES": 8,
          "O.AUDIT": 7,
          "O.COMMS_PROTECTION": 14,
          "O.FAX_NET_SEPARATION": 3,
          "O.IMAGE_OVERWRITE": 3,
          "O.KEY_MATERIAL": 3,
          "O.PURGE_DATA": 2,
          "O.STORAGE_ENCRYPTION": 6,
          "O.STORAGE_EXCRYPTION": 3,
          "O.TSF_SELF_TEST": 3,
          "O.UPDATE_VERIFICATION": 3,
          "O.USER_AUTHORIZATION": 10
        },
        "OE": {
          "OE.ADMIN_TRAINING": 2,
          "OE.ADMIN_TRUST": 2,
          "OE.NETWORK_PROTECTION": 2,
          "OE.PHYSICAL_PROTECTION": 2,
          "OE.USER_TRAINING": 2
        },
        "T": {
          "T.NET_COMPROMISE": 2,
          "T.TSF_COMPROMISE": 2,
          "T.TSF_FAILURE": 2,
          "T.UNAUTHORIZED_ACCESS": 2,
          "T.UNAUTHORIZED_UPDATE": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 14,
          "FAU_GEN.1": 9,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 4,
          "FAU_GEN.2.1": 1,
          "FAU_STG_EXT": 3,
          "FAU_STG_EXT.1": 6,
          "FAU_STG_EXT.1.1": 2
        },
        "FCS": {
          "FCS_CKM.1": 41,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 9,
          "FCS_CKM.4.1": 1,
          "FCS_CKM_EXT": 3,
          "FCS_CKM_EXT.4": 27,
          "FCS_CKM_EXT.4.1": 2,
          "FCS_COP.1": 109,
          "FCS_COP.1.1": 6,
          "FCS_KDF_EXT": 3,
          "FCS_KDF_EXT.1": 15,
          "FCS_KDF_EXT.1.1": 3,
          "FCS_KYC_EXT": 4,
          "FCS_KYC_EXT.1": 8,
          "FCS_KYC_EXT.1.1": 1,
          "FCS_PCC_EXT.1": 1,
          "FCS_RBG_EXT": 2,
          "FCS_RBG_EXT.1": 33,
          "FCS_RBG_EXT.1.1": 2,
          "FCS_RBG_EXT.1.2": 2,
          "FCS_SMC_EXT.1": 7,
          "FCS_SNI_EXT.1.1": 1,
          "FCS_SSH_EXT.1": 6,
          "FCS_TLS_EXT.1": 6
        },
        "FDP": {
          "FDP_ACC.1": 10,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 8,
          "FDP_DSK_EXT": 2,
          "FDP_DSK_EXT.1": 9,
          "FDP_DSK_EXT.1.1": 1,
          "FDP_DSK_EXT.1.2": 1,
          "FDP_FXS_EXT": 2,
          "FDP_FXS_EXT.1": 8,
          "FDP_FXS_EXT.1.1": 1,
          "FDP_IFC.1": 1,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 5,
          "FDP_RIP.1": 4,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 4,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_PMG_EXT": 2,
          "FIA_PMG_EXT.1": 7,
          "FIA_PMG_EXT.1.1": 2,
          "FIA_PSK_EXT": 2,
          "FIA_PSK_EXT.1": 11,
          "FIA_PSK_EXT.1.1": 3,
          "FIA_PSK_EXT.1.2": 2,
          "FIA_PSK_EXT.1.3": 1,
          "FIA_UAU.1": 9,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.7": 4,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 13,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 4,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 4,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 5,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 8,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 4,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 13,
          "FMT_SMR.1": 13,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_KYP_EXT": 2,
          "FPT_KYP_EXT.1": 7,
          "FPT_KYP_EXT.1.1": 2,
          "FPT_SKP_EXT": 2,
          "FPT_SKP_EXT.1": 7,
          "FPT_SKP_EXT.1.1": 2,
          "FPT_STM.1": 7,
          "FPT_STM.1.1": 1,
          "FPT_TST_EXT": 2,
          "FPT_TST_EXT.1": 7,
          "FPT_TST_EXT.1.1": 2,
          "FPT_TUD_EXP.1": 3,
          "FPT_TUD_EXT": 2,
          "FPT_TUD_EXT.1": 4,
          "FPT_TUD_EXT.1.1": 2,
          "FPT_TUD_EXT.1.2": 2,
          "FPT_TUD_EXT.1.3": 3
        },
        "FTA": {
          "FTA_SSL.3": 4,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 12,
          "FTP_ITC.1.1": 2,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 9,
          "FTP_TRP.1.1": 3,
          "FTP_TRP.1.2": 2,
          "FTP_TRP.1.3": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "GCM": {
          "GCM": 4
        },
        "XTS": {
          "XTS": 7
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 4,
          "IKEv1": 27,
          "IKEv2": 9
        },
        "IPsec": {
          "IPsec": 47
        },
        "SSH": {
          "SSH": 9
        },
        "TLS": {
          "TLS": {
            "TLS": 9
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 4,
          "P-384": 2,
          "P-521": 2
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 13
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 2,
            "SHA-256": 18,
            "SHA-384": 4,
            "SHA-512": 7
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 1
        },
        "RNG": {
          "RBG": 5,
          "RNG": 5
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 3
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140": 1,
          "FIPS 140-2": 4,
          "FIPS PUB 180-3": 1,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 7,
          "FIPS PUB 197": 2,
          "FIPS PUB 198-1": 1
        },
        "ISO": {
          "ISO/IEC 10116": 4,
          "ISO/IEC 10118": 4,
          "ISO/IEC 18031:2011": 5,
          "ISO/IEC 18033-3": 2,
          "ISO/IEC 19772": 4
        },
        "NIST": {
          "NIST SP 800-108": 4,
          "NIST SP 800-132": 2,
          "NIST SP 800-38A": 3,
          "NIST SP 800-38B": 2,
          "NIST SP 800-38C": 2,
          "NIST SP 800-38D": 2,
          "NIST SP 800-90A": 4
        },
        "RFC": {
          "RFC 3602": 10,
          "RFC 4106": 6,
          "RFC 4109": 3,
          "RFC 4301": 2,
          "RFC 4303": 2,
          "RFC 4304": 4,
          "RFC 4868": 7,
          "RFC 5282": 3,
          "RFC2409": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19
          }
        },
        "DES": {
          "3DES": {
            "3DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 12,
            "HMAC-SHA-256": 5,
            "HMAC-SHA-512": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "KDC",
      "/CreationDate": "D:20231013105739+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20231019145726+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "ISO15408\u8a8d\u8a3c\u5bfe\u5fdc\u8cc7\u6599",
      "/Title": "Security Target",
      "pdf_file_size_bytes": 2201211,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "file:///D:/ISO15408/\u00e6\u2039\u2019\u00e6\u017e\u0153\u00e7\u203a\u00a9/HCD-PP/01.ST/ST_HCD-PP_TASKalfa7054ci_030.docx%23_Toc41663222",
          "file:///D:/ISO15408/\u00e6\u2039\u2019\u00e6\u017e\u0153\u00e7\u203a\u00a9/HCD-PP/01.ST/ST_HCD-PP_TASKalfa7054ci_030.docx%23_Toc41663223",
          "file:///D:/ISO15408/\u00e6\u2039\u2019\u00e6\u017e\u0153\u00e7\u203a\u00a9/HCD-PP/01.ST/ST_HCD-PP_TASKalfa7054ci_030.docx%23_Toc41663224"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 108
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PP_HCD_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/c0553_pp.pdf",
        "pp_name": "Protection Profile for Hardcopy Devices"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CertificationReport-KyoceraTASKalfa4HCDPP.pdf",
  "scheme": "SE",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_HCD-PP_TASKalfaMZ4000i_100.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "115e23bebd070cda947b83cb6d9942e0bd31bc909b09a62e3ef4182c4c26320a",
      "txt_hash": "d05410f5cc3f0ed0ad32f1a9353b3fc000252125da97a53edf756927aa65a460"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9cf262186eae2f73080194d14299045b1b70fae4b6987a5dc11d5d9397b3b3b5",
      "txt_hash": "a39433513e9f4bd337fbcb878c0cdf7b9c715b5cff89a4e2b89ca7564088b88e"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "8e5a6d20cff3cd3561c0c57375c7adb7a070ca7cf8d7714317e02f846b90f9ee",
      "txt_hash": "98c6ea305290a616d391a6b4e0734577f88f624f55d8bbeb6bcdc33549a461e9"
    }
  },
  "status": "active"
}