AR-FR12M Version M.20

CSV information ?

Status archived
Valid from 11.03.2005
Valid until 07.10.2013
Scheme 🇯🇵 JP
Manufacturer Sharp Corporation
Category Other Devices and Systems
Security level ADV_SPM.1, EAL3+

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0022-01

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, Rijndael

Security level
EAL3, EAL3 augmented
Claims
T.RECOVER, A.OPERATOR
Security Assurance Requirements (SAR)
ADV_SPM.1, ADV_SPM
Certificates
CRP-C0022-01, Certification No. C0022
Evaluation facilities
Information Technology Security Center

Standards
ISO/IEC 15408:1999, CCIMB-99-032, CCIMB-99-033, CCIMB-99-031

File metadata

Title CRP-C0022-01_e
Author IPA/JISEC
Creation date D:20050518144032+09'00'
Modification date D:20050518144205+09'00'
Pages 27
Creator Word 用 Acrobat PDFMaker 6.0
Producer Acrobat Distiller 6.0.1 (Windows)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, Rijndael

Security level
EAL3
Claims
O.RESIDUAL, O.REMOVE, T.RECOVER, A.OPERATOR, OE.OPERATE, OE.ERASEALL
Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_SPM.1, ADV_FSP.1, ADV_RCR.1, ADV_HLD.1, ADV_HLD.2, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1, AVA_MCU.1
Security Functional Requirements (SFR)
FCS_CKM.4, FCS_CKM.1, FCS_COP.1, FCS_CKM.1.1, FCS_COP.1.1, FDP_ACC.1, FDP_RIP.1, FDP_RIP.1.1, FDP_IFC.1, FIA_UAU.2, FIA_UAU.7, FIA_UID.2, FIA_SOS.1, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_SOS.1.1, FMT_MSA.1, FMT_MOF.1, FMT_MSA.2, FMT_MTD.1, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA.2.1, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_RVM.1, FPT_RVM.1, FPT_RVM.1.1

Standards
FIPS PUB 197, ISO/IEC 15408:1999, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title ST
Subject C0022
Author SHARP Corporation
Creation date D:20050518145955+09'00'
Modification date D:20050518150808+09'00'
Pages 34
Creator Word 用 Acrobat PDFMaker 6.0
Producer Acrobat Distiller 6.0.1 (Windows)

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0022-01

Extracted SARs

ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MCU.1, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1

Scheme data ?

Cert Id JISEC-CC-CRP-C0022
Supplier Sharp Corporation
Toe Overseas Name AR-FR12M VERSION M.20
Expiration Date 01.10.2013
Claim EAL3+ ADV_SPM.1
Certification Date 01.03.2005
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0022_it4028.html
Toe Japan Name AR-FR12M VERSION M.20
Enhanced
Product AR-FR12M
Toe Version VERSION M.20
Product Type product (Data protection function inside digital MFD)
Assurance Level EAL3 + ADV_SPM.1
Vendor Sharp Corporation
Evaluation Facility Japan Electronics and Information Technology Industries Association, Information Technology security center (JEITA ITSC)
Target Link https://www.ipa.go.jp/en/security/c0022_est.pdf
Report Link https://www.ipa.go.jp/en/security/c0022_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/c0022_eimg.pdf
Description PRODUCT DESCRIPTION TOE is a firmware that aims to prevent disclosure of real image data stored temporarily in Mass Storage Device (hereafter referred to as MSD), which are specified for every functional unit configuration of Multi Function Device (hereafter referred to as MFD). TOE is provided as a kit of upgrading firmware of MFD. TOE executes encryption before the real image data are spooled in MSD, when the MFD functions like PCFAX, FAX transmission or FAX receiving are performed. It also clears spool data area in MSD after the jobs like copying, printing, SCAN transmission, PCFAX, FAX transmission or FAX receiving are completed. These encryption function and data erasing function ensure the confidentiality of real image data that are stored temporarily in MSD and counter fraudulent readout of them.

References ?

No references are available for this certificate.

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'JISEC-CC-CRP-C0022', 'toe_overseas_name': 'AR-FR12M VERSION M.20', 'expiration_date': '2013-10-01', 'claim': 'EAL3+ ADV_SPM.1', 'certification_date': '2005-03-01', 'toe_japan_name': 'AR-FR12M VERSION M.20', 'enhanced': {'__update__': {'description': 'PRODUCT DESCRIPTION TOE is a firmware that aims to prevent disclosure of real image data stored temporarily in Mass Storage Device (hereafter referred to as MSD), which are specified for every functional unit configuration of Multi Function Device (hereafter referred to as MFD). TOE is provided as a kit of upgrading firmware of MFD. TOE executes encryption before the real image data are spooled in MSD, when the MFD functions like PCFAX, FAX transmission or FAX receiving are performed. It also clears spool data area in MSD after the jobs like copying, printing, SCAN transmission, PCFAX, FAX transmission or FAX receiving are completed. These encryption function and data erasing function ensure the confidentiality of real image data that are stored temporarily in MSD and counter fraudulent readout of them.'}, '__delete__': ['certification_date']}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'C0022', 'supplier': 'Sharp Corporation', 'toe_overseas_name': 'AR-FR12M\n VERSION M.20', 'expiration_date': '2013-10', 'claim': 'EAL3+ \n ADV_SPM.1', 'certification_date': '2005-03', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0022_it4028.html', 'toe_japan_name': 'AR-FR12M\n VERSION M.20', 'enhanced': {'product': 'AR-FR12M', 'toe_version': 'VERSION M.20', 'product_type': 'product (Data protection function inside digital MFD)', 'certification_date': '2005-03-11', 'assurance_level': 'EAL3 + ADV_SPM.1', 'vendor': 'Sharp Corporation', 'evaluation_facility': 'Japan Electronics and Information Technology Industries Association, Information Technology security center (JEITA ITSC)', 'target_link': 'https://www.ipa.go.jp/en/security/c0022_est.pdf', 'report_link': 'https://www.ipa.go.jp/en/security/c0022_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0022_eimg.pdf', 'description': 'PRODUCT DESCRIPTION \n TOE is a firmware that aims to prevent disclosure of real image data stored temporarily in Mass Storage Device (hereafter referred to as MSD), which are specified for every functional unit configuration of Multi Function Device (hereafter referred to as MFD). TOE is provided as a kit of upgrading firmware of MFD. \n TOE executes encryption before the real image data are spooled in MSD, when the MFD functions like PCFAX, FAX transmission or FAX receiving are performed. It also clears spool data area in MSD after the jobs like copying, printing, SCAN transmission, PCFAX, FAX transmission or FAX receiving are completed. These encryption function and data erasing function ensure the confidentiality of real image data that are stored temporarily in MSD and counter fraudulent readout of them.'}}.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9c561288ac491543935454cc04f2257d6c78049fdf3fd571d502d8cba3b11963', 'txt_hash': '13647dcb3abe51290f790d4da0ca3e945d4725e3df03ef82d5514faf60f06335'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e7fa69412216fe7b9acf402b8121aaefbcf40253d310b0ef828166d0dc1c1723', 'txt_hash': '8a5076f35aa9ddab05333cab4a468bc5256f336dee3d5a5ece402949ef1699b7'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 213209, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 27, '/ModDate': "D:20050518144205+09'00'", '/CreationDate': "D:20050518144032+09'00'", '/Title': 'CRP-C0022-01_e', '/Creator': 'Word 用 Acrobat PDFMaker 6.0', '/Producer': 'Acrobat Distiller 6.0.1 (Windows)', '/Author': 'IPA/JISEC', '/Company': 'IPA', '/Manager': 'IPA', '/SourceModified': 'D:20050518054022', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 664695, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 34, '/ModDate': "D:20050518150808+09'00'", '/CreationDate': "D:20050518145955+09'00'", '/Title': 'ST', '/Creator': 'Word 用 Acrobat PDFMaker 6.0', '/Author': 'SHARP Corporation', '/Subject': 'C0022', '/Producer': 'Acrobat Distiller 6.0.1 (Windows)', '/Company': 'SHARP Corporation', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0022-01': 1, 'Certification No. C0022': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 2, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 1, 'ADV_SPM': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.RECOVER': 1}, 'A': {'A.OPERATOR': 1}}, 'vendor': {}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}, 'Rijndael': {'Rijndael': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:1999': 1}, 'CC': {'CCIMB-99-032': 2, 'CCIMB-99-033': 2, 'CCIMB-99-031': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 2}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 4, 'ACM_SCP.1': 4}, 'ADO': {'ADO_DEL.1': 3, 'ADO_IGS.1': 4}, 'ADV': {'ADV_SPM.1': 12, 'ADV_FSP.1': 12, 'ADV_RCR.1': 4, 'ADV_HLD.1': 3, 'ADV_HLD.2': 1}, 'AGD': {'AGD_ADM.1': 7, 'AGD_USR.1': 6}, 'ALC': {'ALC_DVS.1': 4}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 4, 'ATE_IND.2': 3, 'ATE_DPT.1': 2}, 'AVA': {'AVA_MSU.1': 2, 'AVA_SOF.1': 3, 'AVA_VLA.1': 3, 'AVA_MCU.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.4': 6, 'FCS_CKM.1': 15, 'FCS_COP.1': 15, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 5, 'FDP_RIP.1': 13, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_UAU.2': 20, 'FIA_UAU.7': 15, 'FIA_UID.2': 15, 'FIA_SOS.1': 16, 'FIA_UAU.1': 3, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 5, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA.1': 5, 'FMT_MOF.1': 16, 'FMT_MSA.2': 17, 'FMT_MTD.1': 13, 'FMT_SMR.1': 16, 'FMT_SMF.1': 15, 'FMT_MOF.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_RVM.1': 1}, 'FPT': {'FPT_RVM.1': 17, 'FPT_RVM.1.1': 1}}, 'cc_claims': {'O': {'O.RESIDUAL': 8, 'O.REMOVE': 6}, 'T': {'T.RECOVER': 5}, 'A': {'A.OPERATOR': 5}, 'OE': {'OE.OPERATE': 3, 'OE.ERASEALL': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}, 'Rijndael': {'Rijndael': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 2}, 'ISO': {'ISO/IEC 15408:1999': 1}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to c0022_erpt.pdf.
    • The st_filename property was set to c0022_est.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0022-01.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MCU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_erpt.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_est.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MCU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name AR-FR12M Version M.20 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "8a35a1a0f9dabc51",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0022-01",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MCU",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "20"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "JISEC-CC-CRP-C0022",
      "certification_date": "2005-03-01",
      "claim": "EAL3+ ADV_SPM.1",
      "enhanced": {
        "assurance_level": "EAL3 + ADV_SPM.1",
        "cert_link": "https://www.ipa.go.jp/en/security/c0022_eimg.pdf",
        "description": "PRODUCT DESCRIPTION TOE is a firmware that aims to prevent disclosure of real image data stored temporarily in Mass Storage Device (hereafter referred to as MSD), which are specified for every functional unit configuration of Multi Function Device (hereafter referred to as MFD). TOE is provided as a kit of upgrading firmware of MFD. TOE executes encryption before the real image data are spooled in MSD, when the MFD functions like PCFAX, FAX transmission or FAX receiving are performed. It also clears spool data area in MSD after the jobs like copying, printing, SCAN transmission, PCFAX, FAX transmission or FAX receiving are completed. These encryption function and data erasing function ensure the confidentiality of real image data that are stored temporarily in MSD and counter fraudulent readout of them.",
        "evaluation_facility": "Japan Electronics and Information Technology Industries Association, Information Technology security center (JEITA ITSC)",
        "product": "AR-FR12M",
        "product_type": "product (Data protection function inside digital MFD)",
        "report_link": "https://www.ipa.go.jp/en/security/c0022_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0022_est.pdf",
        "toe_version": "VERSION M.20",
        "vendor": "Sharp Corporation"
      },
      "expiration_date": "2013-10-01",
      "supplier": "Sharp Corporation",
      "toe_japan_name": "AR-FR12M VERSION M.20",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0022_it4028.html",
      "toe_overseas_name": "AR-FR12M VERSION M.20"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sharp Corporation",
  "manufacturer_web": "https://sharp-world.com/",
  "name": "AR-FR12M Version M.20",
  "not_valid_after": "2013-10-07",
  "not_valid_before": "2005-03-11",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0022_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0022-01": 1,
          "Certification No. C0022": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.OPERATOR": 1
        },
        "T": {
          "T.RECOVER": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_SPM": 1,
          "ADV_SPM.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 2,
          "EAL3 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "ITSC": {
          "Information Technology Security Center": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 2,
          "CCIMB-99-033": 2
        },
        "ISO": {
          "ISO/IEC 15408:1999": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          },
          "Rijndael": {
            "Rijndael": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "IPA/JISEC",
      "/Company": "IPA",
      "/CreationDate": "D:20050518144032+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 6.0",
      "/Manager": "IPA",
      "/ModDate": "D:20050518144205+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0.1 (Windows)",
      "/SourceModified": "D:20050518054022",
      "/Title": "CRP-C0022-01_e",
      "pdf_file_size_bytes": 213209,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 27
    },
    "st_filename": "c0022_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.OPERATOR": 5
        },
        "O": {
          "O.REMOVE": 6,
          "O.RESIDUAL": 8
        },
        "OE": {
          "OE.ERASEALL": 3,
          "OE.OPERATE": 3
        },
        "T": {
          "T.RECOVER": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.3": 4,
          "ACM_SCP.1": 4
        },
        "ADO": {
          "ADO_DEL.1": 3,
          "ADO_IGS.1": 4
        },
        "ADV": {
          "ADV_FSP.1": 12,
          "ADV_HLD.1": 3,
          "ADV_HLD.2": 1,
          "ADV_RCR.1": 4,
          "ADV_SPM.1": 12
        },
        "AGD": {
          "AGD_ADM.1": 7,
          "AGD_USR.1": 6
        },
        "ALC": {
          "ALC_DVS.1": 4
        },
        "ATE": {
          "ATE_COV.2": 3,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 4,
          "ATE_IND.2": 3
        },
        "AVA": {
          "AVA_MCU.1": 1,
          "AVA_MSU.1": 2,
          "AVA_SOF.1": 3,
          "AVA_VLA.1": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 2
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 15,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.4": 6,
          "FCS_COP.1": 15,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 5,
          "FDP_IFC.1": 1,
          "FDP_RIP.1": 13,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_SOS.1": 16,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 3,
          "FIA_UAU.2": 20,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.7": 15,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 5,
          "FIA_UID.2": 15,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 16,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 5,
          "FMT_MSA.2": 17,
          "FMT_MSA.2.1": 1,
          "FMT_MTD.1": 13,
          "FMT_MTD.1.1": 1,
          "FMT_RVM.1": 1,
          "FMT_SMF.1": 15,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 16,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_RVM.1": 17,
          "FPT_RVM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        },
        "FIPS": {
          "FIPS PUB 197": 2
        },
        "ISO": {
          "ISO/IEC 15408:1999": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4
          },
          "Rijndael": {
            "Rijndael": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "SHARP Corporation",
      "/Company": "SHARP Corporation",
      "/CreationDate": "D:20050518145955+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 6.0",
      "/ModDate": "D:20050518150808+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0.1 (Windows)",
      "/Subject": "C0022",
      "/Title": "ST",
      "pdf_file_size_bytes": 664695,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 34
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ADV_SPM.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9c561288ac491543935454cc04f2257d6c78049fdf3fd571d502d8cba3b11963",
      "txt_hash": "13647dcb3abe51290f790d4da0ca3e945d4725e3df03ef82d5514faf60f06335"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e7fa69412216fe7b9acf402b8121aaefbcf40253d310b0ef828166d0dc1c1723",
      "txt_hash": "8a5076f35aa9ddab05333cab4a468bc5256f336dee3d5a5ece402949ef1699b7"
    }
  },
  "status": "archived"
}