AR-FR11 VERSION M.20

CSV information ?

Status archived
Valid from 03.06.2005
Valid until 07.10.2013
Scheme 🇯🇵 JP
Manufacturer Sharp Corporation
Category Other Devices and Systems
Security level EAL3

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0026

Certificate ?

Certification report ?

Extracted keywords

Security level
EAL3
Claims
T.RECOVER, T.SHUNT, T.SPOOF, A.NETWORK, A.OPERATOR, A.USER
Certificates
CRP-C0026-01, Certification No. C0026

Standards
ISO/IEC 15408:1999, CCIMB-99-032, CCIMB-99-033, CCIMB-99-031

File metadata

Title CRP-e
Subject C0026
Author IPA/JISEC
Creation date D:20050715113927+09'00'
Modification date D:20050715114102+09'00'
Pages 26
Creator Word 用 Acrobat PDFMaker 6.0
Producer Acrobat Distiller 6.0 (Windows)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, Rijndael

Vendor
Microsoft

Security level
EAL3
Claims
O.RESIDUAL, O.REMOVE, O.MANAGE, O.NSP, O.UAU, T.RECOVER, T.SHUNT, T.SPOOF, A.NETWORK, A.OPERATOR, A.USER, OE.BROWSER, OE.CIPHER, OE.CLIENT, OE.FIREWALL, OE.OPERATE, OE.USER
Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_RCR.1, ADV_HLD.1, ADV_HLD.2, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1
Security Functional Requirements (SFR)
FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1, FDP_ITC.1, FDP_RIP.1.1, FDP_RIP.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.1, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.6, FIA_UAU.7, FIA_UID.2, FMT_MSA.2, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_MTD.1, FPR_RVM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_RVM.1, FPT_SEP.1

Standards
FIPS PUB 197, ISO/IEC 15408:1999, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title Security Target AR-FR11 M.20
Subject [DSK_ST]
Author K.Nakagawa
Creation date D:20050526193729+09'00'
Modification date D:20050526194843+09'00'
Pages 45
Creator Word 用 Acrobat PDFMaker 6.0
Producer Acrobat Distiller 6.0 (Windows)

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0026

Extracted SARs

ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1

Scheme data ?

Cert Id JISEC-CC-CRP-C0026
Supplier Sharp Corporation
Toe Overseas Name AR-FR11 VERSION M.20
Expiration Date 01.10.2013
Claim EAL3
Certification Date 01.06.2005
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0026_it4031.html
Toe Japan Name AR-FR11 VERSION M.20
Enhanced
Product AR-FR11
Toe Version VERSION M.20
Product Type IT Product ( data protection function in Multi Function Device )
Assurance Level EAL3
Vendor Sharp Corporation
Evaluation Facility Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
Target Link https://www.ipa.go.jp/en/security/c0026_est.pdf
Report Link https://www.ipa.go.jp/en/security/c0026_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/c0026_eimg.pdf
Description PRODUCT DESCRIPTION The TOE is a firmware product for a Multi Function Device (hereafter referred as to “MFD”) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD. The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD. The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the fundamental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by overwriting. In addition, the TOE offers encryption and password authentication for image data that a user saves into the HDD to reuse later. By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure.

References ?

No references are available for this certificate.

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'JISEC-CC-CRP-C0026', 'supplier': 'Sharp Corporation', 'toe_overseas_name': 'AR-FR11 VERSION M.20', 'expiration_date': '2013-10-01', 'certification_date': '2005-06-01', 'toe_japan_name': 'AR-FR11 VERSION M.20', 'enhanced': {'__update__': {'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'description': 'PRODUCT DESCRIPTION The TOE is a firmware product for a Multi Function Device (hereafter referred as to “MFD”) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD. The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD. The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the fundamental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by overwriting. In addition, the TOE offers encryption and password authentication for image data that a user saves into the HDD to reuse later. By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure.'}, '__delete__': ['certification_date']}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'C0026', 'supplier': 'Sharp Corporation', 'toe_overseas_name': 'AR-FR11\n VERSION M.20', 'expiration_date': '2013-10', 'claim': 'EAL3', 'certification_date': '2005-06', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0026_it4031.html', 'toe_japan_name': 'AR-FR11\n VERSION M.20', 'enhanced': {'product': 'AR-FR11', 'toe_version': 'VERSION M.20', 'product_type': 'IT Product ( data protection function in Multi Function Device )', 'certification_date': '2005-06-03', 'assurance_level': 'EAL3', 'vendor': 'Sharp Corporation', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc.\n Center for Evaluation of Information Security', 'target_link': 'https://www.ipa.go.jp/en/security/c0026_est.pdf', 'report_link': 'https://www.ipa.go.jp/en/security/c0026_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0026_eimg.pdf', 'description': 'PRODUCT DESCRIPTION \n The TOE is a firmware product for a Multi Function Device (hereafter referred as to “MFD”) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD. \n The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD. \n The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the fundamental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by overwriting. \n In addition, the TOE offers encryption and password authentication for image data that a user saves into the HDD to reuse later. \n By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure.'}}.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a5ac1d887fbdcec65ed07904ffc23e79f29245f6a5ddd83950edbf4cdb08f5eb', 'txt_hash': '6823d6c1a9d35f5832b67141c9c420beb25dc41fc75d0ec1b6a5f909bffacafb'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6b6d7e4efcb627e4391e7c7b229910f423616891b2fde5e169e6d58d9dc6735b', 'txt_hash': 'bb4215b40fa714ce3ebc4490808af9136e3ffbaf0a31dbb382b889a529946df8'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 336328, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 26, '/ModDate': "D:20050715114102+09'00'", '/CreationDate': "D:20050715113927+09'00'", '/Title': 'CRP-e', '/Creator': 'Word 用 Acrobat PDFMaker 6.0', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'IPA/JISEC', '/Subject': 'C0026', '/Company': 'IPA', '/Manager': 'IPA', '/SourceModified': 'D:20050715023914', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1130755, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 45, '/ModDate': "D:20050526194843+09'00'", '/CreationDate': "D:20050526193729+09'00'", '/Title': 'Security Target AR-FR11 M.20', '/Creator': 'Word 用 Acrobat PDFMaker 6.0', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'K.Nakagawa', '/Subject': '[DSK_ST]', '/Company': 'SHARP Corporation', '/SourceModified': 'D:20050317081500', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0026-01': 1, 'Certification No. C0026': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.RECOVER': 1, 'T.SHUNT': 1, 'T.SPOOF': 1}, 'A': {'A.NETWORK': 1, 'A.OPERATOR': 1, 'A.USER': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:1999': 1}, 'CC': {'CCIMB-99-032': 2, 'CCIMB-99-033': 2, 'CCIMB-99-031': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 3, 'ACM_SCP.1': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 3}, 'ADV': {'ADV_FSP.1': 10, 'ADV_RCR.1': 3, 'ADV_HLD.1': 3, 'ADV_HLD.2': 1}, 'AGD': {'AGD_ADM.1': 6, 'AGD_USR.1': 5}, 'ALC': {'ALC_DVS.1': 3}, 'ATE': {'ATE_COV.2': 2, 'ATE_FUN.1': 4, 'ATE_IND.2': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_MSU.1': 2, 'AVA_SOF.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FCS': {'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 15, 'FCS_CKM.4': 6, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 13}, 'FDP': {'FDP_ITC.1': 2, 'FDP_RIP.1.1': 1, 'FDP_RIP.1': 11}, 'FIA': {'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_UAU.1': 13, 'FIA_SOS.1.1': 4, 'FIA_UAU.2.1': 3, 'FIA_UID.1': 15, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 2, 'FIA_UID.2.1': 3, 'FIA_AFL.1': 29, 'FIA_SOS.1': 30, 'FIA_UAU.2': 42, 'FIA_UAU.6': 10, 'FIA_UAU.7': 14, 'FIA_UID.2': 34}, 'FMT': {'FMT_MSA.2': 7, 'FMT_MOF.1.1': 1, 'FMT_SMF.1': 20, 'FMT_SMR.1': 43, 'FMT_MTD.1.1': 4, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 3, 'FMT_SMR.1.2': 3, 'FMT_MOF.1': 11, 'FMT_MTD.1': 35}, 'FPR': {'FPR_RVM.1': 6}, 'FPT': {'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_RVM.1': 16, 'FPT_SEP.1': 16}}, 'cc_claims': {'O': {'O.RESIDUAL': 6, 'O.REMOVE': 4, 'O.MANAGE': 7, 'O.NSP': 4, 'O.UAU': 7}, 'T': {'T.RECOVER': 5, 'T.SHUNT': 5, 'T.SPOOF': 5}, 'A': {'A.NETWORK': 5, 'A.OPERATOR': 5, 'A.USER': 4}, 'OE': {'OE.BROWSER': 6, 'OE.CIPHER': 3, 'OE.CLIENT': 5, 'OE.FIREWALL': 3, 'OE.OPERATE': 3, 'OE.USER': 3}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}, 'Rijndael': {'Rijndael': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}, 'ISO': {'ISO/IEC 15408:1999': 2}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to c0026_erpt.pdf.
    • The st_filename property was set to c0026_est.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0026.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0026_erpt.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0026_est.pdf.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name AR-FR11 VERSION M.20 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "c9de82256b541d9b",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0026",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "20"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "JISEC-CC-CRP-C0026",
      "certification_date": "2005-06-01",
      "claim": "EAL3",
      "enhanced": {
        "assurance_level": "EAL3",
        "cert_link": "https://www.ipa.go.jp/en/security/c0026_eimg.pdf",
        "description": "PRODUCT DESCRIPTION The TOE is a firmware product for a Multi Function Device (hereafter referred as to \u201cMFD\u201d) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD. The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD. The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the fundamental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by overwriting. In addition, the TOE offers encryption and password authentication for image data that a user saves into the HDD to reuse later. By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure.",
        "evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
        "product": "AR-FR11",
        "product_type": "IT Product ( data protection function in Multi Function Device )",
        "report_link": "https://www.ipa.go.jp/en/security/c0026_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0026_est.pdf",
        "toe_version": "VERSION M.20",
        "vendor": "Sharp Corporation"
      },
      "expiration_date": "2013-10-01",
      "supplier": "Sharp Corporation",
      "toe_japan_name": "AR-FR11 VERSION M.20",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0026_it4031.html",
      "toe_overseas_name": "AR-FR11 VERSION M.20"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sharp Corporation",
  "manufacturer_web": "https://sharp-world.com/",
  "name": "AR-FR11 VERSION M.20",
  "not_valid_after": "2013-10-07",
  "not_valid_before": "2005-06-03",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0026_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0026-01": 1,
          "Certification No. C0026": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.NETWORK": 1,
          "A.OPERATOR": 1,
          "A.USER": 1
        },
        "T": {
          "T.RECOVER": 1,
          "T.SHUNT": 1,
          "T.SPOOF": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL3": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 2,
          "CCIMB-99-033": 2
        },
        "ISO": {
          "ISO/IEC 15408:1999": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "IPA/JISEC",
      "/Company": "IPA",
      "/CreationDate": "D:20050715113927+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 6.0",
      "/Manager": "IPA",
      "/ModDate": "D:20050715114102+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/SourceModified": "D:20050715023914",
      "/Subject": "C0026",
      "/Title": "CRP-e",
      "pdf_file_size_bytes": 336328,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    },
    "st_filename": "c0026_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NETWORK": 5,
          "A.OPERATOR": 5,
          "A.USER": 4
        },
        "O": {
          "O.MANAGE": 7,
          "O.NSP": 4,
          "O.REMOVE": 4,
          "O.RESIDUAL": 6,
          "O.UAU": 7
        },
        "OE": {
          "OE.BROWSER": 6,
          "OE.CIPHER": 3,
          "OE.CLIENT": 5,
          "OE.FIREWALL": 3,
          "OE.OPERATE": 3,
          "OE.USER": 3
        },
        "T": {
          "T.RECOVER": 5,
          "T.SHUNT": 5,
          "T.SPOOF": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.3": 3,
          "ACM_SCP.1": 2
        },
        "ADO": {
          "ADO_DEL.1": 2,
          "ADO_IGS.1": 3
        },
        "ADV": {
          "ADV_FSP.1": 10,
          "ADV_HLD.1": 3,
          "ADV_HLD.2": 1,
          "ADV_RCR.1": 3
        },
        "AGD": {
          "AGD_ADM.1": 6,
          "AGD_USR.1": 5
        },
        "ALC": {
          "ALC_DVS.1": 3
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 4,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_MSU.1": 2,
          "AVA_SOF.1": 2,
          "AVA_VLA.1": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 4
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 13,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 6,
          "FCS_COP.1": 15,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ITC.1": 2,
          "FDP_RIP.1": 11,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 29,
          "FIA_AFL.1.1": 3,
          "FIA_AFL.1.2": 3,
          "FIA_SOS.1": 30,
          "FIA_SOS.1.1": 4,
          "FIA_UAU.1": 13,
          "FIA_UAU.2": 42,
          "FIA_UAU.2.1": 3,
          "FIA_UAU.6": 10,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 14,
          "FIA_UAU.7.1": 2,
          "FIA_UID.1": 15,
          "FIA_UID.2": 34,
          "FIA_UID.2.1": 3
        },
        "FMT": {
          "FMT_MOF.1": 11,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.2": 7,
          "FMT_MTD.1": 35,
          "FMT_MTD.1.1": 4,
          "FMT_SMF.1": 20,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 43,
          "FMT_SMR.1.1": 3,
          "FMT_SMR.1.2": 3
        },
        "FPR": {
          "FPR_RVM.1": 6
        },
        "FPT": {
          "FPT_RVM.1": 16,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 16,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        },
        "FIPS": {
          "FIPS PUB 197": 1
        },
        "ISO": {
          "ISO/IEC 15408:1999": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          },
          "Rijndael": {
            "Rijndael": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "K.Nakagawa",
      "/Company": "SHARP Corporation",
      "/CreationDate": "D:20050526193729+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 6.0",
      "/ModDate": "D:20050526194843+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/SourceModified": "D:20050317081500",
      "/Subject": "[DSK_ST]",
      "/Title": "Security Target AR-FR11 M.20",
      "pdf_file_size_bytes": 1130755,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 45
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0026_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0026_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a5ac1d887fbdcec65ed07904ffc23e79f29245f6a5ddd83950edbf4cdb08f5eb",
      "txt_hash": "6823d6c1a9d35f5832b67141c9c420beb25dc41fc75d0ec1b6a5f909bffacafb"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6b6d7e4efcb627e4391e7c7b229910f423616891b2fde5e169e6d58d9dc6735b",
      "txt_hash": "bb4215b40fa714ce3ebc4490808af9136e3ffbaf0a31dbb382b889a529946df8"
    }
  },
  "status": "archived"
}