bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software Version:A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)

CSV information ?

Status archived
Valid from 15.07.2009
Valid until 31.07.2014
Scheme 🇯🇵 JP
Manufacturer Konica Minolta Business Technologies, Inc
Category Other Devices and Systems
Security level EAL3

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0223

Certificate ?

Certification report ?

Extracted keywords

Protocols
SSL

Vendor
Microsoft

Security level
EAL3
Claims
T.DISCARD-MFP, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.UNEXPECTED-TRANSMISSION, T.ACCESS-SETTING, T.BACKUP-RESTORE, T.BRING-OUT-CF, T.UNEXPECTEC-TRANSMISSION, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTING
Certificates
CRP-C0223-01, Certification No. C0223

Certification process
body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in

Standards
X.509, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004

File metadata

Title CRP-e
Author IPA/JISEC
Creation date D:20091111144942+09'00'
Modification date D:20091111145004+09'00'
Pages 37
Creator Word 用 Acrobat PDFMaker 8.1
Producer Acrobat Distiller 8.1.0 (Windows)

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Hash functions
SHA-256, SHA256
Protocols
SSL

Security level
EAL3
Claims
O.REGISTERED-USER, O.PRIVATE-BOX, O.PUBLIC-BOX, O.GROUP-BOX, O.SECURE-PRINT, O.CONFIG, O.OVERWRITE-ALL, O.CRYPT-KEY, O.CHECK-HDD, O.CHECK-CF, O.TRUSTED-PASS, O.CRYPTO-MAIL, O.AUTH-CAPABILITY, O.CRYPTO-CAPABILITY, O.LOCK-HDD-CAPABILITY, O.LOCK-CF-CAPABILITY, O.CRYPTO-KEY, T.DISCARD-MFP, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.UNEXPECTED-TRANSMISSION, T.ACCESS-SETTING, T.BACKUP-RESTORE, T.BRING-OUT-CF, T.UNEXPECTEC-TRANSMISSION, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTING, OE.CRYPT, OE.FEED-BACK, OE.LOCK-HDD, OE.LOCK-CF, OE.SERVER, OE.SESSION, OE.ADMIN, OE.SERVICE, OE.NETWORK, OE.SECRET, OE.SETTING-SECURITY, OE.CRYPTO
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_COP, FCS_CKM, FCS_CAP.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_ITC, FDP_ACP.1, FDP_UAU.7, FIA_SOS.1, FIA_EID.1, FIA_EID, FIA_EID.1.1, FIA_EID.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_NEW.1.2, FIA_SOS, FIA_SSL.3, FIA_MSA.3, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MAS.1, FMT_MSA, FMT_SMS.1, FMT_SME.1, FMT_SOS.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3

Certification process
main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in

Standards
FIPS 186-2, FIPS PUB 197, FIPS 180-2, X.509, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004

File metadata

Creation date D:20091111124508+09'00'
Modification date D:20091111145504+09'00'
Pages 117
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 7.0.5 (Windows)

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0223

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.1

Similar certificates

Name Certificate ID
bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software Version: A0R50Y0-0100-G00-11 (System Controller), A0R50Y0-1D00-G00-10 (BIOS Controller) JISEC-CC-CRP-C0190 Compare
bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version: A0P00Y0-0100-GM0-24 JISEC-CC-CRP-C0312 Compare
bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version:A0P00Y0-0100-GM0-22 JISEC-CC-CRP-C0260 Compare
bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software Version:A11U-0100-G10-06 JISEC-CC-CRP-C0233 Compare
bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c Control Software Version:A0ED0Y0-0100-GM0-22 JISEC-CC-CRP-C0259 Compare
bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c / D407 / D406 / D405 Control Software Version: A0ED0Y0-0100-GM0-24 JISEC-CC-CRP-C0313 Compare
bizhub C360 / bizhub C280 / bizhub C220 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c Control Software Version:A0ED0Y0-0100-GM0-12 JISEC-CC-CRP-C0240 Compare
bizhub C652 / bizhub C552 / bizhub C452 / ineo+ 652 / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version:A0P00Y0-0100-GM0-12 JISEC-CC-CRP-C0241 Compare
bizhub 750 / bizhub 600 / ineo 750 / ineo 600 Control Software MFP system controller program : 57AA-0100-G00-21-000 MFP image controller program : 57AA-1000-G00-21-000 JISEC-CC-CRP-C0085 Compare
bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software Version: A2XK0Y0-0100-G00-56 JISEC-CC-CRP-C0378 Compare
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 PKI Card System Control Software, Version A1UD0Y0-0100-G00-20 JISEC-CC-CRP-C0264 Compare
bizhub C652 / bizhub C552 / ineo+ 652 / ineo+ 552 / VarioLink 6522c / VarioLink 5522c Control Software Version:A0P00Y0-0100-GM0-02 JISEC-CC-CRP-C0217 Compare
bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software Version: A2X00Y0-0100-G00-53 JISEC-CC-CRP-C0374 Compare
bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software, Version: A55V0Y0-0100-G00-10 JISEC-CC-CRP-C0398 Compare
bizhub 554e / bizhub 454e / bizhub 364e / bizhub 284e / bizhub 224e PKI Card System Control Software Version: A61F0Y0-0100-G00-09pki JISEC-CC-CRP-C0429 Compare
bizhub C554e / bizhub C454e / bizhub C364e / bizhub C284e / bizhub C224e PKI Card System Control Software, Version: A5C10Y0-0100-G00-17pki JISEC-CC-CRP-C0396 Compare
bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 PKI Card System Control Software Version:A2XK0Y0-0100-G00-56pki JISEC-CC-CRP-C0379 Compare
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00 JISEC-CC-CRP-C0265 Compare
bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 PKI Card System Control Software Version: A2WU0Y0-0100-G00-F2pki JISEC-CC-CRP-C0291 Compare
bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software Version: A2WU0Y0-0100-GM0-00 JISEC-CC-CRP-C0290 Compare
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software Version: A1UD0Y0-0100-GM0-04 JISEC-CC-CRP-C0314 Compare
bizhub 500 / bizhub 420 / bizhub 360 /ineo 500 / ineo 420 / ineo 360 Control Software 50GA-0100-G00-30-000 JISEC-CC-CRP-C0094 Compare
bizhub 754e / bizhub 654e PKI Card System Control Software Version:A55V0Y0-0100-G00-60pki JISEC-CC-CRP-C0430 Compare
bizhub C754 / bizhub C654 PKI Card System Control Software Version:A2X00Y0-0100-G00-53pki JISEC-CC-CRP-C0375 Compare
bizhub 754 / bizhub 654 PKI Card System Control Software, version: A55V0Y0-0100-G00-10pki JISEC-CC-CRP-C0391 Compare
bizhub C754e / bizhub C654e PKI Card System Control Software. Version:A2X00Y0-0100-G00-80pki JISEC-CC-CRP-C0415 Compare
Showing 5 out of 26.

Scheme data ?

Cert Id JISEC-CC-CRP-C0223
Supplier Konica Minolta Business Technologies, Inc.
Toe Overseas Name bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)
Expiration Date 01.07.2014
Claim EAL3
Certification Date 01.07.2009
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0223_it8239.html
Toe Japan Name bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)
Enhanced
Product Japanese: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software English: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software
Toe Version A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)
Product Type Control Software for digital MFP
Cc Version 3.1
Assurance Level EAL3
Vendor Konica Minolta Business Technologies, Inc.
Evaluation Facility Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
Report Link https://www.ipa.go.jp/en/security/c0223_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/c0223_eimg.pdf
Target Link https://www.ipa.go.jp/en/security/c0223_est.pdf
Description PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - ID & Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - WebDAV administrator Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function

References ?

No references are available for this certificate.

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'JISEC-CC-CRP-C0223', 'toe_overseas_name': 'bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)', 'expiration_date': '2014-07-01', 'certification_date': '2009-07-01', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0223_it8239.html', 'toe_japan_name': 'bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)', 'enhanced': {'__insert__': {'report_link': 'https://www.ipa.go.jp/en/security/c0223_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0223_est.pdf'}, '__update__': {'product': 'Japanese: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software English: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software', 'toe_version': 'A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'cert_link': 'https://www.ipa.go.jp/en/security/c0223_eimg.pdf', 'description': 'PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - ID & Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - WebDAV administrator Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function'}, '__delete__': ['certification_date']}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'C0235', 'supplier': 'Konica Minolta Business Technologies, Inc.', 'toe_overseas_name': 'bizhub 501 / bizhub 421 / bizhub\n 361 PKI Card System Control Software\n A0R50Y0-0100-GR0-20 (System Controller)\n A0R50Y0-1D00-G00-11 (BIOS Controller)', 'expiration_date': '2014-10', 'claim': 'EAL3', 'certification_date': '2009-09', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0235_it9246.html', 'toe_japan_name': 'bizhub 501 / bizhub 421 / bizhub 361 PKI Card System Control Software\n A0R50Y0-0100-GR0-20 (System Controller)\n A0R50Y0-1D00-G00-11 (BIOS Controller)', 'enhanced': {'product': 'bizhub 501 / bizhub 421 / bizhub 361 PKI Card System Control Software', 'toe_version': 'A0R50Y0-0100-GR0-20\n (System Controller)\n A0R50Y0-1D00-G00-11\n (BIOS Controller)', 'product_type': 'Control Software for digital MFP', 'certification_date': '2009-09-30', 'cc_version': '3.1', 'assurance_level': 'EAL3', 'vendor': 'Konica Minolta Business Technologies, Inc.', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc.\n Center for Evaluation of Information Security', 'cert_link': 'https://www.ipa.go.jp/en/security/c0235_eimg.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFD” or through the network and supports the protection from exposure of the highly confidential documents exchanged between MFP and client PC. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has a deletion method compliant with various overwrite deletion standards and it deletes all the data of HDD completely. \n \n \n TOE security functionality \n TOE provides the following security functions. \n \n - Administrator function\n - Service mode function\n - Encryption Print Function\n - S/MIME Encryption Function\n - Digital Signature Function\n - All area overwrite deletion function\n - Encryption key generation function\n - HDD Verification Function\n - Authentication Failure Frequency Reset function\n - Encryption Support Function\n - HDD lock Operation Support Function\n - PKI Support Function'}}.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ce94de0fd98de233bea7558fc90b4752eed70d5ce1b5e0c57a8e57f0bf3eee75', 'txt_hash': '9631602d76444b801732d31c18480c965e3cfa09d3fb8536fb1fd7a6ee842cb7'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f991b3eb3e53adc9736f4400d619ff9a648aa4aefb3dc446b2ba0b3a98c58fa1', 'txt_hash': '78e9f4e4b58854b4242f24ef9e7889d3e10b3ee5d72a02c663363106b2b79e4d'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 449631, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 37, '/CreationDate': "D:20091111144942+09'00'", '/Author': 'IPA/JISEC', '/Creator': 'Word 用 Acrobat PDFMaker 8.1', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20091111145004+09'00'", '/Company': 'IPA', '/Manager': 'IPA', '/SourceModified': 'D:20091022044351', '/Title': 'CRP-e', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 774568, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 117, '/CreationDate': "D:20091111124508+09'00'", '/Author': '', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20091111145504+09'00'", '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0223-01': 1, 'Certification No. C0223': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DISCARD-MFP': 2, 'T.BRING-OUT-STORAGE': 2, 'T.ACCESS-PRIVATE-BOX': 2, 'T.ACCESS-PUBLIC-BOX': 2, 'T.ACCESS-GROUP-BOX': 2, 'T.ACCESS-SECURE-PRINT': 2, 'T.UNEXPECTED-TRANSMISSION': 1, 'T.ACCESS-SETTING': 2, 'T.BACKUP-RESTORE': 2, 'T.BRING-OUT-CF': 2, 'T.UNEXPECTEC-TRANSMISSION': 1}, 'A': {'A.ADMIN': 1, 'A.SERVICE': 1, 'A.NETWORK': 1, 'A.SECRET': 1, 'A.SETTING': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'X509': {'X.509': 1}, 'CC': {'CCMB-2006-09-001': 2, 'CCMB-2007-09-002': 2, 'CCMB-2007-09-003': 2, 'CCMB-2007-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.1': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 2}, 'FCS': {'FCS_CKM.1': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 9, 'FCS_CKM.4': 4, 'FCS_COP.1.1': 1, 'FCS_COP': 1, 'FCS_CKM': 2, 'FCS_CAP.1': 2}, 'FDP': {'FDP_RIP.1': 1, 'FDP_ITC.1': 4, 'FDP_ITC.2': 2, 'FDP_ACC.1': 71, 'FDP_ACC.1.1': 4, 'FDP_ACF.1': 54, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 4, 'FDP_ACF.1.3': 4, 'FDP_ACF.1.4': 4, 'FDP_IFC.1': 6, 'FDP_ITC': 1, 'FDP_ACP.1': 1, 'FDP_UAU.7': 1}, 'FIA': {'FIA_SOS.1': 59, 'FIA_EID.1': 16, 'FIA_EID': 2, 'FIA_EID.1.1': 3, 'FIA_EID.1.2': 1, 'FIA_AFL.1': 68, 'FIA_AFL.1.1': 9, 'FIA_AFL.1.2': 9, 'FIA_UAU.1': 25, 'FIA_UAU.2': 67, 'FIA_ATD.1': 26, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 7, 'FIA_SOS.2': 9, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.2.1': 6, 'FIA_UID.1': 31, 'FIA_UID.2': 52, 'FIA_UAU.6': 12, 'FIA_UAU.6.1': 1, 'FIA_UAU.7': 19, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 7, 'FIA_USB.1': 23, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_NEW.1.2': 2, 'FIA_SOS': 1, 'FIA_SSL.3': 1, 'FIA_MSA.3': 1}, 'FMT': {'FMT_MSA.3': 40, 'FMT_MOF.1': 35, 'FMT_MOF.1.1': 4, 'FMT_SMF.1': 112, 'FMT_SMR.1': 174, 'FMT_MSA.1': 34, 'FMT_MSA.1.1': 3, 'FMT_MSA.3.1': 6, 'FMT_MSA.3.2': 7, 'FMT_MTD.1': 111, 'FMT_MTD.1.1': 12, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 6, 'FMT_SMR.1.2': 6, 'FMT_MAS.1': 1, 'FMT_MSA': 4, 'FMT_SMS.1': 1, 'FMT_SME.1': 1, 'FMT_SOS.1': 1}, 'FTA': {'FTA_SSL.3': 6, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.REGISTERED-USER': 14, 'O.PRIVATE-BOX': 5, 'O.PUBLIC-BOX': 8, 'O.GROUP-BOX': 5, 'O.SECURE-PRINT': 8, 'O.CONFIG': 11, 'O.OVERWRITE-ALL': 7, 'O.CRYPT-KEY': 3, 'O.CHECK-HDD': 7, 'O.CHECK-CF': 4, 'O.TRUSTED-PASS': 7, 'O.CRYPTO-MAIL': 4, 'O.AUTH-CAPABILITY': 10, 'O.CRYPTO-CAPABILITY': 4, 'O.LOCK-HDD-CAPABILITY': 7, 'O.LOCK-CF-CAPABILITY': 4, 'O.CRYPTO-KEY': 2}, 'T': {'T.DISCARD-MFP': 3, 'T.BRING-OUT-STORAGE': 2, 'T.ACCESS-PRIVATE-BOX': 3, 'T.ACCESS-PUBLIC-BOX': 2, 'T.ACCESS-GROUP-BOX': 3, 'T.ACCESS-SECURE-PRINT': 2, 'T.UNEXPECTED-TRANSMISSION': 2, 'T.ACCESS-SETTING': 2, 'T.BACKUP-RESTORE': 3, 'T.BRING-OUT-CF': 2, 'T.UNEXPECTEC-TRANSMISSION': 1}, 'A': {'A.ADMIN': 3, 'A.SERVICE': 2, 'A.NETWORK': 4, 'A.SECRET': 2, 'A.SETTING': 3}, 'OE': {'OE.CRYPT': 2, 'OE.FEED-BACK': 10, 'OE.LOCK-HDD': 3, 'OE.LOCK-CF': 3, 'OE.SERVER': 5, 'OE.SESSION': 2, 'OE.ADMIN': 2, 'OE.SERVICE': 2, 'OE.NETWORK': 2, 'OE.SECRET': 2, 'OE.SETTING-SECURITY': 2, 'OE.CRYPTO': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 5, 'SHA256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-2': 6, 'FIPS PUB 197': 3, 'FIPS 180-2': 1}, 'X509': {'X.509': 1}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in': 1}}}.
    • The report_filename property was set to c0223_erpt.pdf.
    • The st_filename property was set to c0223_est.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0223.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0223_erpt.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0223_est.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software Version:A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "647f141827033728",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0223",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4222",
        "3622",
        "501",
        "421",
        "5022",
        "20",
        "11",
        "361",
        "0100"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "JISEC-CC-CRP-C0223",
      "certification_date": "2009-07-01",
      "claim": "EAL3",
      "enhanced": {
        "assurance_level": "EAL3",
        "cc_version": "3.1",
        "cert_link": "https://www.ipa.go.jp/en/security/c0223_eimg.pdf",
        "description": "PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as \"MFP\") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - ID \u0026 Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - WebDAV administrator Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function",
        "evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
        "product": "Japanese: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software English: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software",
        "product_type": "Control Software for digital MFP",
        "report_link": "https://www.ipa.go.jp/en/security/c0223_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0223_est.pdf",
        "toe_version": "A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)",
        "vendor": "Konica Minolta Business Technologies, Inc."
      },
      "expiration_date": "2014-07-01",
      "supplier": "Konica Minolta Business Technologies, Inc.",
      "toe_japan_name": "bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0223_it8239.html",
      "toe_overseas_name": "bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Konica Minolta Business Technologies, Inc",
  "manufacturer_web": "https://www.konicaminolta.com/",
  "name": "bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software Version:A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)",
  "not_valid_after": "2014-07-31",
  "not_valid_before": "2009-07-15",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0223_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0223-01": 1,
          "Certification No. C0223": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 1,
          "A.NETWORK": 1,
          "A.SECRET": 1,
          "A.SERVICE": 1,
          "A.SETTING": 1
        },
        "T": {
          "T.ACCESS-GROUP-BOX": 2,
          "T.ACCESS-PRIVATE-BOX": 2,
          "T.ACCESS-PUBLIC-BOX": 2,
          "T.ACCESS-SECURE-PRINT": 2,
          "T.ACCESS-SETTING": 2,
          "T.BACKUP-RESTORE": 2,
          "T.BRING-OUT-CF": 2,
          "T.BRING-OUT-STORAGE": 2,
          "T.DISCARD-MFP": 2,
          "T.UNEXPECTEC-TRANSMISSION": 1,
          "T.UNEXPECTED-TRANSMISSION": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL3": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 7
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 2,
          "CCMB-2007-09-002": 2,
          "CCMB-2007-09-003": 2,
          "CCMB-2007-09-004": 2
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "IPA/JISEC",
      "/Company": "IPA",
      "/CreationDate": "D:20091111144942+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 8.1",
      "/Manager": "IPA",
      "/ModDate": "D:20091111145004+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.1.0 (Windows)",
      "/SourceModified": "D:20091022044351",
      "/Title": "CRP-e",
      "pdf_file_size_bytes": 449631,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 37
    },
    "st_filename": "c0223_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.NETWORK": 4,
          "A.SECRET": 2,
          "A.SERVICE": 2,
          "A.SETTING": 3
        },
        "O": {
          "O.AUTH-CAPABILITY": 10,
          "O.CHECK-CF": 4,
          "O.CHECK-HDD": 7,
          "O.CONFIG": 11,
          "O.CRYPT-KEY": 3,
          "O.CRYPTO-CAPABILITY": 4,
          "O.CRYPTO-KEY": 2,
          "O.CRYPTO-MAIL": 4,
          "O.GROUP-BOX": 5,
          "O.LOCK-CF-CAPABILITY": 4,
          "O.LOCK-HDD-CAPABILITY": 7,
          "O.OVERWRITE-ALL": 7,
          "O.PRIVATE-BOX": 5,
          "O.PUBLIC-BOX": 8,
          "O.REGISTERED-USER": 14,
          "O.SECURE-PRINT": 8,
          "O.TRUSTED-PASS": 7
        },
        "OE": {
          "OE.ADMIN": 2,
          "OE.CRYPT": 2,
          "OE.CRYPTO": 2,
          "OE.FEED-BACK": 10,
          "OE.LOCK-CF": 3,
          "OE.LOCK-HDD": 3,
          "OE.NETWORK": 2,
          "OE.SECRET": 2,
          "OE.SERVER": 5,
          "OE.SERVICE": 2,
          "OE.SESSION": 2,
          "OE.SETTING-SECURITY": 2
        },
        "T": {
          "T.ACCESS-GROUP-BOX": 3,
          "T.ACCESS-PRIVATE-BOX": 3,
          "T.ACCESS-PUBLIC-BOX": 2,
          "T.ACCESS-SECURE-PRINT": 2,
          "T.ACCESS-SETTING": 2,
          "T.BACKUP-RESTORE": 3,
          "T.BRING-OUT-CF": 2,
          "T.BRING-OUT-STORAGE": 2,
          "T.DISCARD-MFP": 3,
          "T.UNEXPECTEC-TRANSMISSION": 1,
          "T.UNEXPECTED-TRANSMISSION": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VLA.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 2
        },
        "FCS": {
          "FCS_CAP.1": 2,
          "FCS_CKM": 2,
          "FCS_CKM.1": 10,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 3,
          "FCS_CKM.4": 4,
          "FCS_COP": 1,
          "FCS_COP.1": 9,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 71,
          "FDP_ACC.1.1": 4,
          "FDP_ACF.1": 54,
          "FDP_ACF.1.1": 4,
          "FDP_ACF.1.2": 4,
          "FDP_ACF.1.3": 4,
          "FDP_ACF.1.4": 4,
          "FDP_ACP.1": 1,
          "FDP_IFC.1": 6,
          "FDP_ITC": 1,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 2,
          "FDP_RIP.1": 1,
          "FDP_UAU.7": 1
        },
        "FIA": {
          "FIA_AFL.1": 68,
          "FIA_AFL.1.1": 9,
          "FIA_AFL.1.2": 9,
          "FIA_ATD.1": 26,
          "FIA_ATD.1.1": 1,
          "FIA_EID": 2,
          "FIA_EID.1": 16,
          "FIA_EID.1.1": 3,
          "FIA_EID.1.2": 1,
          "FIA_MSA.3": 1,
          "FIA_NEW.1.2": 2,
          "FIA_SOS": 1,
          "FIA_SOS.1": 59,
          "FIA_SOS.1.1": 7,
          "FIA_SOS.2": 9,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_SSL.3": 1,
          "FIA_UAU.1": 25,
          "FIA_UAU.2": 67,
          "FIA_UAU.2.1": 6,
          "FIA_UAU.6": 12,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 19,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 31,
          "FIA_UID.2": 52,
          "FIA_UID.2.1": 7,
          "FIA_USB.1": 23,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MAS.1": 1,
          "FMT_MOF.1": 35,
          "FMT_MOF.1.1": 4,
          "FMT_MSA": 4,
          "FMT_MSA.1": 34,
          "FMT_MSA.1.1": 3,
          "FMT_MSA.3": 40,
          "FMT_MSA.3.1": 6,
          "FMT_MSA.3.2": 7,
          "FMT_MTD.1": 111,
          "FMT_MTD.1.1": 12,
          "FMT_SME.1": 1,
          "FMT_SMF.1": 112,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 174,
          "FMT_SMR.1.1": 6,
          "FMT_SMR.1.2": 6,
          "FMT_SMS.1": 1,
          "FMT_SOS.1": 1
        },
        "FTA": {
          "FTA_SSL.3": 6,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 5,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 1,
          "CCMB-2007-09-002": 1,
          "CCMB-2007-09-003": 1,
          "CCMB-2007-09-004": 1
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 186-2": 6,
          "FIPS PUB 197": 3
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/CreationDate": "D:20091111124508+09\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20091111145504+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 774568,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 117
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0223_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0223_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ce94de0fd98de233bea7558fc90b4752eed70d5ce1b5e0c57a8e57f0bf3eee75",
      "txt_hash": "9631602d76444b801732d31c18480c965e3cfa09d3fb8536fb1fd7a6ee842cb7"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f991b3eb3e53adc9736f4400d619ff9a648aa4aefb3dc446b2ba0b3a98c58fa1",
      "txt_hash": "78e9f4e4b58854b4242f24ef9e7889d3e10b3ee5d72a02c663363106b2b79e4d"
    }
  },
  "status": "archived"
}