bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software Version:A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)
CSV information ?
Status | archived |
---|---|
Valid from | 15.07.2009 |
Valid until | 31.07.2014 |
Scheme | 🇯🇵 JP |
Manufacturer | Konica Minolta Business Technologies, Inc |
Category | Other Devices and Systems |
Security level | EAL3 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSLVendor
MicrosoftSecurity level
EAL3Claims
T.DISCARD-MFP, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.UNEXPECTED-TRANSMISSION, T.ACCESS-SETTING, T.BACKUP-RESTORE, T.BRING-OUT-CF, T.UNEXPECTEC-TRANSMISSION, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTINGCertificates
CRP-C0223-01, Certification No. C0223Certification process
body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored inStandards
X.509, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004File metadata
Title | CRP-e |
---|---|
Author | IPA/JISEC |
Creation date | D:20091111144942+09'00' |
Modification date | D:20091111145004+09'00' |
Pages | 37 |
Creator | Word 用 Acrobat PDFMaker 8.1 |
Producer | Acrobat Distiller 8.1.0 (Windows) |
Security target ?
Extracted keywords
Symmetric Algorithms
AESHash functions
SHA-256, SHA256Protocols
SSLSecurity level
EAL3Claims
O.REGISTERED-USER, O.PRIVATE-BOX, O.PUBLIC-BOX, O.GROUP-BOX, O.SECURE-PRINT, O.CONFIG, O.OVERWRITE-ALL, O.CRYPT-KEY, O.CHECK-HDD, O.CHECK-CF, O.TRUSTED-PASS, O.CRYPTO-MAIL, O.AUTH-CAPABILITY, O.CRYPTO-CAPABILITY, O.LOCK-HDD-CAPABILITY, O.LOCK-CF-CAPABILITY, O.CRYPTO-KEY, T.DISCARD-MFP, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.UNEXPECTED-TRANSMISSION, T.ACCESS-SETTING, T.BACKUP-RESTORE, T.BRING-OUT-CF, T.UNEXPECTEC-TRANSMISSION, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTING, OE.CRYPT, OE.FEED-BACK, OE.LOCK-HDD, OE.LOCK-CF, OE.SERVER, OE.SESSION, OE.ADMIN, OE.SERVICE, OE.NETWORK, OE.SECRET, OE.SETTING-SECURITY, OE.CRYPTOSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_COP, FCS_CKM, FCS_CAP.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_ITC, FDP_ACP.1, FDP_UAU.7, FIA_SOS.1, FIA_EID.1, FIA_EID, FIA_EID.1.1, FIA_EID.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_NEW.1.2, FIA_SOS, FIA_SSL.3, FIA_MSA.3, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MAS.1, FMT_MSA, FMT_SMS.1, FMT_SME.1, FMT_SOS.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Certification process
main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written inStandards
FIPS 186-2, FIPS PUB 197, FIPS 180-2, X.509, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004File metadata
Creation date | D:20091111124508+09'00' |
---|---|
Modification date | D:20091111145504+09'00' |
Pages | 117 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 7.0.5 (Windows) |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.1Similar certificates
Scheme data ?
Cert Id | JISEC-CC-CRP-C0223 | |
---|---|---|
Supplier | Konica Minolta Business Technologies, Inc. | |
Toe Overseas Name | bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller) | |
Expiration Date | 01.07.2014 | |
Claim | EAL3 | |
Certification Date | 01.07.2009 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0223_it8239.html | |
Toe Japan Name | bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller) | |
Enhanced | ||
Product | Japanese: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software English: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software | |
Toe Version | A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller) | |
Product Type | Control Software for digital MFP | |
Cc Version | 3.1 | |
Assurance Level | EAL3 | |
Vendor | Konica Minolta Business Technologies, Inc. | |
Evaluation Facility | Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security | |
Report Link | https://www.ipa.go.jp/en/security/c0223_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0223_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0223_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - ID & Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - WebDAV administrator Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'JISEC-CC-CRP-C0223', 'toe_overseas_name': 'bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)', 'expiration_date': '2014-07-01', 'certification_date': '2009-07-01', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0223_it8239.html', 'toe_japan_name': 'bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)', 'enhanced': {'__insert__': {'report_link': 'https://www.ipa.go.jp/en/security/c0223_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0223_est.pdf'}, '__update__': {'product': 'Japanese: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software English: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software', 'toe_version': 'A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'cert_link': 'https://www.ipa.go.jp/en/security/c0223_eimg.pdf', 'description': 'PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - ID & Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - WebDAV administrator Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function'}, '__delete__': ['certification_date']}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0235', 'supplier': 'Konica Minolta Business Technologies, Inc.', 'toe_overseas_name': 'bizhub 501 / bizhub 421 / bizhub\n 361 PKI Card System Control Software\n A0R50Y0-0100-GR0-20 (System Controller)\n A0R50Y0-1D00-G00-11 (BIOS Controller)', 'expiration_date': '2014-10', 'claim': 'EAL3', 'certification_date': '2009-09', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0235_it9246.html', 'toe_japan_name': 'bizhub 501 / bizhub 421 / bizhub 361 PKI Card System Control Software\n A0R50Y0-0100-GR0-20 (System Controller)\n A0R50Y0-1D00-G00-11 (BIOS Controller)', 'enhanced': {'product': 'bizhub 501 / bizhub 421 / bizhub 361 PKI Card System Control Software', 'toe_version': 'A0R50Y0-0100-GR0-20\n (System Controller)\n A0R50Y0-1D00-G00-11\n (BIOS Controller)', 'product_type': 'Control Software for digital MFP', 'certification_date': '2009-09-30', 'cc_version': '3.1', 'assurance_level': 'EAL3', 'vendor': 'Konica Minolta Business Technologies, Inc.', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc.\n Center for Evaluation of Information Security', 'cert_link': 'https://www.ipa.go.jp/en/security/c0235_eimg.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFD” or through the network and supports the protection from exposure of the highly confidential documents exchanged between MFP and client PC. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has a deletion method compliant with various overwrite deletion standards and it deletes all the data of HDD completely. \n \n \n TOE security functionality \n TOE provides the following security functions. \n \n - Administrator function\n - Service mode function\n - Encryption Print Function\n - S/MIME Encryption Function\n - Digital Signature Function\n - All area overwrite deletion function\n - Encryption key generation function\n - HDD Verification Function\n - Authentication Failure Frequency Reset function\n - Encryption Support Function\n - HDD lock Operation Support Function\n - PKI Support Function'}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ce94de0fd98de233bea7558fc90b4752eed70d5ce1b5e0c57a8e57f0bf3eee75', 'txt_hash': '9631602d76444b801732d31c18480c965e3cfa09d3fb8536fb1fd7a6ee842cb7'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f991b3eb3e53adc9736f4400d619ff9a648aa4aefb3dc446b2ba0b3a98c58fa1', 'txt_hash': '78e9f4e4b58854b4242f24ef9e7889d3e10b3ee5d72a02c663363106b2b79e4d'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 449631, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 37, '/CreationDate': "D:20091111144942+09'00'", '/Author': 'IPA/JISEC', '/Creator': 'Word 用 Acrobat PDFMaker 8.1', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20091111145004+09'00'", '/Company': 'IPA', '/Manager': 'IPA', '/SourceModified': 'D:20091022044351', '/Title': 'CRP-e', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 774568, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 117, '/CreationDate': "D:20091111124508+09'00'", '/Author': '', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20091111145504+09'00'", '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0223-01': 1, 'Certification No. C0223': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DISCARD-MFP': 2, 'T.BRING-OUT-STORAGE': 2, 'T.ACCESS-PRIVATE-BOX': 2, 'T.ACCESS-PUBLIC-BOX': 2, 'T.ACCESS-GROUP-BOX': 2, 'T.ACCESS-SECURE-PRINT': 2, 'T.UNEXPECTED-TRANSMISSION': 1, 'T.ACCESS-SETTING': 2, 'T.BACKUP-RESTORE': 2, 'T.BRING-OUT-CF': 2, 'T.UNEXPECTEC-TRANSMISSION': 1}, 'A': {'A.ADMIN': 1, 'A.SERVICE': 1, 'A.NETWORK': 1, 'A.SECRET': 1, 'A.SETTING': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'X509': {'X.509': 1}, 'CC': {'CCMB-2006-09-001': 2, 'CCMB-2007-09-002': 2, 'CCMB-2007-09-003': 2, 'CCMB-2007-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.1': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 2}, 'FCS': {'FCS_CKM.1': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 9, 'FCS_CKM.4': 4, 'FCS_COP.1.1': 1, 'FCS_COP': 1, 'FCS_CKM': 2, 'FCS_CAP.1': 2}, 'FDP': {'FDP_RIP.1': 1, 'FDP_ITC.1': 4, 'FDP_ITC.2': 2, 'FDP_ACC.1': 71, 'FDP_ACC.1.1': 4, 'FDP_ACF.1': 54, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 4, 'FDP_ACF.1.3': 4, 'FDP_ACF.1.4': 4, 'FDP_IFC.1': 6, 'FDP_ITC': 1, 'FDP_ACP.1': 1, 'FDP_UAU.7': 1}, 'FIA': {'FIA_SOS.1': 59, 'FIA_EID.1': 16, 'FIA_EID': 2, 'FIA_EID.1.1': 3, 'FIA_EID.1.2': 1, 'FIA_AFL.1': 68, 'FIA_AFL.1.1': 9, 'FIA_AFL.1.2': 9, 'FIA_UAU.1': 25, 'FIA_UAU.2': 67, 'FIA_ATD.1': 26, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 7, 'FIA_SOS.2': 9, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.2.1': 6, 'FIA_UID.1': 31, 'FIA_UID.2': 52, 'FIA_UAU.6': 12, 'FIA_UAU.6.1': 1, 'FIA_UAU.7': 19, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 7, 'FIA_USB.1': 23, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_NEW.1.2': 2, 'FIA_SOS': 1, 'FIA_SSL.3': 1, 'FIA_MSA.3': 1}, 'FMT': {'FMT_MSA.3': 40, 'FMT_MOF.1': 35, 'FMT_MOF.1.1': 4, 'FMT_SMF.1': 112, 'FMT_SMR.1': 174, 'FMT_MSA.1': 34, 'FMT_MSA.1.1': 3, 'FMT_MSA.3.1': 6, 'FMT_MSA.3.2': 7, 'FMT_MTD.1': 111, 'FMT_MTD.1.1': 12, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 6, 'FMT_SMR.1.2': 6, 'FMT_MAS.1': 1, 'FMT_MSA': 4, 'FMT_SMS.1': 1, 'FMT_SME.1': 1, 'FMT_SOS.1': 1}, 'FTA': {'FTA_SSL.3': 6, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.REGISTERED-USER': 14, 'O.PRIVATE-BOX': 5, 'O.PUBLIC-BOX': 8, 'O.GROUP-BOX': 5, 'O.SECURE-PRINT': 8, 'O.CONFIG': 11, 'O.OVERWRITE-ALL': 7, 'O.CRYPT-KEY': 3, 'O.CHECK-HDD': 7, 'O.CHECK-CF': 4, 'O.TRUSTED-PASS': 7, 'O.CRYPTO-MAIL': 4, 'O.AUTH-CAPABILITY': 10, 'O.CRYPTO-CAPABILITY': 4, 'O.LOCK-HDD-CAPABILITY': 7, 'O.LOCK-CF-CAPABILITY': 4, 'O.CRYPTO-KEY': 2}, 'T': {'T.DISCARD-MFP': 3, 'T.BRING-OUT-STORAGE': 2, 'T.ACCESS-PRIVATE-BOX': 3, 'T.ACCESS-PUBLIC-BOX': 2, 'T.ACCESS-GROUP-BOX': 3, 'T.ACCESS-SECURE-PRINT': 2, 'T.UNEXPECTED-TRANSMISSION': 2, 'T.ACCESS-SETTING': 2, 'T.BACKUP-RESTORE': 3, 'T.BRING-OUT-CF': 2, 'T.UNEXPECTEC-TRANSMISSION': 1}, 'A': {'A.ADMIN': 3, 'A.SERVICE': 2, 'A.NETWORK': 4, 'A.SECRET': 2, 'A.SETTING': 3}, 'OE': {'OE.CRYPT': 2, 'OE.FEED-BACK': 10, 'OE.LOCK-HDD': 3, 'OE.LOCK-CF': 3, 'OE.SERVER': 5, 'OE.SESSION': 2, 'OE.ADMIN': 2, 'OE.SERVICE': 2, 'OE.NETWORK': 2, 'OE.SECRET': 2, 'OE.SETTING-SECURITY': 2, 'OE.CRYPTO': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 5, 'SHA256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-2': 6, 'FIPS PUB 197': 3, 'FIPS 180-2': 1}, 'X509': {'X.509': 1}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in': 1}}}
. - The report_filename property was set to
c0223_erpt.pdf
. - The st_filename property was set to
c0223_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0223
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0223_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0223_est.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software Version:A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "647f141827033728",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0223",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4222",
"3622",
"501",
"421",
"5022",
"20",
"11",
"361",
"0100"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0223",
"certification_date": "2009-07-01",
"claim": "EAL3",
"enhanced": {
"assurance_level": "EAL3",
"cc_version": "3.1",
"cert_link": "https://www.ipa.go.jp/en/security/c0223_eimg.pdf",
"description": "PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as \"MFP\") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - ID \u0026 Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - WebDAV administrator Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
"product": "Japanese: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software English: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software",
"product_type": "Control Software for digital MFP",
"report_link": "https://www.ipa.go.jp/en/security/c0223_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0223_est.pdf",
"toe_version": "A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)",
"vendor": "Konica Minolta Business Technologies, Inc."
},
"expiration_date": "2014-07-01",
"supplier": "Konica Minolta Business Technologies, Inc.",
"toe_japan_name": "bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0223_it8239.html",
"toe_overseas_name": "bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Konica Minolta Business Technologies, Inc",
"manufacturer_web": "https://www.konicaminolta.com/",
"name": "bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software Version:A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)",
"not_valid_after": "2014-07-31",
"not_valid_before": "2009-07-15",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0223_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0223-01": 1,
"Certification No. C0223": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN": 1,
"A.NETWORK": 1,
"A.SECRET": 1,
"A.SERVICE": 1,
"A.SETTING": 1
},
"T": {
"T.ACCESS-GROUP-BOX": 2,
"T.ACCESS-PRIVATE-BOX": 2,
"T.ACCESS-PUBLIC-BOX": 2,
"T.ACCESS-SECURE-PRINT": 2,
"T.ACCESS-SETTING": 2,
"T.BACKUP-RESTORE": 2,
"T.BRING-OUT-CF": 2,
"T.BRING-OUT-STORAGE": 2,
"T.DISCARD-MFP": 2,
"T.UNEXPECTEC-TRANSMISSION": 1,
"T.UNEXPECTED-TRANSMISSION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 7
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2007-09-002": 2,
"CCMB-2007-09-003": 2,
"CCMB-2007-09-004": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "IPA/JISEC",
"/Company": "IPA",
"/CreationDate": "D:20091111144942+09\u002700\u0027",
"/Creator": "Word \u7528 Acrobat PDFMaker 8.1",
"/Manager": "IPA",
"/ModDate": "D:20091111145004+09\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/SourceModified": "D:20091022044351",
"/Title": "CRP-e",
"pdf_file_size_bytes": 449631,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 37
},
"st_filename": "c0223_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 3,
"A.NETWORK": 4,
"A.SECRET": 2,
"A.SERVICE": 2,
"A.SETTING": 3
},
"O": {
"O.AUTH-CAPABILITY": 10,
"O.CHECK-CF": 4,
"O.CHECK-HDD": 7,
"O.CONFIG": 11,
"O.CRYPT-KEY": 3,
"O.CRYPTO-CAPABILITY": 4,
"O.CRYPTO-KEY": 2,
"O.CRYPTO-MAIL": 4,
"O.GROUP-BOX": 5,
"O.LOCK-CF-CAPABILITY": 4,
"O.LOCK-HDD-CAPABILITY": 7,
"O.OVERWRITE-ALL": 7,
"O.PRIVATE-BOX": 5,
"O.PUBLIC-BOX": 8,
"O.REGISTERED-USER": 14,
"O.SECURE-PRINT": 8,
"O.TRUSTED-PASS": 7
},
"OE": {
"OE.ADMIN": 2,
"OE.CRYPT": 2,
"OE.CRYPTO": 2,
"OE.FEED-BACK": 10,
"OE.LOCK-CF": 3,
"OE.LOCK-HDD": 3,
"OE.NETWORK": 2,
"OE.SECRET": 2,
"OE.SERVER": 5,
"OE.SERVICE": 2,
"OE.SESSION": 2,
"OE.SETTING-SECURITY": 2
},
"T": {
"T.ACCESS-GROUP-BOX": 3,
"T.ACCESS-PRIVATE-BOX": 3,
"T.ACCESS-PUBLIC-BOX": 2,
"T.ACCESS-SECURE-PRINT": 2,
"T.ACCESS-SETTING": 2,
"T.BACKUP-RESTORE": 3,
"T.BRING-OUT-CF": 2,
"T.BRING-OUT-STORAGE": 2,
"T.DISCARD-MFP": 3,
"T.UNEXPECTEC-TRANSMISSION": 1,
"T.UNEXPECTED-TRANSMISSION": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VLA.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2
},
"FCS": {
"FCS_CAP.1": 2,
"FCS_CKM": 2,
"FCS_CKM.1": 10,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 3,
"FCS_CKM.4": 4,
"FCS_COP": 1,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 71,
"FDP_ACC.1.1": 4,
"FDP_ACF.1": 54,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.3": 4,
"FDP_ACF.1.4": 4,
"FDP_ACP.1": 1,
"FDP_IFC.1": 6,
"FDP_ITC": 1,
"FDP_ITC.1": 4,
"FDP_ITC.2": 2,
"FDP_RIP.1": 1,
"FDP_UAU.7": 1
},
"FIA": {
"FIA_AFL.1": 68,
"FIA_AFL.1.1": 9,
"FIA_AFL.1.2": 9,
"FIA_ATD.1": 26,
"FIA_ATD.1.1": 1,
"FIA_EID": 2,
"FIA_EID.1": 16,
"FIA_EID.1.1": 3,
"FIA_EID.1.2": 1,
"FIA_MSA.3": 1,
"FIA_NEW.1.2": 2,
"FIA_SOS": 1,
"FIA_SOS.1": 59,
"FIA_SOS.1.1": 7,
"FIA_SOS.2": 9,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_SSL.3": 1,
"FIA_UAU.1": 25,
"FIA_UAU.2": 67,
"FIA_UAU.2.1": 6,
"FIA_UAU.6": 12,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 19,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 31,
"FIA_UID.2": 52,
"FIA_UID.2.1": 7,
"FIA_USB.1": 23,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MAS.1": 1,
"FMT_MOF.1": 35,
"FMT_MOF.1.1": 4,
"FMT_MSA": 4,
"FMT_MSA.1": 34,
"FMT_MSA.1.1": 3,
"FMT_MSA.3": 40,
"FMT_MSA.3.1": 6,
"FMT_MSA.3.2": 7,
"FMT_MTD.1": 111,
"FMT_MTD.1.1": 12,
"FMT_SME.1": 1,
"FMT_SMF.1": 112,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 174,
"FMT_SMR.1.1": 6,
"FMT_SMR.1.2": 6,
"FMT_SMS.1": 1,
"FMT_SOS.1": 1
},
"FTA": {
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 5,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 1,
"CCMB-2007-09-002": 1,
"CCMB-2007-09-003": 1,
"CCMB-2007-09-004": 1
},
"FIPS": {
"FIPS 180-2": 1,
"FIPS 186-2": 6,
"FIPS PUB 197": 3
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20091111124508+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20091111145504+09\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 774568,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 117
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0223_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0223_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ce94de0fd98de233bea7558fc90b4752eed70d5ce1b5e0c57a8e57f0bf3eee75",
"txt_hash": "9631602d76444b801732d31c18480c965e3cfa09d3fb8536fb1fd7a6ee842cb7"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f991b3eb3e53adc9736f4400d619ff9a648aa4aefb3dc446b2ba0b3a98c58fa1",
"txt_hash": "78e9f4e4b58854b4242f24ef9e7889d3e10b3ee5d72a02c663363106b2b79e4d"
}
},
"status": "archived"
}