bizhub C754e / bizhub C654e PKI Card System Control Software. Version:A2X00Y0-0100-G00-80pki
CSV information ?
Status | archived |
---|---|
Valid from | 28.11.2013 |
Valid until | 05.12.2018 |
Scheme | 🇯🇵 JP |
Manufacturer | KONICA MINOLTA, INC. |
Category | Other Devices and Systems |
Security level | EAL3 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSLSecurity level
EAL3Claims
T.DISCARD-MFP, T.BRING-OUT-STORAGE, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.IC-CARDCertificates
CRP-C0415-01, Certification No. C0415Certification process
or through the network. The TOE provides the protection function for the disclosure of the highly confidential documents stored in MFP. This TOE does not support the audit log function. Moreover, against the danger ofStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date | D:20140212173321+09'00' |
---|---|
Modification date | D:20140212173353+09'00' |
Pages | 34 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DESHash functions
SHA-1, SHA-256Security level
EAL3Claims
O.DECRYPT, O.OVERWRITE, O.CRYPT, O.MAIL, O.CRYPTO, O.PKI, O.FAX, O.DECRYPT-PRINT, O.CRYPTO-KEY, O.MAIL-CRYPTO, O.MAIL-SIGN, O.CRYPTO-CAPABILITY, O.PKI-CAPABILITY, O.FAX-CONTROL, T.DISCARD, T.B, T.DISCARD-MFP, T.BRING, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.IC, A.IC-CARD, OE.ADMIN, OE.SERVICE, OE.NETWORK, OE.IC, OE.SECRET, OE.SETTING, OE.DRIVER, OE.FAX, OE.CARD-USER, OE.IC-CARD, OE.SIGN, OE.SETTING-SECURITY, OE.FAX-UNITSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_CKM, FCS_CAP.1, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2, FIA_SOS.1, FIA_SOS.1.1, FIA_SOS, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2.1, FIA_SSL.3, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA, FTA_SSL.3, FTA_SSL.3.1Certification process
that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document transmitted between MFP and client PC. Also, it provides a function of protecting the scanned imageStandards
FIPS 186, FIPS 180, FIPS 186-2, FIPS PUB 197, FIPS 180-2, FIPS186-2, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date | D:20140206142648+09'00' |
---|---|
Modification date | D:20140206142650+09'00' |
Pages | 54 |
Creator | CubePDF |
Producer | GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2CPE matches
Similar certificates
Scheme data ?
Cert Id | JISEC-CC-CRP-C0415 | |
---|---|---|
Supplier | KONICA MINOLTA, INC. | |
Toe Overseas Name | bizhub C754e / bizhub C654e PKI Card System Control SoftwareA2X00Y0-0100-G00-80pki | |
Expiration Date | 01.12.2018 | |
Claim | EAL3 | |
Certification Date | 01.11.2013 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0415_it3462.html | |
Toe Japan Name | bizhub C754e / bizhub C654e PKI Card System Control SoftwareA2X00Y0-0100-G00-80pki | |
Enhanced | ||
Product | bizhub C754e / bizhub C654e PKI Card System Control Software | |
Toe Version | A2X00Y0-0100-G00-80pki | |
Product Type | Control Software for digital MFP | |
Cc Version | 3.1 Release4 | |
Assurance Level | EAL3 | |
Vendor | KONICA MINOLTA,INC. | |
Evaluation Facility | Mizuho Information & Research Institute, Inc. Information Security Evaluation Office | |
Report Link | https://www.ipa.go.jp/en/security/c0415_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0415_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0415_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions.: - Encryption Print Function: The function that receives the encrypted print data and can print the print data only with a right IC card. - S/MIME Encryption Function: The function to encrypt an image data when transmitting it by e-mail. - Digital Signature Function: The function to add the digital signature by using the function of IC card when transmitting an image data by e-mail. - HDD Encryption Function: The function to encrypt the image data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function: The function that deletes data area including the image data of HDD completely by deletion method compliant with various overwrite deletion standards. - Fax Unit Control Function: The function to prevent accessing the internal network using FAX as steppingstone. |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'JISEC-CC-CRP-C0415', 'expiration_date': '2018-12-01', 'certification_date': '2013-11-01', 'enhanced': {'__update__': {'product': 'bizhub C754e / bizhub C654e PKI Card System Control Software', 'product_type': 'Control Software for digital MFP', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Information Security Evaluation Office', 'description': 'PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions.: - Encryption Print Function: The function that receives the encrypted print data and can print the print data only with a right IC card. - S/MIME Encryption Function: The function to encrypt an image data when transmitting it by e-mail. - Digital Signature Function: The function to add the digital signature by using the function of IC card when transmitting an image data by e-mail. - HDD Encryption Function: The function to encrypt the image data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function: The function that deletes data area including the image data of HDD completely by deletion method compliant with various overwrite deletion standards. - Fax Unit Control Function: The function to prevent accessing the internal network using FAX as steppingstone.'}, '__delete__': ['certification_date']}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0415', 'supplier': 'KONICA MINOLTA, INC.', 'toe_overseas_name': 'bizhub C754e / bizhub C654e PKI Card System Control SoftwareA2X00Y0-0100-G00-80pki', 'expiration_date': '2018-12', 'claim': 'EAL3', 'certification_date': '2013-11', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0415_it3462.html', 'toe_japan_name': 'bizhub C754e / bizhub C654e PKI Card System Control SoftwareA2X00Y0-0100-G00-80pki', 'enhanced': {'product': 'bizhub C754e / bizhub C654e\n PKI Card System Control\n Software', 'toe_version': 'A2X00Y0-0100-G00-80pki', 'product_type': 'Control Software for digital\n MFP', 'certification_date': '2013-11-28', 'cc_version': '3.1 Release4', 'assurance_level': 'EAL3', 'vendor': 'KONICA MINOLTA,INC.', 'evaluation_facility': 'Mizuho Information & \n Research Institute, Inc.\n Information Security\n Evaluation Office', 'report_link': 'https://www.ipa.go.jp/en/security/c0415_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0415_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0415_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. \n \n \n TOE security functionality \n This TOE mainly provides the following security functions.: \n \n \n \n - \n Encryption Print Function: The function that receives the encrypted print data and can print the print data only with a right IC card. \n \n \n - \n S/MIME Encryption Function: The function to encrypt an image data when transmitting it by e-mail. \n \n \n - \n Digital Signature Function: The function to add the digital signature by using the function of IC card when transmitting an image data by e-mail. \n \n \n - \n HDD Encryption Function: The function to encrypt the image data written in HDD by using the function of ASIC. \n \n \n - \n All Area Overwrite Deletion Function: The function that deletes data area including the image data of HDD completely by deletion method compliant with various overwrite deletion standards. \n \n \n - \n Fax Unit Control Function: The function to prevent accessing the internal network using FAX as steppingstone.'}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '12712efa0ffc3d26015de6a45de157ea8a47b3617ed51c82ab91cde1c4a70b2e', 'txt_hash': '9539d78e34c06c98e3e8b63efab0a9cd0eb36c059365e15c4bdd773822808c63'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '926538c815928056f7a4fd9fd9a3a466bfcf35ab561d12040c7683fb3af36b86', 'txt_hash': '0748b6de8ee287ebd7e2f665701032b846fca49796c5a1799ea9a2f27f15dfd7'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 359141, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 34, '/CreationDate': "D:20140212173321+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20140212173353+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 500291, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 54, '/Producer': 'GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA', '/CreationDate': "D:20140206142648+09'00'", '/ModDate': "D:20140206142650+09'00'", '/Title': '', '/Creator': 'CubePDF', '/Author': '', '/Subject': '', '/Keywords': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0415-01': 1, 'Certification No. C0415': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DISCARD-MFP': 2, 'T.BRING-OUT-STORAGE': 2}, 'A': {'A.ADMIN': 1, 'A.SERVICE': 1, 'A.NETWORK': 1, 'A.SECRET': 1, 'A.IC-CARD': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 4}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'or through the network. The TOE provides the protection function for the disclosure of the highly confidential documents stored in MFP. This TOE does not support the audit log function. Moreover, against the danger of': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 11, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 15, 'FCS_CKM.4': 5, 'FCS_COP.1.1': 1, 'FCS_CKM': 1, 'FCS_CAP.1': 1}, 'FDP': {'FDP_ITC.1': 3, 'FDP_ITC.2': 2, 'FDP_IFC.1': 9, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 7, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_RIP.1': 6, 'FDP_RIP.1.1': 1, 'FDP_ITC': 1}, 'FIA': {'FIA_AFL.1': 32, 'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_UAU.1': 9, 'FIA_UAU.2': 25, 'FIA_SOS.1': 21, 'FIA_SOS.1.1': 3, 'FIA_SOS': 2, 'FIA_UAU.2.1': 2, 'FIA_UID.1': 11, 'FIA_UID.2': 27, 'FIA_UAU.6': 8, 'FIA_UAU.6.1': 1, 'FIA_UAU.7': 10, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 3, 'FIA_SSL.3': 1}, 'FMT': {'FMT_MSA.3': 2, 'FMT_MOF.1': 23, 'FMT_MOF.1.1': 3, 'FMT_SMF.1': 38, 'FMT_SMR.1': 57, 'FMT_MTD.1': 36, 'FMT_MTD.1.1': 3, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2, 'FMT_MSA': 1}, 'FTA': {'FTA_SSL.3': 5, 'FTA_SSL.3.1': 1}}, 'cc_claims': {'O': {'O.DECRYPT': 3, 'O.OVERWRITE': 5, 'O.CRYPT': 3, 'O.MAIL': 5, 'O.CRYPTO': 2, 'O.PKI': 3, 'O.FAX': 2, 'O.DECRYPT-PRINT': 4, 'O.CRYPTO-KEY': 4, 'O.MAIL-CRYPTO': 2, 'O.MAIL-SIGN': 4, 'O.CRYPTO-CAPABILITY': 2, 'O.PKI-CAPABILITY': 8, 'O.FAX-CONTROL': 3}, 'T': {'T.DISCARD': 3, 'T.B': 1, 'T.DISCARD-MFP': 1, 'T.BRING': 2}, 'A': {'A.ADMIN': 5, 'A.SERVICE': 4, 'A.NETWORK': 5, 'A.SECRET': 3, 'A.IC': 2, 'A.IC-CARD': 1}, 'OE': {'OE.ADMIN': 3, 'OE.SERVICE': 3, 'OE.NETWORK': 4, 'OE.IC': 2, 'OE.SECRET': 3, 'OE.SETTING': 3, 'OE.DRIVER': 4, 'OE.FAX': 2, 'OE.CARD-USER': 2, 'OE.IC-CARD': 5, 'OE.SIGN': 2, 'OE.SETTING-SECURITY': 3, 'OE.FAX-UNIT': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 2}, '3DES': {'3DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186': 2, 'FIPS 180': 4, 'FIPS 186-2': 4, 'FIPS PUB 197': 2, 'FIPS 180-2': 2, 'FIPS186-2': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document transmitted between MFP and client PC. Also, it provides a function of protecting the scanned image': 1}}}
. - The report_filename property was set to
c0415_erpt.pdf
. - The st_filename property was set to
c0415_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0415
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0415_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0415_est.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name bizhub C754e / bizhub C654e PKI Card System Control Software. Version:A2X00Y0-0100-G00-80pki was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "6c9106df3d774631",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0415",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:konicaminolta:bizhub_c654e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c754:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c654:-:*:*:*:*:*:*:*",
"cpe:2.3:h:konicaminolta:bizhub_c754e:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"0100"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0415",
"certification_date": "2013-11-01",
"claim": "EAL3",
"enhanced": {
"assurance_level": "EAL3",
"cc_version": "3.1 Release4",
"cert_link": "https://www.ipa.go.jp/en/security/c0415_eimg.pdf",
"description": "PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as \u201cMFP\u201d), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions.: - Encryption Print Function: The function that receives the encrypted print data and can print the print data only with a right IC card. - S/MIME Encryption Function: The function to encrypt an image data when transmitting it by e-mail. - Digital Signature Function: The function to add the digital signature by using the function of IC card when transmitting an image data by e-mail. - HDD Encryption Function: The function to encrypt the image data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function: The function that deletes data area including the image data of HDD completely by deletion method compliant with various overwrite deletion standards. - Fax Unit Control Function: The function to prevent accessing the internal network using FAX as steppingstone.",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Information Security Evaluation Office",
"product": "bizhub C754e / bizhub C654e PKI Card System Control Software",
"product_type": "Control Software for digital MFP",
"report_link": "https://www.ipa.go.jp/en/security/c0415_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0415_est.pdf",
"toe_version": "A2X00Y0-0100-G00-80pki",
"vendor": "KONICA MINOLTA,INC."
},
"expiration_date": "2018-12-01",
"supplier": "KONICA MINOLTA, INC.",
"toe_japan_name": "bizhub C754e / bizhub C654e PKI Card System Control SoftwareA2X00Y0-0100-G00-80pki",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0415_it3462.html",
"toe_overseas_name": "bizhub C754e / bizhub C654e PKI Card System Control SoftwareA2X00Y0-0100-G00-80pki"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "KONICA MINOLTA, INC.",
"manufacturer_web": "https://www.konicaminolta.com/index.html",
"name": "bizhub C754e / bizhub C654e PKI Card System Control Software. Version:A2X00Y0-0100-G00-80pki",
"not_valid_after": "2018-12-05",
"not_valid_before": "2013-11-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0415_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0415-01": 1,
"Certification No. C0415": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN": 1,
"A.IC-CARD": 1,
"A.NETWORK": 1,
"A.SECRET": 1,
"A.SERVICE": 1
},
"T": {
"T.BRING-OUT-STORAGE": 2,
"T.DISCARD-MFP": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL3": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"or through the network. The TOE provides the protection function for the disclosure of the highly confidential documents stored in MFP. This TOE does not support the audit log function. Moreover, against the danger of": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 4
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20140212173321+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20140212173353+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 359141,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 34
},
"st_filename": "c0415_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 5,
"A.IC": 2,
"A.IC-CARD": 1,
"A.NETWORK": 5,
"A.SECRET": 3,
"A.SERVICE": 4
},
"O": {
"O.CRYPT": 3,
"O.CRYPTO": 2,
"O.CRYPTO-CAPABILITY": 2,
"O.CRYPTO-KEY": 4,
"O.DECRYPT": 3,
"O.DECRYPT-PRINT": 4,
"O.FAX": 2,
"O.FAX-CONTROL": 3,
"O.MAIL": 5,
"O.MAIL-CRYPTO": 2,
"O.MAIL-SIGN": 4,
"O.OVERWRITE": 5,
"O.PKI": 3,
"O.PKI-CAPABILITY": 8
},
"OE": {
"OE.ADMIN": 3,
"OE.CARD-USER": 2,
"OE.DRIVER": 4,
"OE.FAX": 2,
"OE.FAX-UNIT": 2,
"OE.IC": 2,
"OE.IC-CARD": 5,
"OE.NETWORK": 4,
"OE.SECRET": 3,
"OE.SERVICE": 3,
"OE.SETTING": 3,
"OE.SETTING-SECURITY": 3,
"OE.SIGN": 2
},
"T": {
"T.B": 1,
"T.BRING": 2,
"T.DISCARD": 3,
"T.DISCARD-MFP": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CAP.1": 1,
"FCS_CKM": 1,
"FCS_CKM.1": 11,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 5,
"FCS_COP.1": 15,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_IFC.1": 9,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 7,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC": 1,
"FDP_ITC.1": 3,
"FDP_ITC.2": 2,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 32,
"FIA_AFL.1.1": 3,
"FIA_AFL.1.2": 3,
"FIA_SOS": 2,
"FIA_SOS.1": 21,
"FIA_SOS.1.1": 3,
"FIA_SSL.3": 1,
"FIA_UAU.1": 9,
"FIA_UAU.2": 25,
"FIA_UAU.2.1": 2,
"FIA_UAU.6": 8,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 10,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 11,
"FIA_UID.2": 27,
"FIA_UID.2.1": 3
},
"FMT": {
"FMT_MOF.1": 23,
"FMT_MOF.1.1": 3,
"FMT_MSA": 1,
"FMT_MSA.3": 2,
"FMT_MTD.1": 36,
"FMT_MTD.1.1": 3,
"FMT_SMF.1": 38,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 57,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 2
},
"FTA": {
"FTA_SSL.3": 5,
"FTA_SSL.3.1": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document transmitted between MFP and client PC. Also, it provides a function of protecting the scanned image": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS 180": 4,
"FIPS 180-2": 2,
"FIPS 186": 2,
"FIPS 186-2": 4,
"FIPS PUB 197": 2,
"FIPS186-2": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"3DES": 1
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20140206142648+09\u002700\u0027",
"/Creator": "CubePDF",
"/Keywords": "",
"/ModDate": "D:20140206142650+09\u002700\u0027",
"/Producer": "GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 500291,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 54
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0415_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0415_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "12712efa0ffc3d26015de6a45de157ea8a47b3617ed51c82ab91cde1c4a70b2e",
"txt_hash": "9539d78e34c06c98e3e8b63efab0a9cd0eb36c059365e15c4bdd773822808c63"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "926538c815928056f7a4fd9fd9a3a466bfcf35ab561d12040c7683fb3af36b86",
"txt_hash": "0748b6de8ee287ebd7e2f665701032b846fca49796c5a1799ea9a2f27f15dfd7"
}
},
"status": "archived"
}