bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00
CSV information ?
Status | archived |
---|---|
Valid from | 31.08.2010 |
Valid until | 01.09.2015 |
Scheme | 🇯🇵 JP |
Manufacturer | Konica Minolta Business Technologies, Inc |
Category | Other Devices and Systems |
Security level | EAL3 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSLSecurity level
EAL3Claims
T.DISCARD-MFP, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BO, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRI, T.UNEXPECTED-TRANS, T.ACCESS-SETTING, T.BACKUP-RESTORE, T.ACCESS-PRIVATE-BOX, T.ACCESS-SECURE-PRINT, T.UNEXPECTED-TRANSMISSION, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTINGCertificates
CRP-C0265-01, Certification No. C0265Certification process
of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image dataStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | untitled |
---|---|
Creation date | D:20101213141346+09'00' |
Modification date | D:20101213141346+09'00' |
Pages | 38 |
Producer | Acrobat Distiller 6.0 (Windows) |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, 3DESProtocols
SSLSecurity level
EAL3Claims
O.REGISTERED-USER, O.PRIVATE-BOX, O.PUBLIC-BOX, O.GROUP-BOX, O.SECURE-PRINT, O.CONFIG, O.OVERWRITE-ALL, O.CRYPT-KEY, O.FAX-CONTROL, O.TRUSTED-PASS, O.CRYPTO-MAIL, O.AUTH-CAPABILITY, O.CRYPTO-CAPABILITY, O.CRYPTO-KEY, T.DISCARD-MFP, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.UNEXPECTED-TRANSMISSION, T.ACCESS-SETTING, T.BACKUP-RESTORE, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.SETTING, OE.FEED-BACK, OE.SERVER, OE.SESSION, OE.ADMIN, OE.SERVICE, OE.NETWORK, OE.FAX-UNIT, OE.SECRET, OE.SETTING-SECURITYSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_COP, FCS_CKM, FCS_CAP.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC, FDP_ACP.1, FDP_UAU.7, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1, FIA_UAU.2.1, FIA_UID.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS, FIA_SSL.3, FIA_UAU, FIA_MSA.3, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MAS.1, FMT_MSA, FMT_SMS.1, FMT_SOS.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Certification process
main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data inStandards
FIPS 186-2, FIPS PUB 197, X.509, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | Microsoft Word - C0265_ASE.doc |
---|---|
Creation date | D:20101202154851+09'00' |
Modification date | D:20101202155121+09'00' |
Pages | 111 |
Creator | Word 用 Acrobat PDFMaker 7.0 |
Producer | Acrobat Distiller 7.0 (Windows) |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.2Similar certificates
Scheme data ?
Cert Id | JISEC-CC-CRP-C0265 | |
---|---|---|
Supplier | Konica Minolta Business Technologies, Inc. | |
Toe Overseas Name | bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software A1UD0Y0-0100-GM0-00 | |
Expiration Date | 01.04.2011 | |
Claim | EAL3 | |
Certification Date | 01.08.2010 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0265_it9283.html | |
Toe Japan Name | bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software A1UD0Y0-0100-GM0-00 | |
Enhanced | ||
Product | Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software | |
Toe Version | A1UD0Y0-0100-GM0-00 | |
Product Type | Control Software for digital MFP | |
Cc Version | 3.1 | |
Assurance Level | EAL3 | |
Vendor | Konica Minolta Business Technologies, Inc. | |
Evaluation Facility | Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security | |
Report Link | https://www.ipa.go.jp/en/security/c0265_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0265_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0265_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as 溺FP・ or through the network, and provides the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in MFP, TOE can encrypt all the data written in HDD including image data using ASIC (Application Specific Integrated Circuit). Besides, TOE provides the function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards, and the function that controls the access from the public telephone line against the danger using Fax function as a steppingstone to access internal network. TOE security functionality TOE provides the following security functions. - Administrator function - SNMP administrator function - Service mode function - User function - User box function - Secure print function - ID & print function - All area overwrite deletion function - Encryption key generation function - Authentication Failure Frequency Reset function - Trusted Channel function - S/MIME encryption processing function - External Server authentication operation support function - ASIC support function - WebDAV administrator function - Fax unit control function |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'JISEC-CC-CRP-C0265', 'supplier': 'Konica Minolta Business Technologies, Inc.', 'toe_overseas_name': 'bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software A1UD0Y0-0100-GM0-00', 'expiration_date': '2011-04-01', 'claim': 'EAL3', 'certification_date': '2010-08-01', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0265_it9283.html', 'toe_japan_name': 'bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software A1UD0Y0-0100-GM0-00', 'enhanced': {'product': 'Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software', 'toe_version': 'A1UD0Y0-0100-GM0-00', 'product_type': 'Control Software for digital MFP', 'cc_version': '3.1', 'assurance_level': 'EAL3', 'vendor': 'Konica Minolta Business Technologies, Inc.', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'report_link': 'https://www.ipa.go.jp/en/security/c0265_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0265_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0265_est.pdf', 'description': 'PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as 溺FP・ or through the network, and provides the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in MFP, TOE can encrypt all the data written in HDD including image data using ASIC (Application Specific Integrated Circuit). Besides, TOE provides the function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards, and the function that controls the access from the public telephone line against the danger using Fax function as a steppingstone to access internal network. TOE security functionality TOE provides the following security functions. - Administrator function - SNMP administrator function - Service mode function - User function - User box function - Secure print function - ID & print function - All area overwrite deletion function - Encryption key generation function - Authentication Failure Frequency Reset function - Trusted Channel function - S/MIME encryption processing function - External Server authentication operation support function - ASIC support function - WebDAV administrator function - Fax unit control function'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9ce76564e4cd329067e9d2d29e7a1df2698eda7d0b886da699025c33de25ec06', 'txt_hash': '4b1ea53594c3f02c6cc3fcfcb59106e5a80265bed48db5491db4671033cc0439'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '98581f0cf5fb83011a101f34d087d10d244b797b75af3fcef63a691c39a2c09a', 'txt_hash': '8a3cedd84553842a11f6337bae2d2129f85b0ab99932123f5153762be6f870f0'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 235716, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/ModDate': "D:20101213141346+09'00'", '/CreationDate': "D:20101213141346+09'00'", '/Title': 'untitled', '/Producer': 'Acrobat Distiller 6.0 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 772548, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 111, '/Author': '', '/CreationDate': "D:20101202154851+09'00'", '/Creator': 'Word 用 Acrobat PDFMaker 7.0', '/ModDate': "D:20101202155121+09'00'", '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/Title': 'Microsoft Word - C0265_ASE.doc', '/_AdHocReviewCycleID': '-379351262', '/_PreviousAdHocReviewCycleID': '467482879', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0265-01': 1, 'Certification No. C0265': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DISCARD-MFP': 2, 'T.BRING-OUT-STORAGE': 2, 'T.ACCESS-PRIVATE-BO': 1, 'T.ACCESS-PUBLIC-BOX': 2, 'T.ACCESS-GROUP-BOX': 2, 'T.ACCESS-SECURE-PRI': 1, 'T.UNEXPECTED-TRANS': 1, 'T.ACCESS-SETTING': 2, 'T.BACKUP-RESTORE': 2, 'T.ACCESS-PRIVATE-BOX': 1, 'T.ACCESS-SECURE-PRINT': 1, 'T.UNEXPECTED-TRANSMISSION': 1}, 'A': {'A.ADMIN': 1, 'A.SERVICE': 1, 'A.NETWORK': 1, 'A.SECRET': 1, 'A.SETTING': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 9, 'FCS_CKM.4': 4, 'FCS_COP.1.1': 1, 'FCS_COP': 1, 'FCS_CKM': 2, 'FCS_CAP.1': 2}, 'FDP': {'FDP_RIP.1': 1, 'FDP_ITC.1': 4, 'FDP_ITC.2': 2, 'FDP_ACC.1': 72, 'FDP_ACC.1.1': 4, 'FDP_ACF.1': 55, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 4, 'FDP_ACF.1.3': 4, 'FDP_ACF.1.4': 4, 'FDP_IFC.1': 14, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 6, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC': 1, 'FDP_ACP.1': 1, 'FDP_UAU.7': 1}, 'FIA': {'FIA_AFL.1': 71, 'FIA_AFL.1.1': 9, 'FIA_AFL.1.2': 9, 'FIA_UAU.1': 43, 'FIA_UAU.2': 44, 'FIA_ATD.1': 29, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 44, 'FIA_SOS.1.1': 5, 'FIA_SOS.2': 9, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UID.1': 31, 'FIA_UAU.2.1': 4, 'FIA_UID.2': 48, 'FIA_UAU.6': 11, 'FIA_UAU.6.1': 1, 'FIA_UAU.7': 19, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 7, 'FIA_USB.1': 26, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS': 1, 'FIA_SSL.3': 1, 'FIA_UAU': 2, 'FIA_MSA.3': 1}, 'FMT': {'FMT_MSA.3': 42, 'FMT_MOF.1': 31, 'FMT_MOF.1.1': 3, 'FMT_SMF.1': 110, 'FMT_SMR.1': 171, 'FMT_MSA.1': 34, 'FMT_MSA.1.1': 3, 'FMT_MSA.3.1': 6, 'FMT_MSA.3.2': 7, 'FMT_MTD.1': 119, 'FMT_MTD.1.1': 13, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 6, 'FMT_SMR.1.2': 6, 'FMT_MAS.1': 1, 'FMT_MSA': 5, 'FMT_SMS.1': 1, 'FMT_SOS.1': 1}, 'FTA': {'FTA_SSL.3': 6, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.REGISTERED-USER': 14, 'O.PRIVATE-BOX': 5, 'O.PUBLIC-BOX': 8, 'O.GROUP-BOX': 5, 'O.SECURE-PRINT': 8, 'O.CONFIG': 11, 'O.OVERWRITE-ALL': 7, 'O.CRYPT-KEY': 1, 'O.FAX-CONTROL': 7, 'O.TRUSTED-PASS': 7, 'O.CRYPTO-MAIL': 4, 'O.AUTH-CAPABILITY': 7, 'O.CRYPTO-CAPABILITY': 7, 'O.CRYPTO-KEY': 3}, 'T': {'T.DISCARD-MFP': 3, 'T.BRING-OUT-STORAGE': 2, 'T.ACCESS-PRIVATE-BOX': 3, 'T.ACCESS-PUBLIC-BOX': 2, 'T.ACCESS-GROUP-BOX': 3, 'T.ACCESS-SECURE-PRINT': 2, 'T.UNEXPECTED-TRANSMISSION': 3, 'T.ACCESS-SETTING': 2, 'T.BACKUP-RESTORE': 3}, 'A': {'A.ADMIN': 3, 'A.SERVICE': 2, 'A.NETWORK': 4, 'A.SECRET': 2, 'A.SETTING': 3}, 'OE': {'OE.FEED-BACK': 10, 'OE.SERVER': 6, 'OE.SESSION': 10, 'OE.ADMIN': 3, 'OE.SERVICE': 3, 'OE.NETWORK': 3, 'OE.FAX-UNIT': 3, 'OE.SECRET': 3, 'OE.SETTING-SECURITY': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}, 'DES': {'3DES': {'3DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 4}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-2': 6, 'FIPS PUB 197': 3}, 'X509': {'X.509': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in': 1}}}
. - The report_filename property was set to
c0265_erpt.pdf
. - The st_filename property was set to
c0265_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0265
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_est.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "e1cef4b86461e7ab",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0265",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"363",
"283",
"223",
"00",
"7828",
"0100",
"423"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0265",
"certification_date": "2010-08-01",
"claim": "EAL3",
"enhanced": {
"assurance_level": "EAL3",
"cc_version": "3.1",
"cert_link": "https://www.ipa.go.jp/en/security/c0265_eimg.pdf",
"description": "PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as \u6ebaFP\u30fb or through the network, and provides the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in MFP, TOE can encrypt all the data written in HDD including image data using ASIC (Application Specific Integrated Circuit). Besides, TOE provides the function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards, and the function that controls the access from the public telephone line against the danger using Fax function as a steppingstone to access internal network. TOE security functionality TOE provides the following security functions. - Administrator function - SNMP administrator function - Service mode function - User function - User box function - Secure print function - ID \u0026 print function - All area overwrite deletion function - Encryption key generation function - Authentication Failure Frequency Reset function - Trusted Channel function - S/MIME encryption processing function - External Server authentication operation support function - ASIC support function - WebDAV administrator function - Fax unit control function",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
"product": "Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software",
"product_type": "Control Software for digital MFP",
"report_link": "https://www.ipa.go.jp/en/security/c0265_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0265_est.pdf",
"toe_version": "A1UD0Y0-0100-GM0-00",
"vendor": "Konica Minolta Business Technologies, Inc."
},
"expiration_date": "2011-04-01",
"supplier": "Konica Minolta Business Technologies, Inc.",
"toe_japan_name": "bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software A1UD0Y0-0100-GM0-00",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0265_it9283.html",
"toe_overseas_name": "bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software A1UD0Y0-0100-GM0-00"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Konica Minolta Business Technologies, Inc",
"manufacturer_web": "https://www.konicaminolta.com/",
"name": "bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00",
"not_valid_after": "2015-09-01",
"not_valid_before": "2010-08-31",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0265_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0265-01": 1,
"Certification No. C0265": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN": 1,
"A.NETWORK": 1,
"A.SECRET": 1,
"A.SERVICE": 1,
"A.SETTING": 1
},
"T": {
"T.ACCESS-GROUP-BOX": 2,
"T.ACCESS-PRIVATE-BO": 1,
"T.ACCESS-PRIVATE-BOX": 1,
"T.ACCESS-PUBLIC-BOX": 2,
"T.ACCESS-SECURE-PRI": 1,
"T.ACCESS-SECURE-PRINT": 1,
"T.ACCESS-SETTING": 2,
"T.BACKUP-RESTORE": 2,
"T.BRING-OUT-STORAGE": 2,
"T.DISCARD-MFP": 2,
"T.UNEXPECTED-TRANS": 1,
"T.UNEXPECTED-TRANSMISSION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL3": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 7
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20101213141346+09\u002700\u0027",
"/ModDate": "D:20101213141346+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "untitled",
"pdf_file_size_bytes": 235716,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "c0265_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 3,
"A.NETWORK": 4,
"A.SECRET": 2,
"A.SERVICE": 2,
"A.SETTING": 3
},
"O": {
"O.AUTH-CAPABILITY": 7,
"O.CONFIG": 11,
"O.CRYPT-KEY": 1,
"O.CRYPTO-CAPABILITY": 7,
"O.CRYPTO-KEY": 3,
"O.CRYPTO-MAIL": 4,
"O.FAX-CONTROL": 7,
"O.GROUP-BOX": 5,
"O.OVERWRITE-ALL": 7,
"O.PRIVATE-BOX": 5,
"O.PUBLIC-BOX": 8,
"O.REGISTERED-USER": 14,
"O.SECURE-PRINT": 8,
"O.TRUSTED-PASS": 7
},
"OE": {
"OE.ADMIN": 3,
"OE.FAX-UNIT": 3,
"OE.FEED-BACK": 10,
"OE.NETWORK": 3,
"OE.SECRET": 3,
"OE.SERVER": 6,
"OE.SERVICE": 3,
"OE.SESSION": 10,
"OE.SETTING-SECURITY": 3
},
"T": {
"T.ACCESS-GROUP-BOX": 3,
"T.ACCESS-PRIVATE-BOX": 3,
"T.ACCESS-PUBLIC-BOX": 2,
"T.ACCESS-SECURE-PRINT": 2,
"T.ACCESS-SETTING": 2,
"T.BACKUP-RESTORE": 3,
"T.BRING-OUT-STORAGE": 2,
"T.DISCARD-MFP": 3,
"T.UNEXPECTED-TRANSMISSION": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VLA.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CAP.1": 2,
"FCS_CKM": 2,
"FCS_CKM.1": 10,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 4,
"FCS_COP": 1,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 72,
"FDP_ACC.1.1": 4,
"FDP_ACF.1": 55,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.3": 4,
"FDP_ACF.1.4": 4,
"FDP_ACP.1": 1,
"FDP_IFC.1": 14,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 6,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC": 1,
"FDP_ITC.1": 4,
"FDP_ITC.2": 2,
"FDP_RIP.1": 1,
"FDP_UAU.7": 1
},
"FIA": {
"FIA_AFL.1": 71,
"FIA_AFL.1.1": 9,
"FIA_AFL.1.2": 9,
"FIA_ATD.1": 29,
"FIA_ATD.1.1": 1,
"FIA_MSA.3": 1,
"FIA_SOS": 1,
"FIA_SOS.1": 44,
"FIA_SOS.1.1": 5,
"FIA_SOS.2": 9,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_SSL.3": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 43,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UAU.2": 44,
"FIA_UAU.2.1": 4,
"FIA_UAU.6": 11,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 19,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 31,
"FIA_UID.2": 48,
"FIA_UID.2.1": 7,
"FIA_USB.1": 26,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MAS.1": 1,
"FMT_MOF.1": 31,
"FMT_MOF.1.1": 3,
"FMT_MSA": 5,
"FMT_MSA.1": 34,
"FMT_MSA.1.1": 3,
"FMT_MSA.3": 42,
"FMT_MSA.3.1": 6,
"FMT_MSA.3.2": 7,
"FMT_MTD.1": 119,
"FMT_MTD.1.1": 13,
"FMT_SMF.1": 110,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 171,
"FMT_SMR.1.1": 6,
"FMT_SMR.1.2": 6,
"FMT_SMS.1": 1,
"FMT_SOS.1": 1
},
"FTA": {
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 4
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
},
"FIPS": {
"FIPS 186-2": 6,
"FIPS PUB 197": 3
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
},
"DES": {
"3DES": {
"3DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20101202154851+09\u002700\u0027",
"/Creator": "Word \u7528 Acrobat PDFMaker 7.0",
"/ModDate": "D:20101202155121+09\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0 (Windows)",
"/Title": "Microsoft Word - C0265_ASE.doc",
"/_AdHocReviewCycleID": "-379351262",
"/_PreviousAdHocReviewCycleID": "467482879",
"pdf_file_size_bytes": 772548,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 111
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9ce76564e4cd329067e9d2d29e7a1df2698eda7d0b886da699025c33de25ec06",
"txt_hash": "4b1ea53594c3f02c6cc3fcfcb59106e5a80265bed48db5491db4671033cc0439"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "98581f0cf5fb83011a101f34d087d10d244b797b75af3fcef63a691c39a2c09a",
"txt_hash": "8a3cedd84553842a11f6337bae2d2129f85b0ab99932123f5153762be6f870f0"
}
},
"status": "archived"
}