bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software Version: A2X00Y0-0100-G00-53

CSV information ?

Status archived
Valid from 29.10.2012
Valid until 13.11.2017
Scheme 🇯🇵 JP
Manufacturer Konica Minolta Business Technologies, Inc
Category Other Devices and Systems
Security level EAL3

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0374

Certificate ?

Certification report ?

Extracted keywords

Protocols
SSL

Vendor
Microsoft

Security level
EAL3
Claims
T.DISCARD-MFP, T.BRING-OUT-STORA, T.ACCESS-PRIVATE-, T.ACCESS-PUBLIC-, T.ACCESS-GROUP-, T.ACCESS-SECURE-, T.UNEXPECTED-TRA, T.ACCESS-SETTING, T.BACKUP-RESTORE, T.BRING-OUT-STORAGE, T.ACCESS-PRIVATE-BOX, T.ACCESS-PUBLIC-BOX, T.ACCESS-GROUP-BOX, T.ACCESS-SECURE-PRINT, T.UNEXPECTED-TRANSMISSION, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET
Certificates
CRP-C0374-01, Certification No. C0374

Certification process
or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Creation date D:20130419152138+09'00'
Modification date D:20130419152219+09'00'
Pages 41
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES
Protocols
SSL

Security level
EAL3
Claims
O.REGISTERED, O.PRIVATE, O.PUBLIC, O.GROUP, O.SECURE, O.CONFIG, O.OVERWRITE, O.CRYPT, O.TRUSTED, O.CRYPTO, O.FAX, O.AUTH, O.AUDIT, O.REGISTERED-USER, O.PRIVATE-BOX, O.PUBLIC-BOX, O.GROUP-BOX, O.SECURE-PRINT, O.CRYPTO-KEY, O.TRUSTED-PATH, O.CRYPTO-MAIL, O.FAX-CONTROL, O.CRYPTO-CAPABILITY, O.AUTH-CAPABILITY, O.AUDIT-LOGGED, T.DISCARD, T.BRING, T.ACCESS, T.UNEXPECTED, T.BACKUP, T.DISCARD-MFP, T.ACCESS-PRIVATE-BOX, T.ACCESS-GROUP-BOX, T.UNEXPECTED-TRANSMISSION, T.BACKUP-RESTORE, A.ADMIN, A.SERVICE, A.NETWORK, A.SECRET, A.A, OE.FEED, OE.S, OE.SESSION, OE.ADMIN, OE.SERVICE, OE.NETWORK, OE.FAX, OE.SECRET, OE.SETTING, OE.AUDIT, OE.FEED-BACK, OE.SERVER, OE.FAX-UNIT, OE.SETTING-SECURITY, OE.AUDIT_STORAGE-PR, OE.AUDIT_ACCESS-AUT, OE.AUDIT-REVIEWED, OE.AUDIT_STORAGE-PROTECTED, OE.AUDIT_ACESS-AUTHORIZED
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GNE.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FAU_STG.4, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1, FCS_COP, FCS_CKM, FCS_CAP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP, FDP_RIP.1.1, FDP_RIP.1, FDP_ITC, FDP_ACP.1, FDP_UAU.7, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1, FIA_UAU.2.1, FIA_UID.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID, FIA_SSL.3, FIA_UAU, FIA_MSA.3, FMT_MSA.3, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MAS.1, FMT_MSA, FMT_SOS.1, FPT_STM.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3

Certification process
main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in

Standards
FIPS 186, FIPS 186-2, FIPS PUB 197, X.509, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Creation date D:20130415144110+09'00'
Modification date D:20130415144114+09'00'
Pages 114
Creator CubePDF
Producer GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0374

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DVS.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Similar certificates

Name Certificate ID
bizhub 754 / bizhub 654 / ineo 754 / ineo 654 Control Software, Version: A55V0Y0-0100-G00-10 JISEC-CC-CRP-C0398 Compare
bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software Version: A0R50Y0-0100-G00-11 (System Controller), A0R50Y0-1D00-G00-10 (BIOS Controller) JISEC-CC-CRP-C0190 Compare
bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software Version:A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller) JISEC-CC-CRP-C0223 Compare
bizhub C754 / bizhub C654 PKI Card System Control Software Version:A2X00Y0-0100-G00-53pki JISEC-CC-CRP-C0375 Compare
bizhub C554 / bizhub C454 / bizhub C364 / bizhub C284 / bizhub C224 / bizhub C7828 / bizhub C7822 / ineo+ 554 / ineo+ 454 / ineo+ 364 / ineo+ 284 / ineo+ 224 Control Software Version: A2XK0Y0-0100-G00-56 JISEC-CC-CRP-C0378 Compare
bizhub 754 / bizhub 654 PKI Card System Control Software, version: A55V0Y0-0100-G00-10pki JISEC-CC-CRP-C0391 Compare
bizhub 750 / bizhub 600 / ineo 750 / ineo 600 Control Software MFP system controller program : 57AA-0100-G00-21-000 MFP image controller program : 57AA-1000-G00-21-000 JISEC-CC-CRP-C0085 Compare
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00 JISEC-CC-CRP-C0265 Compare
bizhub 652 / bizhub 602 / bizhub 552 / bizhub 502 / ineo 652 / ineo 602 / ineo 552 / ineo 502 Control Software Version: A2WU0Y0-0100-GM0-00 JISEC-CC-CRP-C0290 Compare
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 / N607 / N606 / N605 Control Software Version: A1UD0Y0-0100-GM0-04 JISEC-CC-CRP-C0314 Compare
bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version: A0P00Y0-0100-GM0-24 JISEC-CC-CRP-C0312 Compare
bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version:A0P00Y0-0100-GM0-22 JISEC-CC-CRP-C0260 Compare
bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software Version:A11U-0100-G10-06 JISEC-CC-CRP-C0233 Compare
bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c Control Software Version:A0ED0Y0-0100-GM0-22 JISEC-CC-CRP-C0259 Compare
bizhub C360 / bizhub C280 / bizhub C220 / bizhub C7728 / bizhub C7722 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c / D407 / D406 / D405 Control Software Version: A0ED0Y0-0100-GM0-24 JISEC-CC-CRP-C0313 Compare
bizhub 500 / bizhub 420 / bizhub 360 /ineo 500 / ineo 420 / ineo 360 Control Software 50GA-0100-G00-30-000 JISEC-CC-CRP-C0094 Compare
bizhub C754e / bizhub C654e PKI Card System Control Software. Version:A2X00Y0-0100-G00-80pki JISEC-CC-CRP-C0415 Compare
bizhub C652 / bizhub C552 / bizhub C452 / ineo+ 652 / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version:A0P00Y0-0100-GM0-12 JISEC-CC-CRP-C0241 Compare
bizhub C360 / bizhub C280 / bizhub C220 / ineo+ 360 / ineo+ 280 / ineo+ 220 / VarioLink 3622c / VarioLink 2822c / VarioLink 2222c Control Software Version:A0ED0Y0-0100-GM0-12 JISEC-CC-CRP-C0240 Compare
Showing 5 out of 19.

Scheme data ?

Cert Id JISEC-CC-CRP-C0374
Supplier Konica Minolta Business Technologies, Inc.
Toe Overseas Name bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software A2X00Y0-0100-G00-53
Expiration Date 01.11.2017
Claim EAL3
Certification Date 01.10.2012
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0374_it1384.html
Toe Japan Name bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Zentai Seigyo Software A2X00Y0-0100-G00-53
Enhanced
Product Japanese:bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Zentai Seigyo Software English:bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software
Toe Version A2X00Y0-0100-G00-53
Product Type Control Software for digital MFP
Cc Version 3.1
Assurance Level EAL3
Vendor Konica Minolta Business Technologies, Inc.
Evaluation Facility Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
Report Link https://www.ipa.go.jp/en/security/c0374_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/c0374_eimg.pdf
Target Link https://www.ipa.go.jp/en/security/c0374_est.pdf
Description PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.

References ?

No references are available for this certificate.

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'JISEC-CC-CRP-C0374', 'supplier': 'Konica Minolta Business Technologies, Inc.', 'toe_overseas_name': 'bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software A2X00Y0-0100-G00-53', 'expiration_date': '2017-11-01', 'claim': 'EAL3', 'certification_date': '2012-10-01', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0374_it1384.html', 'toe_japan_name': 'bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Zentai Seigyo Software A2X00Y0-0100-G00-53', 'enhanced': {'product': 'Japanese:bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Zentai Seigyo Software English:bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software', 'toe_version': 'A2X00Y0-0100-G00-53', 'product_type': 'Control Software for digital MFP', 'cc_version': '3.1', 'assurance_level': 'EAL3', 'vendor': 'Konica Minolta Business Technologies, Inc.', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Information Security Evaluation Office', 'report_link': 'https://www.ipa.go.jp/en/security/c0374_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0374_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0374_est.pdf', 'description': 'PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.'}}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b03a5439a633bcb1994973d07656aa54ee313c79dcd1dd9bd185abb8b87f89d3', 'txt_hash': '68a9955a5ebc33b4e48380729aec317489c2a7c40d8397a666cbb16bd715b560'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b161e5cc6d2b3a4c4a74f89c370f338bb9a581a6474f5b2afeaada46d934b346', 'txt_hash': 'ae10f2088ee93b218b4914b3f1fbfb6e4f3d349a8ed9c3c127358cdadc4c6a87'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 473698, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 41, '/CreationDate': "D:20130419152138+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20130419152219+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1171475, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 114, '/Producer': 'GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA', '/CreationDate': "D:20130415144110+09'00'", '/ModDate': "D:20130415144114+09'00'", '/Title': '', '/Creator': 'CubePDF', '/Author': '', '/Subject': '', '/Keywords': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0374-01': 1, 'Certification No. C0374': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DISCARD-MFP': 2, 'T.BRING-OUT-STORA': 1, 'T.ACCESS-PRIVATE-': 1, 'T.ACCESS-PUBLIC-': 1, 'T.ACCESS-GROUP-': 1, 'T.ACCESS-SECURE-': 1, 'T.UNEXPECTED-TRA': 1, 'T.ACCESS-SETTING': 2, 'T.BACKUP-RESTORE': 2, 'T.BRING-OUT-STORAGE': 1, 'T.ACCESS-PRIVATE-BOX': 1, 'T.ACCESS-PUBLIC-BOX': 1, 'T.ACCESS-GROUP-BOX': 1, 'T.ACCESS-SECURE-PRINT': 1, 'T.UNEXPECTED-TRANSMISSION': 1}, 'A': {'A.ADMIN': 1, 'A.SERVICE': 1, 'A.NETWORK': 1, 'A.SECRET': 1}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 11, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GNE.2.1': 1, 'FAU_SAR.1': 7, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 3, 'FAU_SAR.2.1': 1, 'FAU_STG.1': 8, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 2, 'FAU_STG.4': 4}, 'FCS': {'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 11, 'FCS_CKM.4': 4, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 9, 'FCS_COP': 1, 'FCS_CKM': 2, 'FCS_CAP.1': 2}, 'FDP': {'FDP_ITC.1': 4, 'FDP_ITC.2': 2, 'FDP_ACC.1': 84, 'FDP_ACC.1.1': 4, 'FDP_ACF.1': 53, 'FDP_ACF': 4, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 4, 'FDP_ACF.1.3': 4, 'FDP_ACF.1.4': 4, 'FDP_IFC.1': 15, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 7, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_RIP': 1, 'FDP_RIP.1.1': 1, 'FDP_RIP.1': 1, 'FDP_ITC': 1, 'FDP_ACP.1': 1, 'FDP_UAU.7': 1}, 'FIA': {'FIA_AFL.1': 90, 'FIA_AFL.1.1': 8, 'FIA_AFL.1.2': 8, 'FIA_UAU.1': 47, 'FIA_UAU.2': 55, 'FIA_ATD.1': 30, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 52, 'FIA_SOS.1.1': 4, 'FIA_SOS.2': 10, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UID.1': 32, 'FIA_UAU.2.1': 4, 'FIA_UID.2': 84, 'FIA_UAU.6': 12, 'FIA_UAU.6.1': 1, 'FIA_UAU.7': 20, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 7, 'FIA_USB.1': 27, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID': 1, 'FIA_SSL.3': 1, 'FIA_UAU': 2, 'FIA_MSA.3': 1}, 'FMT': {'FMT_MSA.3': 52, 'FMT_MOF.1': 63, 'FMT_MOF.1.1': 5, 'FMT_SMF.1': 130, 'FMT_SMR.1': 202, 'FMT_MSA.1': 43, 'FMT_MSA.1.1': 3, 'FMT_MSA.3.1': 8, 'FMT_MSA.3.2': 7, 'FMT_MTD.1': 168, 'FMT_MTD.1.1': 15, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 6, 'FMT_SMR.1.2': 6, 'FMT_MAS.1': 1, 'FMT_MSA': 5, 'FMT_SOS.1': 1}, 'FPT': {'FPT_STM.1': 7}, 'FTA': {'FTA_SSL.3': 7, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.REGISTERED': 3, 'O.PRIVATE': 3, 'O.PUBLIC': 3, 'O.GROUP': 3, 'O.SECURE': 4, 'O.CONFIG': 12, 'O.OVERWRITE': 8, 'O.CRYPT': 4, 'O.TRUSTED': 3, 'O.CRYPTO': 5, 'O.FAX': 2, 'O.AUTH': 2, 'O.AUDIT': 2, 'O.REGISTERED-USER': 12, 'O.PRIVATE-BOX': 3, 'O.PUBLIC-BOX': 6, 'O.GROUP-BOX': 3, 'O.SECURE-PRINT': 6, 'O.CRYPTO-KEY': 2, 'O.TRUSTED-PATH': 5, 'O.CRYPTO-MAIL': 2, 'O.FAX-CONTROL': 6, 'O.CRYPTO-CAPABILITY': 4, 'O.AUTH-CAPABILITY': 5, 'O.AUDIT-LOGGED': 3}, 'T': {'T.DISCARD': 3, 'T.BRING': 3, 'T.ACCESS': 19, 'T.UNEXPECTED': 2, 'T.BACKUP': 3, 'T.DISCARD-MFP': 1, 'T.ACCESS-PRIVATE-BOX': 1, 'T.ACCESS-GROUP-BOX': 1, 'T.UNEXPECTED-TRANSMISSION': 1, 'T.BACKUP-RESTORE': 1}, 'A': {'A.ADMIN': 3, 'A.SERVICE': 4, 'A.NETWORK': 6, 'A.SECRET': 3, 'A.A': 2}, 'OE': {'OE.FEED': 2, 'OE.S': 1, 'OE.SESSION': 10, 'OE.ADMIN': 3, 'OE.SERVICE': 3, 'OE.NETWORK': 4, 'OE.FAX': 2, 'OE.SECRET': 3, 'OE.SETTING': 2, 'OE.AUDIT': 3, 'OE.FEED-BACK': 8, 'OE.SERVER': 5, 'OE.FAX-UNIT': 2, 'OE.SETTING-SECURITY': 2, 'OE.AUDIT_STORAGE-PR': 1, 'OE.AUDIT_ACCESS-AUT': 1, 'OE.AUDIT-REVIEWED': 2, 'OE.AUDIT_STORAGE-PROTECTED': 1, 'OE.AUDIT_ACESS-AUTHORIZED': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 2}, '3DES': {'3DES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 5}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186': 2, 'FIPS 186-2': 4, 'FIPS PUB 197': 2}, 'X509': {'X.509': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in': 1}}}.
    • The report_filename property was set to c0374_erpt.pdf.
    • The st_filename property was set to c0374_est.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0374.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0374_erpt.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0374_est.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software Version: A2X00Y0-0100-G00-53 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "847d7d7e9ca1605c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0374",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:h:konicaminolta:bizhub_c754:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:konicaminolta:bizhub_654:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:konicaminolta:bizhub_c654:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:konicaminolta:bizhub_754:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "754",
        "53",
        "654",
        "0100"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "JISEC-CC-CRP-C0374",
      "certification_date": "2012-10-01",
      "claim": "EAL3",
      "enhanced": {
        "assurance_level": "EAL3",
        "cc_version": "3.1",
        "cert_link": "https://www.ipa.go.jp/en/security/c0374_eimg.pdf",
        "description": "PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as \u201cMFP\u201d), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.",
        "evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Information Security Evaluation Office",
        "product": "Japanese:bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Zentai Seigyo Software English:bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software",
        "product_type": "Control Software for digital MFP",
        "report_link": "https://www.ipa.go.jp/en/security/c0374_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0374_est.pdf",
        "toe_version": "A2X00Y0-0100-G00-53",
        "vendor": "Konica Minolta Business Technologies, Inc."
      },
      "expiration_date": "2017-11-01",
      "supplier": "Konica Minolta Business Technologies, Inc.",
      "toe_japan_name": "bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Zentai Seigyo Software A2X00Y0-0100-G00-53",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0374_it1384.html",
      "toe_overseas_name": "bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software A2X00Y0-0100-G00-53"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Konica Minolta Business Technologies, Inc",
  "manufacturer_web": "https://www.konicaminolta.com/",
  "name": "bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software Version: A2X00Y0-0100-G00-53",
  "not_valid_after": "2017-11-13",
  "not_valid_before": "2012-10-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0374_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0374-01": 1,
          "Certification No. C0374": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 1,
          "A.NETWORK": 1,
          "A.SECRET": 1,
          "A.SERVICE": 1
        },
        "T": {
          "T.ACCESS-GROUP-": 1,
          "T.ACCESS-GROUP-BOX": 1,
          "T.ACCESS-PRIVATE-": 1,
          "T.ACCESS-PRIVATE-BOX": 1,
          "T.ACCESS-PUBLIC-": 1,
          "T.ACCESS-PUBLIC-BOX": 1,
          "T.ACCESS-SECURE-": 1,
          "T.ACCESS-SECURE-PRINT": 1,
          "T.ACCESS-SETTING": 2,
          "T.BACKUP-RESTORE": 2,
          "T.BRING-OUT-STORA": 1,
          "T.BRING-OUT-STORAGE": 1,
          "T.DISCARD-MFP": 2,
          "T.UNEXPECTED-TRA": 1,
          "T.UNEXPECTED-TRANSMISSION": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL3": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 7
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 2,
          "CCMB-2009-07-002": 2,
          "CCMB-2009-07-003": 2,
          "CCMB-2009-07-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20130419152138+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20130419152219+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "pdf_file_size_bytes": 473698,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 41
    },
    "st_filename": "c0374_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.A": 2,
          "A.ADMIN": 3,
          "A.NETWORK": 6,
          "A.SECRET": 3,
          "A.SERVICE": 4
        },
        "O": {
          "O.AUDIT": 2,
          "O.AUDIT-LOGGED": 3,
          "O.AUTH": 2,
          "O.AUTH-CAPABILITY": 5,
          "O.CONFIG": 12,
          "O.CRYPT": 4,
          "O.CRYPTO": 5,
          "O.CRYPTO-CAPABILITY": 4,
          "O.CRYPTO-KEY": 2,
          "O.CRYPTO-MAIL": 2,
          "O.FAX": 2,
          "O.FAX-CONTROL": 6,
          "O.GROUP": 3,
          "O.GROUP-BOX": 3,
          "O.OVERWRITE": 8,
          "O.PRIVATE": 3,
          "O.PRIVATE-BOX": 3,
          "O.PUBLIC": 3,
          "O.PUBLIC-BOX": 6,
          "O.REGISTERED": 3,
          "O.REGISTERED-USER": 12,
          "O.SECURE": 4,
          "O.SECURE-PRINT": 6,
          "O.TRUSTED": 3,
          "O.TRUSTED-PATH": 5
        },
        "OE": {
          "OE.ADMIN": 3,
          "OE.AUDIT": 3,
          "OE.AUDIT-REVIEWED": 2,
          "OE.AUDIT_ACCESS-AUT": 1,
          "OE.AUDIT_ACESS-AUTHORIZED": 1,
          "OE.AUDIT_STORAGE-PR": 1,
          "OE.AUDIT_STORAGE-PROTECTED": 1,
          "OE.FAX": 2,
          "OE.FAX-UNIT": 2,
          "OE.FEED": 2,
          "OE.FEED-BACK": 8,
          "OE.NETWORK": 4,
          "OE.S": 1,
          "OE.SECRET": 3,
          "OE.SERVER": 5,
          "OE.SERVICE": 3,
          "OE.SESSION": 10,
          "OE.SETTING": 2,
          "OE.SETTING-SECURITY": 2
        },
        "T": {
          "T.ACCESS": 19,
          "T.ACCESS-GROUP-BOX": 1,
          "T.ACCESS-PRIVATE-BOX": 1,
          "T.BACKUP": 3,
          "T.BACKUP-RESTORE": 1,
          "T.BRING": 3,
          "T.DISCARD": 3,
          "T.DISCARD-MFP": 1,
          "T.UNEXPECTED": 2,
          "T.UNEXPECTED-TRANSMISSION": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 11,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GNE.2.1": 1,
          "FAU_SAR.1": 7,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 3,
          "FAU_SAR.2.1": 1,
          "FAU_STG.1": 8,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.4": 4,
          "FAU_STG.4.1": 2
        },
        "FCS": {
          "FCS_CAP.1": 2,
          "FCS_CKM": 2,
          "FCS_CKM.1": 9,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 4,
          "FCS_COP": 1,
          "FCS_COP.1": 11,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 84,
          "FDP_ACC.1.1": 4,
          "FDP_ACF": 4,
          "FDP_ACF.1": 53,
          "FDP_ACF.1.1": 4,
          "FDP_ACF.1.2": 4,
          "FDP_ACF.1.3": 4,
          "FDP_ACF.1.4": 4,
          "FDP_ACP.1": 1,
          "FDP_IFC.1": 15,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 7,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ITC": 1,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 2,
          "FDP_RIP": 1,
          "FDP_RIP.1": 1,
          "FDP_RIP.1.1": 1,
          "FDP_UAU.7": 1
        },
        "FIA": {
          "FIA_AFL.1": 90,
          "FIA_AFL.1.1": 8,
          "FIA_AFL.1.2": 8,
          "FIA_ATD.1": 30,
          "FIA_ATD.1.1": 1,
          "FIA_MSA.3": 1,
          "FIA_SOS.1": 52,
          "FIA_SOS.1.1": 4,
          "FIA_SOS.2": 10,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_SSL.3": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 47,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.2": 55,
          "FIA_UAU.2.1": 4,
          "FIA_UAU.6": 12,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 20,
          "FIA_UAU.7.1": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 32,
          "FIA_UID.2": 84,
          "FIA_UID.2.1": 7,
          "FIA_USB.1": 27,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MAS.1": 1,
          "FMT_MOF.1": 63,
          "FMT_MOF.1.1": 5,
          "FMT_MSA": 5,
          "FMT_MSA.1": 43,
          "FMT_MSA.1.1": 3,
          "FMT_MSA.3": 52,
          "FMT_MSA.3.1": 8,
          "FMT_MSA.3.2": 7,
          "FMT_MTD.1": 168,
          "FMT_MTD.1.1": 15,
          "FMT_SMF.1": 130,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 202,
          "FMT_SMR.1.1": 6,
          "FMT_SMR.1.2": 6,
          "FMT_SOS.1": 1
        },
        "FPT": {
          "FPT_STM.1": 7
        },
        "FTA": {
          "FTA_SSL.3": 7,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 5
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        },
        "FIPS": {
          "FIPS 186": 2,
          "FIPS 186-2": 4,
          "FIPS PUB 197": 2
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/CreationDate": "D:20130415144110+09\u002700\u0027",
      "/Creator": "CubePDF",
      "/Keywords": "",
      "/ModDate": "D:20130415144114+09\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 1171475,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 114
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0374_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0374_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b03a5439a633bcb1994973d07656aa54ee313c79dcd1dd9bd185abb8b87f89d3",
      "txt_hash": "68a9955a5ebc33b4e48380729aec317489c2a7c40d8397a666cbb16bd715b560"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b161e5cc6d2b3a4c4a74f89c370f338bb9a581a6474f5b2afeaada46d934b346",
      "txt_hash": "ae10f2088ee93b218b4914b3f1fbfb6e4f3d349a8ed9c3c127358cdadc4c6a87"
    }
  },
  "status": "archived"
}