TOSHIBA e-STUDIO2040C/2540C/3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0
CSV information ?
Status | archived |
---|---|
Valid from | 28.10.2011 |
Valid until | 02.11.2016 |
Scheme | 🇯🇵 JP |
Manufacturer | Toshiba TEC Corporation |
Category | Multi-Function Devices |
Security level | EAL3+, ALC_FLR.2 |
Protection profiles |
Heuristics summary ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AESProtocols
SSLVendor
MicrosoftSecurity level
EAL3, EAL3 augmentedClaims
T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMINSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
CRP-C0328-01, Certification No. C0328Evaluation facilities
Information Technology Security CenterCertification process
a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. e-Filing Box Storage area that allows a user to save document CRP-C0328-01 35 data. This areaSide-channel analysis
malfunctionCertification process
a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. e-Filing Box Storage area that allows a user to save document CRP-C0328-01 35 data. This areaStandards
FIPS PUB 197, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Creation date: | D:20120427102328+09'00' |
---|---|
Modification date: | D:20120427102410+09'00' |
Pages: | 36 |
Creator: | Microsoft® Word 2010 |
Producer: | Microsoft® Word 2010 |
References
No references.
Security target ?
Extracted keywords
Symmetric Algorithms
AESProtocols
SSLVendor
Microsoft, Microsoft CorporationSecurity level
EAL3, EAL 3, EAL3 augmented, EAL 3 augmentedClaims
D.DOC, D.FUNC, D.PROT, D.CONF, O.AUDIT_STORAGE_PROTECTED, O.AUDIT_ACCESS_AUTHORIZED, O.CRYPTOGRAPHY, O.AUDIT_STORAGE, O.AUDIT_ACCESS, O.DOC, O.FUNC, O.PROT, O.CONF, O.USER, O.INTERFACE, O.SOFTWARE, O.AUDIT, T.DOC, T.FUNC, T.PROT, T.CONF, A, A.ACCESS, A.USER, A.ADMIN, OE.AUDIT_STRAGE, OE.AUDIT_ACCESS, OE.PHYSICAL, OE.INTERFACE, OE.USER, OE.ADMIN, OE.AUDIT, OE.PHYISCALSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, APE_REQ, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_STG.1, FAU_STG.4, FAU_SAR.1, FAU_SAR.2, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.4.1, FCS_COP.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_IFF, FDP_IFC, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FIA_AFL.1, FIA_UAU.7, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FIA_ATD.1, FIA_USB.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FPT_FDI_EXP.1, FPT_FDI_EXP, FPT_FDI_EXP.1.1, FPT_STM.1, FPT_TST.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Certificates
CCEVS-VR-VID10340-2009Certification process
e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5Side-channel analysis
malfunctionCertification process
e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5Standards
FIPS PUB 197File metadata
Creation date: | D:20111013103741+09'00' |
---|---|
Modification date: | D:20111013103741+09'00' |
Pages: | 66 |
Creator: | PScript5.dll Version 5.2.2 |
Producer: | Acrobat Distiller 9.0.0 (Windows) |
References
No references.
Heuristics ?
Extracted SARs
ADV_FSP.3, ALC_DVS.1, ASE_TSS.1, ATE_FUN.1, ATE_DPT.1, ALC_CMC.3, ASE_CCL.1, ASE_INT.1, ALC_FLR.2, ADV_TDS.2, AVA_VAN.2, ALC_LCD.1, ALC_CMS.3, ASE_REQ.2, ASE_SPD.1, ALC_DEL.1, AGD_PRE.1, ASE_OBJ.2, AGD_OPE.1, ATE_IND.2, ASE_ECD.1, ATE_COV.2, ADV_ARC.1Scheme data ?
Cert Id | C0328 | |
---|---|---|
Supplier | Toshiba Tec Corporation | |
Toe Overseas Name | TOSHIBA e-STUDIO2040C/2540C/ 3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS SYS V1.0 | |
Claim | EAL3+ ALC_FLR.2 | |
Certification Date | 2011-10 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0328_it0296.html | |
Toe Japan Name | ----- | |
Enhanced | ||
Product | TOSHIBA e-STUDIO2040C/2540C/3040C/ 3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS | |
Toe Version | SYS V1.0 | |
Product Type | Multifunction Peripheral | |
Certification Date | 2011-10-28 | |
Cc Version | 3.1 | |
Assurance Level | EAL3 Augmented with ALC_FLR.2 | |
Protection Profile | IEEE Std 2600.1-2009 | |
Vendor | Toshiba Tec Corporation | |
Evaluation Facility | Information Technology Security Center Evaluation Department | |
Report Link | https://www.ipa.go.jp/en/security/c0328_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0328_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0328_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE The TOE applies to complete Multifunction Peripheral (MFP) that includes the entire hardware and software components that provide the functionality for printing and scanning documents over the network, through email and on the MFP; and document storage and retrieval. It is assumed that MFP is utilized from a control panel of TOE or as for a user terminal connected to LAN or USB in TOE. TOE Security functions The TOE provides the following security features: - User Authentication The TOE prompts the user to enter the User ID and password from the control panel or client PC to execute identity authentication - User Access Control The TOE controls access to user's document data which is saved in the internal HDD - Secure Erase The TOE removes residual data with DoD secure-erase mechanism before releasing resources from HDD of TOE - Secure Channel The TOE provides support for SSL and is allowed to secure different protocols such as https. The SSL/TLS functionality also permits the TOE to be securely administered from the Web UI, as well as, being used to secure the connection between the TOE and any other external server. - Data Encryption The TOE encrypts the user's document data which is saved in the internal HDD. - Audit Data Generation and Review The TOE generates audit logs for tracking the state of the TOE at any given instance of time. All logs are available for viewing only to TOE U.AUDITOR and U.ADMINISTRATOR role. - TSF Data Protection Only an administrator role user has the capability to manage the configuration and enable/disable available services and protocols. U. ADMINISTRATOR can modify the TSF data. - TSF Self Protection The TOE performs integrity tests on its static executable and configuration files using verification of their digital signature against the known TOSHIBA signatures. This allows the TOE to detect any tampering of its trusted state. |
References ?
No references are available for this certificate.
Updates ?
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'cert_id': 'C0328', 'supplier': 'Toshiba Tec Corporation', 'toe_overseas_name': 'TOSHIBA e-STUDIO2040C/2540C/\n 3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS\n SYS V1.0', 'claim': 'EAL3+\n ALC_FLR.2', 'certification_date': '2011-10', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0328_it0296.html', 'toe_japan_name': '-----', 'enhanced': {'product': 'TOSHIBA e-STUDIO2040C/2540C/3040C/\n 3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS', 'toe_version': 'SYS V1.0', 'product_type': 'Multifunction Peripheral', 'certification_date': '2011-10-28', 'cc_version': '3.1', 'assurance_level': 'EAL3 Augmented with ALC_FLR.2', 'protection_profile': 'IEEE Std 2600.1-2009', 'vendor': 'Toshiba Tec Corporation', 'evaluation_facility': 'Information Technology Security Center Evaluation Department', 'report_link': 'https://www.ipa.go.jp/en/security/c0328_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0328_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0328_est.pdf', 'description': "PRODUCT DESCRIPTION \n Description of TOE \n The TOE applies to complete Multifunction Peripheral (MFP) that includes the entire hardware and software components that provide the functionality for printing and scanning documents over the network, through email and on the MFP; and document storage and retrieval. It is assumed that MFP is utilized from a control panel of TOE or as for a user terminal connected to LAN or USB in TOE. \n \n TOE Security functions \n The TOE provides the following security features: \n \n \n \n - \n User Authentication \n \n \n \n The TOE prompts the user to enter the User ID and password from the control panel or client PC to execute identity authentication \n \n \n - \n User Access Control \n \n \n \n The TOE controls access to user's document data which is saved in the internal HDD \n \n \n - \n Secure Erase \n \n \n \n The TOE removes residual data with DoD secure-erase mechanism before releasing resources from HDD of TOE \n \n \n - \n Secure Channel \n \n \n \n The TOE provides support for SSL and is allowed to secure different protocols such as https. The SSL/TLS functionality also permits the TOE to be securely administered from the Web UI, as well as, being used to secure the connection between the TOE and any other external server. \n \n \n - \n Data Encryption \n \n \n \n The TOE encrypts the user's document data which is saved in the internal HDD. \n \n \n - \n Audit Data Generation and Review \n \n \n \n The TOE generates audit logs for tracking the state of the TOE at any given instance of time. All logs are available for viewing only to TOE U.AUDITOR and U.ADMINISTRATOR role. \n \n \n - \n TSF Data Protection \n \n \n \n Only an administrator role user has the capability to manage the configuration and enable/disable available services and protocols. U. ADMINISTRATOR can modify the TSF data. \n \n \n - \n TSF Self Protection \n \n \n \n The TOE performs integrity tests on its static executable and configuration files using verification of their digital signature against the known TOSHIBA signatures. This allows the TOE to detect any tampering of its trusted state."}}}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0328_erpt.pdf, code: nok']
.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0328_erpt.pdf, code: 408']
.
- The errors property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009']}}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
28.09.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The st_references property was updated, with the
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'c0328_erpt.pdf', 'st_filename': 'c0328_est.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'JP': {'__update__': {'CRP-C0328-01': 1}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 4}}}}, 'cc_claims': {'__update__': {'T': {'T.DOC': 4, 'T.FUNC': 2, 'T.PROT': 2, 'T.CONF': 4}, 'A': {'A.ACCESS': 1, 'A.USER': 1, 'A.ADMIN': 2}}, '__delete__': ['R', 'OT']}, 'certification_process': {'__update__': {'ConfidentialDocument': {'a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. e-Filing Box Storage area that allows a user to save document CRP-C0328-01 35 data. This area': 1}}}}
data. - The st_keywords property was updated, with the
{'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 4}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1': 17, 'FAU_STG.1': 11, 'FAU_SAR.1': 11}}, 'FDP': {'__update__': {'FDP_ACF.1': 29}}, 'FIA': {'__update__': {'FIA_UAU.1': 13, 'FIA_UID.1': 19, 'FIA_ATD.1': 10}}, 'FMT': {'__update__': {'FMT_SMF.1': 22, 'FMT_SMR.1': 26}}, 'FPT': {'__update__': {'FPT_STM.1': 10}}}}, 'cc_claims': {'__update__': {'D': {'__update__': {'D.PROT': 6, 'D.FUNC': 13, 'D.CONF': 7}}, 'O': {'__insert__': {'O.AUDIT_STORAGE': 7, 'O.AUDIT_ACCESS': 5, 'O.DOC': 25, 'O.FUNC': 8, 'O.PROT': 8, 'O.CONF': 16, 'O.USER': 12, 'O.INTERFACE': 8, 'O.SOFTWARE': 6, 'O.AUDIT': 8}, '__delete__': ['O.AUDIT_STORAGE.PROTECTED', 'O.AUDIT_ACCESS.AUTHORIZED', 'O.DOC.NO_DIS', 'O.DOC.NO_ALT', 'O.FUNC.NO_ALT', 'O.PROT.NO_ALT', 'O.CONF.NO_DIS', 'O.CONF.NO_ALT', 'O.USER.AUTHORIZED', 'O.INTERFACE.MANAGED', 'O.SOFTWARE.VERIFIED', 'O.AUDIT.LOGGED']}, 'T': {'T.DOC': 6, 'T.FUNC': 3, 'T.PROT': 3, 'T.CONF': 6}, 'A': {'__insert__': {'A.ACCESS': 3, 'A.USER': 3, 'A.ADMIN': 6}, '__delete__': ['A.ACCESS.MANAGED', 'A.USER.TRAINING', 'A.ADMIN.TRAINING', 'A.ADMIN.TRUST']}, 'OE': {'OE.AUDIT_STRAGE': 1, 'OE.AUDIT_ACCESS': 1, 'OE.PHYSICAL': 2, 'OE.INTERFACE': 3, 'OE.USER': 12, 'OE.ADMIN': 6, 'OE.AUDIT': 3, 'OE.PHYISCAL': 1}}, '__delete__': ['R', 'OT']}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 13}}}, '__delete__': ['TLS']}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5': 1}}}}
data.
The computed heuristics were updated.
- The cert_id property was set to
C0328
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['CCEVS-VR-VID10340-2009']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['CCEVS-VR-VID10340-2009']}}
data.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009']}}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0328-01': 72, 'Certification No. C0328': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4, 'EAL3 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 3}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DOC.DIS': 2, 'T.DOC.ALT': 1, 'T.FUNC.ALT': 1, 'T.PROT.ALT': 2, 'T.CONF.DIS': 1, 'T.CONF.ALT': 1, 'T.LOGGING': 1}, 'A': {'A.ACCESS.MANAGED': 1, 'A.USER.TRAINING': 1, 'A.ADMIN.TRAINING': 1, 'A.ADMIN.TRUST': 1}, 'R': {'R.AUTHORIZATION': 1, 'R.TRAINING': 1}, 'OT': {'OT.ALT': 2}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 8}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}, 'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'ows a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. e-Filing Box Storage area that allows a user to save document CRP-C0328-01 35 data. This area': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-VID10340-2009': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 2, 'EAL 3': 1, 'EAL3 augmented': 1, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 3, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'APE': {'APE_REQ': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 20, 'FAU_STG.1': 12, 'FAU_STG.4': 9, 'FAU_SAR.1': 12, 'FAU_SAR.2': 9, 'FAU_GEN': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 8, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_COP.1': 9, 'FCS_CKM.1': 2, 'FCS_CKM.4': 2, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 37, 'FDP_ACF.1': 31, 'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_RIP.1': 8, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 2, 'FDP_ITC.1': 2, 'FDP_ITC.2': 2}, 'FIA': {'FIA_AFL.1': 9, 'FIA_UAU.7': 10, 'FIA_SOS.1': 10, 'FIA_UAU.1': 15, 'FIA_UID.1': 21, 'FIA_ATD.1': 11, 'FIA_USB.1': 8, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MOF.1': 12, 'FMT_SMF.1': 24, 'FMT_SMR.1': 32, 'FMT_MTD.1': 8, 'FMT_MSA.1': 22, 'FMT_MSA.3': 22, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1.1': 1}, 'FPT': {'FPT_FDI_EXP.1': 14, 'FPT_FDI_EXP': 2, 'FPT_FDI_EXP.1.1': 2, 'FPT_STM.1': 11, 'FPT_TST.1': 8, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3': 9, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.DOC': 43, 'D.PROT': 8, 'D.FUNC': 14, 'D.CONF': 9}, 'O': {'O.AUDIT_STORAGE_PROTECTED': 1, 'O.AUDIT_ACCESS_AUTHORIZED': 1, 'O.CRYPTOGRAPHY': 8, 'O.AUDIT_STORAGE.PROTECTED': 7, 'O.AUDIT_ACCESS.AUTHORIZED': 7, 'O.DOC.NO_DIS': 17, 'O.DOC.NO_ALT': 8, 'O.FUNC.NO_ALT': 8, 'O.PROT.NO_ALT': 8, 'O.CONF.NO_DIS': 8, 'O.CONF.NO_ALT': 8, 'O.USER.AUTHORIZED': 12, 'O.INTERFACE.MANAGED': 8, 'O.SOFTWARE.VERIFIED': 6, 'O.AUDIT.LOGGED': 8}, 'T': {'T.DOC.DIS': 3, 'T.DOC.ALT': 3, 'T.FUNC.ALT': 3, 'T.PROT.ALT': 3, 'T.CONF.DIS': 3, 'T.CONF.ALT': 3, 'T.LOGGING': 3, 'T.NO_ALT': 8, 'T.LOGGED': 8, 'T.REVIEWED': 3}, 'A': {'A': 2, 'A.ACCESS.MANAGED': 3, 'A.USER.TRAINING': 3, 'A.ADMIN.TRAINING': 3, 'A.ADMIN.TRUST': 3}, 'R': {'R.AUTHORIZATION': 3, 'R.TRAINING': 3, 'R.AUTHORIZED': 21, 'R.TRAINED': 3}, 'OT': {'OT.ALT': 3, 'OT.NO_ALT': 8}, 'OE': {'OE': 2, 'OE.AUDIT_STRAGE.PROTECTED': 1, 'OE.AUDIT_ACCESS.AUTHORIZED': 1, 'OE.PHYSICAL.MANAGED': 2, 'OE.INTERFACE.MANAGED': 3, 'OE.USER.AUTHORIZED': 9, 'OE.USER.TRAINED': 3, 'OE.ADMIN.TRAINED': 3, 'OE.ADMIN.TRUSTED': 3, 'OE.AUDIT.REVIEWED': 3, 'OE.PHYISCAL.MANAGED': 1}}, 'vendor': {'STMicroelectronics': {'STM': 12}, 'Microsoft': {'Microsoft': 4, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 10}, 'TLS': {'TLS': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'n e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5': 1}}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '03e7a03ca58efabf5efb8e609ffc94771617ca08db81631a3809d628704f6751', 'st_pdf_hash': '1cf434e1557e0717154432b7f3eaefadd0c9b7b38c6bd9e8def40909f06798ad', 'report_txt_hash': '66cabe7357990672d8d4434fb4839d67f94f8d16052cc7a57585c6c65f21d540', 'st_txt_hash': '762ee08b9ec711e2368a56ecb1b750753e231a691d972ea6a99fee63052b54e7'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 2}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 8}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'malfunction': 1}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 3}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 2, 'SSL': 10}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'malfunction': 2}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['1.0']}
.
- The report_frontpage property was updated, with the
-
01.02.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009']}}]}
.
- The new value is
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name TOSHIBA e-STUDIO2040C/2540C/3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Multi-Function Devices",
"cert_link": null,
"dgst": "31783abbbaede0cd",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "C0328",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "C0328",
"certification_date": "2011-10",
"claim": "EAL3+\n ALC_FLR.2",
"enhanced": {
"assurance_level": "EAL3 Augmented with ALC_FLR.2",
"cc_version": "3.1",
"cert_link": "https://www.ipa.go.jp/en/security/c0328_eimg.pdf",
"certification_date": "2011-10-28",
"description": "PRODUCT DESCRIPTION \n Description of TOE \n The TOE applies to complete Multifunction Peripheral (MFP) that includes the entire hardware and software components that provide the functionality for printing and scanning documents over the network, through email and on the MFP; and document storage and retrieval. It is assumed that MFP is utilized from a control panel of TOE or as for a user terminal connected to LAN or USB in TOE. \n \n TOE Security functions \n The TOE provides the following security features: \n \n \n \n - \n User Authentication \n \n \n \n The TOE prompts the user to enter the User ID and password from the control panel or client PC to execute identity authentication \n \n \n - \n User Access Control \n \n \n \n The TOE controls access to user\u0027s document data which is saved in the internal HDD \n \n \n - \n Secure Erase \n \n \n \n The TOE removes residual data with DoD secure-erase mechanism before releasing resources from HDD of TOE \n \n \n - \n Secure Channel \n \n \n \n The TOE provides support for SSL and is allowed to secure different protocols such as https. The SSL/TLS functionality also permits the TOE to be securely administered from the Web UI, as well as, being used to secure the connection between the TOE and any other external server. \n \n \n - \n Data Encryption \n \n \n \n The TOE encrypts the user\u0027s document data which is saved in the internal HDD. \n \n \n - \n Audit Data Generation and Review \n \n \n \n The TOE generates audit logs for tracking the state of the TOE at any given instance of time. All logs are available for viewing only to TOE U.AUDITOR and U.ADMINISTRATOR role. \n \n \n - \n TSF Data Protection \n \n \n \n Only an administrator role user has the capability to manage the configuration and enable/disable available services and protocols. U. ADMINISTRATOR can modify the TSF data. \n \n \n - \n TSF Self Protection \n \n \n \n The TOE performs integrity tests on its static executable and configuration files using verification of their digital signature against the known TOSHIBA signatures. This allows the TOE to detect any tampering of its trusted state.",
"evaluation_facility": "Information Technology Security Center Evaluation Department",
"product": "TOSHIBA e-STUDIO2040C/2540C/3040C/\n 3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS",
"product_type": "Multifunction Peripheral",
"protection_profile": "IEEE Std 2600.1-2009",
"report_link": "https://www.ipa.go.jp/en/security/c0328_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0328_est.pdf",
"toe_version": "SYS V1.0",
"vendor": "Toshiba Tec Corporation"
},
"supplier": "Toshiba Tec Corporation",
"toe_japan_name": "-----",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0328_it0296.html",
"toe_overseas_name": "TOSHIBA e-STUDIO2040C/2540C/\n 3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS\n SYS V1.0"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Toshiba TEC Corporation",
"manufacturer_web": "https://www.toshibatec.co.jp/en/",
"name": "TOSHIBA e-STUDIO2040C/2540C/3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0",
"not_valid_after": "2016-11-02",
"not_valid_before": "2011-10-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "c0328_erpt.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0328-01": 1,
"Certification No. C0328": 1
}
},
"cc_claims": {
"A": {
"A.ACCESS": 1,
"A.ADMIN": 2,
"A.USER": 1
},
"T": {
"T.CONF": 4,
"T.DOC": 4,
"T.FUNC": 2,
"T.PROT": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 4
}
},
"cc_security_level": {
"EAL": {
"EAL3": 4,
"EAL3 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. e-Filing Box Storage area that allows a user to save document CRP-C0328-01 35 data. This area": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 8
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ITSC": {
"Information Technology Security Center": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
},
"FIPS": {
"FIPS PUB 197": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20120427102328+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20120427102410+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 738739,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 36
},
"st_filename": "c0328_est.pdf",
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10340-2009": 1
}
},
"cc_claims": {
"A": {
"A": 2,
"A.ACCESS": 3,
"A.ADMIN": 6,
"A.USER": 3
},
"D": {
"D.CONF": 7,
"D.DOC": 43,
"D.FUNC": 13,
"D.PROT": 6
},
"O": {
"O.AUDIT": 8,
"O.AUDIT_ACCESS": 5,
"O.AUDIT_ACCESS_AUTHORIZED": 1,
"O.AUDIT_STORAGE": 7,
"O.AUDIT_STORAGE_PROTECTED": 1,
"O.CONF": 16,
"O.CRYPTOGRAPHY": 8,
"O.DOC": 25,
"O.FUNC": 8,
"O.INTERFACE": 8,
"O.PROT": 8,
"O.SOFTWARE": 6,
"O.USER": 12
},
"OE": {
"OE.ADMIN": 6,
"OE.AUDIT": 3,
"OE.AUDIT_ACCESS": 1,
"OE.AUDIT_STRAGE": 1,
"OE.INTERFACE": 3,
"OE.PHYISCAL": 1,
"OE.PHYSICAL": 2,
"OE.USER": 12
},
"T": {
"T.CONF": 6,
"T.DOC": 6,
"T.FUNC": 3,
"T.PROT": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.2": 4,
"ALC_LCD.1": 1
},
"APE": {
"APE_REQ": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 1,
"EAL 3 augmented": 1,
"EAL3": 2,
"EAL3 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 17,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 8,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 11,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 9,
"FAU_SAR.2.1": 1,
"FAU_STG.1": 11,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 9,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM.4": 2,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 37,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 29,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC": 1,
"FDP_IFC.1": 2,
"FDP_IFF": 1,
"FDP_ITC.1": 2,
"FDP_ITC.2": 2,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 9,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 10,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 13,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.7": 10,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 19,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 8,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 12,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 22,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 22,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 2,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 26,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FDI_EXP": 2,
"FPT_FDI_EXP.1": 14,
"FPT_FDI_EXP.1.1": 2,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1,
"FPT_TST.1": 8,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL.3": 9,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 9,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 13
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {
"FIPS": {
"FIPS PUB 197": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 4,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20111013103741+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20111013103741+09\u002700\u0027",
"/Producer": "Acrobat Distiller 9.0.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 887125,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 66
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL3+",
"pp_ids": {
"_type": "Set",
"elements": [
"IEEE 2600.1\u00e2\u201e\u00a2-2009",
"IEEE 2600.1\u0026trade;-2009"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf",
"pp_name": "IEEE Standard for a Protection Profile in Operational Environment A"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0328_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0328_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "03e7a03ca58efabf5efb8e609ffc94771617ca08db81631a3809d628704f6751",
"report_txt_hash": "66cabe7357990672d8d4434fb4839d67f94f8d16052cc7a57585c6c65f21d540",
"st_convert_garbage": false,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true,
"st_pdf_hash": "1cf434e1557e0717154432b7f3eaefadd0c9b7b38c6bd9e8def40909f06798ad",
"st_txt_hash": "762ee08b9ec711e2368a56ecb1b750753e231a691d972ea6a99fee63052b54e7"
},
"status": "archived"
}