AR-FR11 VERSION M.20

CSV information ?

Status archived
Valid from 03.06.2005
Valid until 07.10.2013
Scheme 🇯🇵 JP
Manufacturer Sharp Corporation
Category Other Devices and Systems
Security level EAL3

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0026

Certificate ?

Certification report ?

Extracted keywords

Security level
EAL3
Claims
T.RECOVER, T.SHUNT, T.SPOOF, A.NETWORK, A.OPERATOR, A.USER
Certificates
CRP-C0026-01, Certification No. C0026

Standards
ISO/IEC 15408:1999, CCIMB-99-032, CCIMB-99-033, CCIMB-99-031

File metadata

Title: CRP-e
Subject: C0026
Author: IPA/JISEC
Creation date: D:20050715113927+09'00'
Modification date: D:20050715114102+09'00'
Pages: 26
Creator: Word 用 Acrobat PDFMaker 6.0
Producer: Acrobat Distiller 6.0 (Windows)

References

No references.

Security target ?

Extracted keywords

Symmetric Algorithms
AES, Rijndael

Vendor
Microsoft

Security level
EAL3
Claims
O.RESIDUAL, O.REMOVE, O.MANAGE, O.NSP, O.UAU, T.RECOVER, T.SHUNT, T.SPOOF, A.NETWORK, A.OPERATOR, A.USER, OE.BROWSER, OE.CIPHER, OE.CLIENT, OE.FIREWALL, OE.OPERATE, OE.USER
Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_RCR.1, ADV_HLD.1, ADV_HLD.2, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1
Security Functional Requirements (SFR)
FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1, FDP_ITC.1, FDP_RIP.1.1, FDP_RIP.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.1, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.6, FIA_UAU.7, FIA_UID.2, FMT_MSA.2, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_MTD.1, FPR_RVM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_RVM.1, FPT_SEP.1

Standards
FIPS PUB 197, ISO/IEC 15408:1999, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title: Security Target AR-FR11 M.20
Subject: [DSK_ST]
Author: K.Nakagawa
Creation date: D:20050526193729+09'00'
Modification date: D:20050526194843+09'00'
Pages: 45
Creator: Word 用 Acrobat PDFMaker 6.0
Producer: Acrobat Distiller 6.0 (Windows)

References

No references.

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0026

Extracted SARs

ADV_RCR.1, ATE_COV.2, ATE_FUN.1, AGD_USR.1, ATE_DPT.1, ALC_DVS.1, AVA_SOF.1, ADV_HLD.2, AGD_ADM.1, ATE_IND.2, AVA_MSU.1, ADV_FSP.1, AVA_VLA.1

Scheme data ?

Cert Id C0026
Supplier Sharp Corporation
Toe Overseas Name AR-FR11 VERSION M.20
Claim EAL3
Certification Date 2005-06
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0026_it4031.html
Toe Japan Name AR-FR11 VERSION M.20
Enhanced
Product AR-FR11
Toe Version VERSION M.20
Product Type IT Product ( data protection function in Multi Function Device )
Certification Date 2005-06-03
Assurance Level EAL3
Vendor Sharp Corporation
Evaluation Facility Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
Target Link https://www.ipa.go.jp/en/security/c0026_est.pdf
Report Link https://www.ipa.go.jp/en/security/c0026_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/c0026_eimg.pdf
Description PRODUCT DESCRIPTION The TOE is a firmware product for a Multi Function Device (hereafter referred as to “MFD”) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD. The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD. The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the fundamental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by overwriting. In addition, the TOE offers encryption and password authentication for image data that a user saves into the HDD to reuse later. By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure.

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a5ac1d887fbdcec65ed07904ffc23e79f29245f6a5ddd83950edbf4cdb08f5eb', 'txt_hash': '6823d6c1a9d35f5832b67141c9c420beb25dc41fc75d0ec1b6a5f909bffacafb'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6b6d7e4efcb627e4391e7c7b229910f423616891b2fde5e169e6d58d9dc6735b', 'txt_hash': 'bb4215b40fa714ce3ebc4490808af9136e3ffbaf0a31dbb382b889a529946df8'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {}.
    • The st_frontpage property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0026.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cert_id property was set to C0026.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0026.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'C0026', 'supplier': 'Sharp Corporation', 'toe_overseas_name': 'AR-FR11\n VERSION M.20', 'claim': 'EAL3', 'certification_date': '2005-06', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0026_it4031.html', 'toe_japan_name': 'AR-FR11\n VERSION M.20', 'enhanced': {'__insert__': {'toe_version': 'VERSION M.20', 'target_link': 'https://www.ipa.go.jp/en/security/c0026_est.pdf', 'report_link': 'https://www.ipa.go.jp/en/security/c0026_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0026_eimg.pdf'}, '__update__': {'product': 'AR-FR11', 'product_type': 'IT Product ( data protection function in Multi Function Device )', 'certification_date': '2005-06-03', 'assurance_level': 'EAL3', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc.\n Center for Evaluation of Information Security', 'description': 'PRODUCT DESCRIPTION \n The TOE is a firmware product for a Multi Function Device (hereafter referred as to “MFD”) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD. \n The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD. \n The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the fundamental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by overwriting. \n In addition, the TOE offers encryption and password authentication for image data that a user saves into the HDD to reuse later. \n By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure.'}, '__delete__': ['protection_profile']}} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'C0004', 'supplier': 'Sharp Corporation', 'toe_overseas_name': 'Data security kit for digital\n MFD:AR-FR4 version M.20,AR-FR5 version E.20', 'claim': 'EAL4', 'certification_date': '2004-01', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0004_it2005.html', 'toe_japan_name': 'Data security kit for digital MFD:AR-FR4 version M.20,AR-FR5 version\n E.20', 'enhanced': {'product': 'Data security kit for digital MFD: AR-FR4 version M.20, AR-FR5 version E.20', 'product_type': 'IT product (digital MFD )', 'certification_date': '2004-01-14', 'assurance_level': 'EAL4', 'protection_profile': 'N/A', 'vendor': 'Sharp Corporation', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc.', 'description': 'PRODUCT DESCRIPTION \n The data security kit for digital MFD, AR-FR4 version M.20 and AR-FR5 version E.20, is firmware which aims to decrease the risk of document data and image data that is temporarily stored inside of digital MFD from being dosclosed. Digital MFD is business equipment which can be configured by adding, as needed units for copy, image scanning or facsimile functions to printer function unit. The data security kit for digital MFD is provided as an upgrading kit for the firmware of hte MFD.'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 6b6d7e4efcb627e4391e7c7b229910f423616891b2fde5e169e6d58d9dc6735b.
    • The st_txt_hash property was set to bb4215b40fa714ce3ebc4490808af9136e3ffbaf0a31dbb382b889a529946df8.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1130755, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 45, '/ModDate': "D:20050526194843+09'00'", '/CreationDate': "D:20050526193729+09'00'", '/Title': 'Security Target AR-FR11 M.20', '/Creator': 'Word 用 Acrobat PDFMaker 6.0', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'K.Nakagawa', '/Subject': '[DSK_ST]', '/Company': 'SHARP Corporation', '/SourceModified': 'D:20050317081500', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 3, 'ACM_SCP.1': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 3}, 'ADV': {'ADV_FSP.1': 10, 'ADV_RCR.1': 3, 'ADV_HLD.1': 3, 'ADV_HLD.2': 1}, 'AGD': {'AGD_ADM.1': 6, 'AGD_USR.1': 5}, 'ALC': {'ALC_DVS.1': 3}, 'ATE': {'ATE_COV.2': 2, 'ATE_FUN.1': 4, 'ATE_IND.2': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_MSU.1': 2, 'AVA_SOF.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FCS': {'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 15, 'FCS_CKM.4': 6, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 13}, 'FDP': {'FDP_ITC.1': 2, 'FDP_RIP.1.1': 1, 'FDP_RIP.1': 11}, 'FIA': {'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_UAU.1': 13, 'FIA_SOS.1.1': 4, 'FIA_UAU.2.1': 3, 'FIA_UID.1': 15, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 2, 'FIA_UID.2.1': 3, 'FIA_AFL.1': 29, 'FIA_SOS.1': 30, 'FIA_UAU.2': 42, 'FIA_UAU.6': 10, 'FIA_UAU.7': 14, 'FIA_UID.2': 34}, 'FMT': {'FMT_MSA.2': 7, 'FMT_MOF.1.1': 1, 'FMT_SMF.1': 20, 'FMT_SMR.1': 43, 'FMT_MTD.1.1': 4, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 3, 'FMT_SMR.1.2': 3, 'FMT_MOF.1': 11, 'FMT_MTD.1': 35}, 'FPR': {'FPR_RVM.1': 6}, 'FPT': {'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_RVM.1': 16, 'FPT_SEP.1': 16}}, 'cc_claims': {'O': {'O.RESIDUAL': 6, 'O.REMOVE': 4, 'O.MANAGE': 7, 'O.NSP': 4, 'O.UAU': 7}, 'T': {'T.RECOVER': 5, 'T.SHUNT': 5, 'T.SPOOF': 5}, 'A': {'A.NETWORK': 5, 'A.OPERATOR': 5, 'A.USER': 4}, 'OE': {'OE.BROWSER': 6, 'OE.CIPHER': 3, 'OE.CLIENT': 5, 'OE.FIREWALL': 3, 'OE.OPERATE': 3, 'OE.USER': 3}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}, 'Rijndael': {'Rijndael': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}, 'ISO': {'ISO/IEC 15408:1999': 2}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to c0026_est.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}]}.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0026_est.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was set to None.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0026_erpt.pdf, code: nok'].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0026_erpt.pdf, code: nok'].
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'c0026_erpt.pdf', 'st_filename': 'c0026_est.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'JP': {'__update__': {'CRP-C0026-01': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_RCR.1': 3, 'ADV_HLD.2': 1}}, 'ATE': {'__update__': {'ATE_FUN.1': 4, 'ATE_DPT.1': 1}}}}, 'cc_sfr': {'__insert__': {'FPR': {'FPR_RVM.1': 6}}, '__update__': {'FCS': {'__update__': {'FCS_COP.1': 15, 'FCS_CKM.4': 6}}, 'FIA': {'__update__': {'FIA_AFL.1': 29, 'FIA_SOS.1': 30, 'FIA_UAU.2': 42, 'FIA_UAU.6': 10, 'FIA_UAU.7': 14, 'FIA_UID.2': 34}}, 'FMT': {'__update__': {'FMT_MSA.2': 7, 'FMT_MOF.1': 11, 'FMT_SMF.1': 20, 'FMT_SMR.1': 43, 'FMT_MTD.1': 35}}, 'FPT': {'__update__': {'FPT_RVM.1': 16, 'FPT_SEP.1': 16}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.RESIDUAL': 6, 'O.REMOVE': 4, 'O.MANAGE': 7, 'O.NSP': 4}}, 'T': {'__update__': {'T.RECOVER': 5, 'T.SHUNT': 5, 'T.SPOOF': 5}}, 'A': {'__update__': {'A.USER': 4, 'A.NETWORK': 5, 'A.OPERATOR': 5}}}}, 'standard_id': {'__insert__': {'FIPS': {'FIPS PUB 197': 1}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to C0026.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 336328, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 26, '/ModDate': "D:20050715114102+09'00'", '/CreationDate': "D:20050715113927+09'00'", '/Title': 'CRP-e', '/Creator': 'Word 用 Acrobat PDFMaker 6.0', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'IPA/JISEC', '/Subject': 'C0026', '/Company': 'IPA', '/Manager': 'IPA', '/SourceModified': 'D:20050715023914', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1130755, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 45, '/ModDate': "D:20050526194843+09'00'", '/CreationDate': "D:20050526193729+09'00'", '/Title': 'Security Target AR-FR11 M.20', '/Creator': 'Word 用 Acrobat PDFMaker 6.0', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'K.Nakagawa', '/Subject': '[DSK_ST]', '/Company': 'SHARP Corporation', '/SourceModified': 'D:20050317081500', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/reports/pdf/ef1495b0e02b0577.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/ef1495b0e02b0577.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/ef1495b0e02b0577.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/ef1495b0e02b0577.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0026-01': 52, 'Certification No. C0026': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.RECOVER': 1, 'T.SHUNT': 1, 'T.SPOOF': 1}, 'A': {'A.NETWORK': 1, 'A.OPERATOR': 1, 'A.USER': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:1999': 1}, 'CC': {'CCIMB-99-032': 2, 'CCIMB-99-033': 2, 'CCIMB-99-031': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 3, 'ACM_SCP.1': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 3}, 'ADV': {'ADV_FSP.1': 10, 'ADV_RCR.1': 4, 'ADV_HLD.2': 2, 'ADV_HLD.1': 3}, 'AGD': {'AGD_ADM.1': 6, 'AGD_USR.1': 5}, 'ALC': {'ALC_DVS.1': 3}, 'ATE': {'ATE_COV.2': 2, 'ATE_FUN.1': 5, 'ATE_DPT.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_MSU.1': 2, 'AVA_SOF.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 13, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 16, 'FCS_CKM.4': 7, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ITC.1': 2, 'FDP_RIP.1': 11, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_AFL.1': 38, 'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_UAU.1': 13, 'FIA_SOS.1': 38, 'FIA_SOS.1.1': 4, 'FIA_UAU.2': 50, 'FIA_UAU.2.1': 3, 'FIA_UID.1': 15, 'FIA_UAU.6': 11, 'FIA_UAU.6.1': 1, 'FIA_UAU.7': 17, 'FIA_UAU.7.1': 2, 'FIA_UID.2': 44, 'FIA_UID.2.1': 3}, 'FMT': {'FMT_MSA.2': 6, 'FMT_MOF.1': 13, 'FMT_MOF.1.1': 1, 'FMT_SMF.1': 29, 'FMT_SMR.1': 46, 'FMT_MTD.1': 41, 'FMT_MTD.1.1': 4, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 3, 'FMT_SMR.1.2': 3}, 'FPT': {'FPT_RVM.1': 20, 'FPT_RVM.1.1': 1, 'FPT_SEP.1': 20, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}}, 'cc_claims': {'O': {'O.RESIDUAL': 7, 'O.REMOVE': 7, 'O.MANAGE': 8, 'O.NSP': 6, 'O.UAU': 7}, 'T': {'T.RECOVER': 4, 'T.SHUNT': 4, 'T.SPOOF': 4}, 'A': {'A.USER': 5, 'A.NETWORK': 4, 'A.OPERATOR': 4}, 'OE': {'OE.BROWSER': 6, 'OE.CIPHER': 3, 'OE.CLIENT': 5, 'OE.FIREWALL': 3, 'OE.OPERATE': 3, 'OE.USER': 3}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}, 'Rijndael': {'Rijndael': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:1999': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 3}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 1}]} values discarded.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'a5ac1d887fbdcec65ed07904ffc23e79f29245f6a5ddd83950edbf4cdb08f5eb', 'st_pdf_hash': '6b6d7e4efcb627e4391e7c7b229910f423616891b2fde5e169e6d58d9dc6735b', 'report_txt_hash': '6823d6c1a9d35f5832b67141c9c420beb25dc41fc75d0ec1b6a5f909bffacafb', 'st_txt_hash': 'bb4215b40fa714ce3ebc4490808af9136e3ffbaf0a31dbb382b889a529946df8'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 3, 'Rijndael': 4}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['20']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name AR-FR11 VERSION M.20 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "ef1495b0e02b0577",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0026",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "20"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "C0026",
      "certification_date": "2005-06",
      "claim": "EAL3",
      "enhanced": {
        "assurance_level": "EAL3",
        "cert_link": "https://www.ipa.go.jp/en/security/c0026_eimg.pdf",
        "certification_date": "2005-06-03",
        "description": "PRODUCT DESCRIPTION \n   The TOE is a firmware product for a Multi Function Device (hereafter referred as to \u201cMFD\u201d) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD.  \n   The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD.  \n   The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the fundamental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by overwriting.  \n   In addition, the TOE offers encryption and password authentication for image data that a user saves into the HDD to reuse later.  \n   By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure.",
        "evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc.\n       Center for Evaluation of Information Security",
        "product": "AR-FR11",
        "product_type": "IT Product ( data protection function in Multi Function Device )",
        "report_link": "https://www.ipa.go.jp/en/security/c0026_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0026_est.pdf",
        "toe_version": "VERSION M.20",
        "vendor": "Sharp Corporation"
      },
      "supplier": "Sharp                    Corporation",
      "toe_japan_name": "AR-FR11\n                    VERSION M.20",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0026_it4031.html",
      "toe_overseas_name": "AR-FR11\n                    VERSION M.20"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sharp Corporation",
  "manufacturer_web": "https://sharp-world.com/",
  "name": "AR-FR11 VERSION M.20",
  "not_valid_after": "2013-10-07",
  "not_valid_before": "2005-06-03",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0026_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0026-01": 1,
          "Certification No. C0026": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.NETWORK": 1,
          "A.OPERATOR": 1,
          "A.USER": 1
        },
        "T": {
          "T.RECOVER": 1,
          "T.SHUNT": 1,
          "T.SPOOF": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL3": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 2,
          "CCIMB-99-033": 2
        },
        "ISO": {
          "ISO/IEC 15408:1999": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "IPA/JISEC",
      "/Company": "IPA",
      "/CreationDate": "D:20050715113927+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 6.0",
      "/Manager": "IPA",
      "/ModDate": "D:20050715114102+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/SourceModified": "D:20050715023914",
      "/Subject": "C0026",
      "/Title": "CRP-e",
      "pdf_file_size_bytes": 336328,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    },
    "st_filename": "c0026_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NETWORK": 5,
          "A.OPERATOR": 5,
          "A.USER": 4
        },
        "O": {
          "O.MANAGE": 7,
          "O.NSP": 4,
          "O.REMOVE": 4,
          "O.RESIDUAL": 6,
          "O.UAU": 7
        },
        "OE": {
          "OE.BROWSER": 6,
          "OE.CIPHER": 3,
          "OE.CLIENT": 5,
          "OE.FIREWALL": 3,
          "OE.OPERATE": 3,
          "OE.USER": 3
        },
        "T": {
          "T.RECOVER": 5,
          "T.SHUNT": 5,
          "T.SPOOF": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.3": 3,
          "ACM_SCP.1": 2
        },
        "ADO": {
          "ADO_DEL.1": 2,
          "ADO_IGS.1": 3
        },
        "ADV": {
          "ADV_FSP.1": 10,
          "ADV_HLD.1": 3,
          "ADV_HLD.2": 1,
          "ADV_RCR.1": 3
        },
        "AGD": {
          "AGD_ADM.1": 6,
          "AGD_USR.1": 5
        },
        "ALC": {
          "ALC_DVS.1": 3
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 4,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_MSU.1": 2,
          "AVA_SOF.1": 2,
          "AVA_VLA.1": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 4
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 13,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 6,
          "FCS_COP.1": 15,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ITC.1": 2,
          "FDP_RIP.1": 11,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 29,
          "FIA_AFL.1.1": 3,
          "FIA_AFL.1.2": 3,
          "FIA_SOS.1": 30,
          "FIA_SOS.1.1": 4,
          "FIA_UAU.1": 13,
          "FIA_UAU.2": 42,
          "FIA_UAU.2.1": 3,
          "FIA_UAU.6": 10,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 14,
          "FIA_UAU.7.1": 2,
          "FIA_UID.1": 15,
          "FIA_UID.2": 34,
          "FIA_UID.2.1": 3
        },
        "FMT": {
          "FMT_MOF.1": 11,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.2": 7,
          "FMT_MTD.1": 35,
          "FMT_MTD.1.1": 4,
          "FMT_SMF.1": 20,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 43,
          "FMT_SMR.1.1": 3,
          "FMT_SMR.1.2": 3
        },
        "FPR": {
          "FPR_RVM.1": 6
        },
        "FPT": {
          "FPT_RVM.1": 16,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 16,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        },
        "FIPS": {
          "FIPS PUB 197": 1
        },
        "ISO": {
          "ISO/IEC 15408:1999": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          },
          "Rijndael": {
            "Rijndael": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "K.Nakagawa",
      "/Company": "SHARP Corporation",
      "/CreationDate": "D:20050526193729+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 6.0",
      "/ModDate": "D:20050526194843+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/SourceModified": "D:20050317081500",
      "/Subject": "[DSK_ST]",
      "/Title": "Security Target AR-FR11 M.20",
      "pdf_file_size_bytes": 1130755,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 45
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0026_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0026_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a5ac1d887fbdcec65ed07904ffc23e79f29245f6a5ddd83950edbf4cdb08f5eb",
      "txt_hash": "6823d6c1a9d35f5832b67141c9c420beb25dc41fc75d0ec1b6a5f909bffacafb"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6b6d7e4efcb627e4391e7c7b229910f423616891b2fde5e169e6d58d9dc6735b",
      "txt_hash": "bb4215b40fa714ce3ebc4490808af9136e3ffbaf0a31dbb382b889a529946df8"
    }
  },
  "status": "archived"
}