Certified/Validated Products List

TASKalfa 3050ci, TASKalfa 3550ci,
TASKalfa 4550ci, TASKalfa 5550ci,
TASKalfa 3050ciG, TASKalfa 3550ciG,
TASKalfa 4550ciG, TASKalfa 5550ciG, CS 3050ci,
CS 3550ci, CS 4550ci, CS 5550ci, CDC 1930, CDC 1935,
CDC 1945, CDC 1950, DCC 2930, DCC 2935, DCC 2945,
DCC 2950 Data Security Kit (E)
V1.00E

KYOCERA MITA Corporation
Last Updated 2011-09-08
Product Name :
TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci, TASKalfa 3050ciG, TASKalfa 3550ciG, TASKalfa 4550ciG, TASKalfa 5550ciG, CS 3050ci, CS 3550ci, CS 4550ci, CS 5550ci, CDC 1930, CDC 1935, CDC 1945, CDC 1950, DCC 2930, DCC 2935, DCC 2945, DCC 2950 Data Security Kit (E)
Version of TOE :
V1.00E
Product Type :
Data protection function in digital MFP
Certification No. :
C0293
Date :
2011-05-30
Version of Common Criteria:
3.1
Conformance Claim :
EAL3
PP Identifier :
None

PRODUCT DESCRIPTION

Description of TOE

The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function.

    - TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci
    - TASKalfa 3050ciG, TASKalfa 3550ciG, TASKalfa 4550ciG, TASKalfa 5550ciG
    - CS 3050ci, CS 3550ci, CS 4550ci, CS 5550ci
    - CDC 1930, CDC 1935, CDC 1945, CDC 1950
    - DCC 2930, DCC 2935, DCC 2945, DCC 2950

This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided.


TOE security functionality

The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions.

    - Image Data Encryption Function
    - Image Data Overwrite-Erase Function

Security functional requirements

This TOE implements the following security functional requirements.

Security audit Non-repudiation of origin/receipt Cryptographic functionality Access control
Data authentication Export data protection Information flow control Import data protection
Internal transfer data protection Residual information protection Rollback Stored data integrity
Transfer data confidentiality Transfer data integrity Identification and authentication Security management
Privacy Control Security functionality protection Resource utilisation management TOE access control
Trusted path/channels