Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Fuji Xerox ApeosPort-V 7080/6080 DocuCentre-V 7080/6080 Series Controller SoftwareController ROM Ver. 1.0.7
JISEC-CC-CRP-C0481
Xerox D110/D125 Copier/Printer Version: Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0
JISEC-CC-CRP-C0362
name Fuji Xerox ApeosPort-V 7080/6080 DocuCentre-V 7080/6080 Series Controller SoftwareController ROM Ver. 1.0.7 Xerox D110/D125 Copier/Printer Version: Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0
category Other Devices and Systems Multi-Function Devices
not_valid_before 2015-08-26 2012-07-30
not_valid_after 2020-08-26 2017-08-03
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0481_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0362_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0481_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0362_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})})
state/report/pdf_hash a5004ae83a1bf9e92de95bd5ede3393f25d0d1c8f43694b079a3c64d1ea7dbd3 8c1690bee923714909fe3f8a02fb805dd61617c93e599d49f0a06a63384d4f1d
state/report/txt_hash 6c7b9392e2f74f366b5bfd8b1f17b0c48a08d54c051cb1dc979b5d549a026abd e44c82e54485d5d46fbc33a3e285c1752a2a8157a9422d6657bbc9e8f7d38f0b
state/st/pdf_hash 0bfd6690e3a5d3b0c7cd80e93af7d7a68d6a0d477f571497e640663d4b041f7b e491400b414b027695edca2961b366e87e08adfa2706dcf5d0195b9276c7cfe3
state/st/txt_hash 64249df87a950e2b2c2f8b4ebbcac2bd01ef4dfb2f22fd7e3dbad8390509c81a 5360f192da5064d06940846b89e8c2890239d39fcef02965b873bd5e4124d702
heuristics/cert_id JISEC-CC-CRP-C0481 JISEC-CC-CRP-C0362
heuristics/extracted_versions 1.0.7 9.8.0, 83.25.0, 1.201.1, 13.10.0
heuristics/scheme_data None
  • cert_id: C0362
  • supplier: Fuji Xerox Co., Ltd.
  • toe_overseas_name: Xerox D110/D125 Copier/Printer Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0
  • expiration_date: 2017-08
  • claim: EAL3+ ALC_FLR.2 PP
  • certification_date: 2012-07
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0362_it1380.html
  • toe_japan_name: -----
  • enhanced:
    • product: Xerox D110/D125 Copier/Printer
    • toe_version: Controller+PS ROM Ver. 1.201.1 IOT ROM Ver. 83.25.0 IIT ROM Ver. 9.8.0 ADF ROM Ver. 13.10.0
    • product_type: Multi Function Device
    • certification_date: 2012-07-30
    • cc_version: 3.1
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • protection_profile: IEEE Std 2600.1-2009
    • vendor: Fuji Xerox Co., Ltd.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/c0362_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0362_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0362_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
pdf_data/report_filename c0481_erpt.pdf c0362_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0481-01: 1
  • Certification No. C0481: 1
  • CRP-C0362-01: 1
  • Certification No. C0362: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 1
  • A.USER: 1
  • A.SECMODE: 1
  • A.ACCESS: 1
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
pdf_data/report_keywords/cc_claims/A/A.ADMIN 1 2
pdf_data/report_keywords/cc_claims/T
  • T.CONSUME: 2
  • T.DATA_SEC: 2
  • T.CONFDATA: 2
  • T.RECOVER: 2
  • T.COMM_TAP: 2
  • T.DOC: 4
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
pdf_data/report_keywords/cc_security_level/EAL/EAL3 augmented 3 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
    • print data from the printer driver of user client to the MFD. Therefore, the following function is out of scope of the evaluated security functions. - Printer driver requires a user to enter user ID and password: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • TLS:
    • TLS: 4
    • TLS 1.0: 1
    • TLS 1.1: 1
    • TLS 1.2: 1
  • SSL:
    • SSL 3.0: 1
    • SSL: 1
  • TLS:
    • TLS 1.0: 1
pdf_data/report_keywords/crypto_protocol/TLS/TLS
  • TLS: 4
  • TLS 1.0: 1
  • TLS 1.1: 1
  • TLS 1.2: 1
  • TLS 1.0: 1
pdf_data/report_keywords/eval_facility/ITSC/Information Technology Security Center 4 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 8
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
pdf_data/report_keywords/vendor/Microsoft/Microsoft 12 9
pdf_data/report_metadata//CreationDate D:20151030112753+09'00' D:20121031165826+09'00'
pdf_data/report_metadata//Creator Microsoft® Word 2013 Microsoft® Word 2010
pdf_data/report_metadata//ModDate D:20151030112812+09'00' D:20121031165849+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2013 Microsoft® Word 2010
pdf_data/report_metadata/pdf_file_size_bytes 332844 334585
pdf_data/report_metadata/pdf_number_of_pages 37 36
pdf_data/st_filename c0481_est.pdf c0362_est.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.AUDITS: 8
    • O.CIPHER: 6
    • O.COMM_SEC: 7
    • O.FAX_SEC: 5
    • O.MANAGE: 9
    • O.RESIDUAL: 4
    • O.USER: 7
    • O.RESTRICT: 7
    • O.VERIFY: 4
  • T:
    • T.RECOVER: 5
    • T.CONFDATA: 3
    • T.DATA_SEC: 3
    • T.COMM_TAP: 5
    • T.CONSUME: 5
  • A:
    • A.ADMIN: 5
    • A.USER: 3
    • A.SECMODE: 5
    • A.ACCESS: 3
  • OE:
    • OE.ADMIN: 3
    • OE.USER: 3
    • OE.SEC: 9
    • OE.PHYSICAL: 3
  • D:
    • D.FUNC: 59
    • D.DOC: 61
    • D.PROT: 3
    • D.CONF: 13
  • O:
    • O.AUDIT_STORAGE: 9
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 9
    • O.DOC: 16
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 14
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
    • O.AUDIT_STORAG: 1
  • T:
    • T.DOC: 7
    • T.CONF: 7
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 12
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 5
  • A.USER: 3
  • A.SECMODE: 5
  • A.ACCESS: 3
  • A.ACCESS: 3
  • A.USER: 3
  • A.ADMIN: 6
pdf_data/st_keywords/cc_claims/A/A.ADMIN 5 6
pdf_data/st_keywords/cc_claims/O
  • O.AUDITS: 8
  • O.CIPHER: 6
  • O.COMM_SEC: 7
  • O.FAX_SEC: 5
  • O.MANAGE: 9
  • O.RESIDUAL: 4
  • O.USER: 7
  • O.RESTRICT: 7
  • O.VERIFY: 4
  • O.AUDIT_STORAGE: 9
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 9
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDIT_STORAG: 1
pdf_data/st_keywords/cc_claims/O/O.CIPHER 6 9
pdf_data/st_keywords/cc_claims/O/O.USER 7 14
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 3
  • OE.USER: 3
  • OE.SEC: 9
  • OE.PHYSICAL: 3
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 12
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 3 6
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL 3 2
pdf_data/st_keywords/cc_claims/OE/OE.USER 3 12
pdf_data/st_keywords/cc_claims/T
  • T.RECOVER: 5
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 5
  • T.CONSUME: 5
  • T.DOC: 7
  • T.CONF: 7
  • T.FUNC: 3
  • T.PROT: 3
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 3 5
pdf_data/st_keywords/cc_security_level/EAL/EAL3 4 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.2: 8
    • FAU_STG.1: 10
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACF.1: 10
    • FDP_IFC.1: 11
    • FDP_IFF.1: 10
    • FDP_RIP.1: 8
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
  • FIA:
    • FIA_AFL.1: 32
    • FIA_ATD.1: 10
    • FIA_SOS.1: 6
    • FIA_UAU.1: 19
    • FIA_UAU.7: 10
    • FIA_UID.1: 16
    • FIA_USB.1: 8
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UIA.1: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 11
    • FMT_MSA.3: 11
    • FMT_MTD.1: 11
    • FMT_SMF.1: 17
    • FMT_SMR.1: 15
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 2
  • FPT:
    • FPT_STM.1: 10
    • FPT_TST.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.2: 9
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_STG.1: 10
    • FAU_STG.4: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
    • FCS_COP: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ACC.1: 86
    • FDP_ACF.1: 80
    • FDP_RIP.1: 9
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 7
    • FDP_ACF.1.1: 7
    • FDP_ACF.1.2: 7
    • FDP_ACF.1.3: 7
    • FDP_ACF.1.4: 7
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 7
  • FIA:
    • FIA_AFL.1: 35
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.1: 18
    • FIA_UAU.7: 10
    • FIA_UID.2: 21
    • FIA_UID.1: 11
    • FIA_USB.1: 9
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UID: 4
  • FMT:
    • FMT_SMR.1: 43
    • FMT_MOF.1: 11
    • FMT_MSA.1: 79
    • FMT_MSA.3: 80
    • FMT_MTD.1: 22
    • FMT_SMF.1: 36
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 7
    • FMT_MSA.3.1: 7
    • FMT_MSA.3.2: 7
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 15
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 9
  • FAU_SAR.2: 8
  • FAU_STG.1: 10
  • FAU_STG.4: 8
  • FAU_GEN.1.2: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 2
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
  • FAU_GEN: 1
  • FAU_GEN.1: 15
  • FAU_GEN.2: 9
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_STG.1: 10
  • FAU_STG.4: 9
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 12 15
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 9 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 2 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 8 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 9
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 11
  • FCS_COP.1: 10
  • FCS_CKM.2: 1
  • FCS_CKM.4: 3
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_CKM.1: 12
  • FCS_COP.1: 11
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 11 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 3 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 10 11
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 12
  • FDP_ACF.1: 10
  • FDP_IFC.1: 11
  • FDP_IFF.1: 10
  • FDP_RIP.1: 8
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
  • FDP_ACC: 4
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACC.1: 86
  • FDP_ACF.1: 80
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 7
  • FDP_ACF.1.1: 7
  • FDP_ACF.1.2: 7
  • FDP_ACF.1.3: 7
  • FDP_ACF.1.4: 7
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 12 86
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 1 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 10 80
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 1 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 1 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 1 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 1 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 11 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 8 9
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 32
  • FIA_ATD.1: 10
  • FIA_SOS.1: 6
  • FIA_UAU.1: 19
  • FIA_UAU.7: 10
  • FIA_UID.1: 16
  • FIA_USB.1: 8
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UIA.1: 1
  • FIA_AFL.1: 35
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 18
  • FIA_UAU.7: 10
  • FIA_UID.2: 21
  • FIA_UID.1: 11
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID: 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 32 35
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 10 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 6 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 19 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 16 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 8 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 9 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 11 79
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 1 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 80
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 1 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 1 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 11 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 17 36
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 15 43
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 10
  • FPT_TST.1: 8
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 15
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 11
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 10 11
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 8 9
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_TRP.1: 8
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 1
  • FTP_TRP.1.3: 1
  • FTP_ITC.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Job Flow A function to enable efficient standard: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA1: 7
    • SHA-1: 4
  • SHA2:
    • SHA256: 3
  • SHA1:
    • SHA-1: 10
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA1: 7
  • SHA-1: 4
  • SHA-1: 10
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 4 10
pdf_data/st_keywords/side_channel_analysis
  • other:
    • cold boot: 1
  • FI:
    • malfunction: 2
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/RFC
  • RFC 2104: 1
  • RFC 2104: 1
  • RFC3414: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 12
  • AES:
    • AES: 7
  • RC:
    • RC4: 1
    • RC2: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 12 7
pdf_data/st_keywords/symmetric_crypto/DES
  • 3DES:
    • Triple-DES: 1
  • DES:
    • DES: 1
  • 3DES:
    • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 3
pdf_data/st_keywords/tls_cipher_suite/TLS
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_metadata//CreationDate D:20151021151722+09'00' D:20121031140314+09'00'
pdf_data/st_metadata//ModDate D:20151021151722+09'00' D:20121031140314+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 10.1.13 (Windows) Acrobat Distiller 10.1.4 (Windows)
pdf_data/st_metadata/pdf_file_size_bytes 613233 618720
pdf_data/st_metadata/pdf_number_of_pages 94 134
dgst 05039c57ee15e7e1 1a13d276f611f29e