name |
DeepSecure Release 2.1 |
Fuji Xerox DocuCentre-V C2265/C2263 models with Hard Disk, Data Security, Scan, and Fax Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8 |
category |
Boundary Protection Devices and Systems |
Multi-Function Devices |
scheme |
UK |
JP |
status |
archived |
archived |
not_valid_after |
05.03.2013 |
31.03.2021 |
not_valid_before |
10.08.2006 |
31.03.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP228.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0504_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/DeepSecure2.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0504_est.pdf |
manufacturer |
Deep-Secure |
Fuji Xerox Co., Ltd. |
manufacturer_web |
https://www.deep-secure.com/ |
https://www.fujixerox.co.jp/eng/ |
security_level |
EAL4 |
EAL2+, ALC_FLR.2 |
dgst |
06ce127256b21c07 |
739d1755f2fd3d4a |
heuristics/cert_id |
CRP228 |
JISEC-CC-CRP-C0504 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:h:fujixerox:docucentre-v_c2263:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.2, AVA_MSU.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, ADV_IMP.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
2.1 |
1.0.13, 2.0.8 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0504
- certification_date: 01.03.2016
- claim: EAL2+ ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.2
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0504_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Fuji Xerox DocuCentre-V C2265/C2263 models with Hard Disk, Data Security, Scan, and Fax
- product_type: Multi Function Device
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/c0504_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0504_est.pdf
- toe_version: Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.04.2021
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_name: Fuji Xerox DocuCentre-V C2265/C2263 models with Hard Disk, Data Security, Scan, and FaxController ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0504_it5558.html
- toe_overseas_name: Fuji Xerox DocuCentre-V C2265/C2263 models with Hard Disk, Data Security, Scan, and FaxController ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
43ce79b420f23a00 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP228.pdf |
c0504_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- UK:
- CERTIFICATION REPORT No. P228: 1
|
- JP:
- CRP-C0504-01: 1
- Certification No. C0504: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- RFC:
- X509:
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: Administrator
- /CreationDate: D:20060810123509Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20060814114710+01'00'
- /Producer: GPL Ghostscript 8.15
- /Title: Microsoft Word - T514 Cert_Rep - 1_0.doc
- pdf_file_size_bytes: 518376
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /CreationDate: D:20160519150829+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /ModDate: D:20160519151247+09'00'
- /Producer: Adobe PDF Library 11.0
- /Title:
- pdf_file_size_bytes: 473189
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
DeepSecure2.1.pdf |
c0504_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL2: 2
- EAL2 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_GEN.4: 2
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_STG: 10
- FAU_STG.1: 3
- FAU_STG.3: 1
- FAU_STG.4: 1
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.1.1: 2
- FCS_CKM.2: 6
- FCS_CKM.2.1: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_COP: 16
- FCS_COP.1: 3
- FCS_COP.1.1: 6
- FDP:
- FDP_IFC.1: 15
- FDP_IFC.1.1: 1
- FDP_IFF.1: 17
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_LCK: 34
- FDP_SPD: 17
- FDP_TAO: 17
- FDP_TCK: 18
- FDP_VSF: 17
- FIA:
- FIA_UAU: 13
- FIA_UAU.1: 2
- FIA_UID: 13
- FIA_UID.1: 9
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA: 11
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.2: 4
- FMT_MSA.3: 5
- FMT_MSA.3.2: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF: 11
- FMT_SMF.1: 17
- FMT_SMF.1.1: 2
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 2
- FMT_SMR.4: 2
- FPT:
- FPT_ITI.1: 4
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_STM.1: 4
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAR: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 2
- FCS_COP: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 100
- FDP_ACC.1.1: 8
- FDP_ACF.1: 92
- FDP_ACF.1.1: 8
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 8
- FDP_ACF.1.4: 8
- FDP_IFC: 1
- FDP_IFC.1: 8
- FDP_IFF: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 19
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 16
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID.1: 22
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 99
- FMT_MSA.1.1: 8
- FMT_MSA.3: 90
- FMT_MSA.3.1: 8
- FMT_MSA.3.2: 8
- FMT_MTD.1: 23
- FMT_MTD.1.1: 2
- FMT_SMF.1: 38
- FMT_SMF.1.1: 1
- FMT_SMR.1: 45
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 16
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AUDITING: 2
- O.AUTHORISATION: 2
- O.DISCRETIONARY_ACCESS: 4
- O.DUTY: 1
- O.ENFORCEMENT: 6
- O.HIERARCHICAL: 1
- O.MANAGE: 2
- O.MANDATORY_ACCESS: 3
- O.RESIDUAL_INFORMATION: 1
- O.ROLE: 1
|
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 13
- D.DOC: 60
- D.FUNC: 53
- D.PROT: 4
- O:
- O.AUDIT: 8
- O.AUDIT_ACCESS: 10
- O.AUDIT_STORAGE: 10
- O.CIPHER: 8
- O.CONF: 16
- O.DOC: 16
- O.FUNC: 8
- O.INTERFACE: 8
- O.PROT: 8
- O.SOFTWARE: 8
- O.USER: 14
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_STORAGE: 2
- OE.INTERFACE: 3
- OE.PHYISCAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
- ISO:
- RFC:
- RFC 1847: 1
- RFC 2045: 1
- RFC 2046: 1
- RFC 2047: 1
- RFC 2048: 1
- RFC 2049: 1
- RFC 2156: 1
- RFC 2157: 1
- RFC 2164: 1
- RFC 2231: 1
- RFC 2387: 1
- RFC 2480: 1
- RFC 2631: 1
- RFC 2634: 4
- RFC 2821: 2
- RFC 2822: 2
- RFC 3370: 12
- RFC 3447: 6
- RFC 3461: 1
- RFC 3462: 1
- RFC 3463: 1
- RFC 3464: 2
- RFC 3565: 16
- RFC 3798: 2
- RFC 3850: 1
- RFC 3851: 1
- RFC 3852: 1
- RFC 3854: 1
- RFC 3855: 1
- X509:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
|
pdf_data/st_metadata |
- /Author: Jim Craigie
- /Category: Unclassified
- /Company:
- /CreationDate: D:20060731065337+01'00'
- /Creator: Acrobat PDFMaker 7.0.7 for Word
- /Keywords: DN11488/1
- /ModDate: D:20060810123743+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Subject: Security Target
- /Title: Clearswift DeepSecure
- pdf_file_size_bytes: 734194
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 113
|
- /Author:
- /CreationDate: D:20160519113148+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20160519113148+09'00'
- /Producer: Acrobat Distiller 10.1.16 (Windows)
- /Title:
- pdf_file_size_bytes: 828521
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 136
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |