Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Xerox WorkCentre 7120/7125 Controller ROM Ver. 1.210.3 IOT ROM Ver. 5.12.0 ADF ROM Ver. 11.0.1
JISEC-CC-CRP-C0322
Fuji Xerox DocuCentre-VI C2264 model with Hard Disk, Data Security, Scan, and Fax Controller ROM Ver. 1.1.3, FAX ROM Ver. 2.2.0
JISEC-CC-CRP-C0634-01-2019
name Xerox WorkCentre 7120/7125 Controller ROM Ver. 1.210.3 IOT ROM Ver. 5.12.0 ADF ROM Ver. 11.0.1 Fuji Xerox DocuCentre-VI C2264 model with Hard Disk, Data Security, Scan, and Fax Controller ROM Ver. 1.1.3, FAX ROM Ver. 2.2.0
not_valid_before 2011-10-14 2019-03-18
not_valid_after 2016-11-02 2024-03-18
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0322_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0634_est.pdf
manufacturer Fuji Xerox Co., Ltd. FUJIFILM Business Innovation Corp.
manufacturer_web https://www.fujixerox.co.jp/eng/ https://www.fujifilm.com/fb/eng
security_level EAL3 ALC_FLR.2, EAL2+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0322_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0634_erpt.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0634_eimg.pdf
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None 0b54aa75d538ebabc29ba3ed8e355894f2054839fd13f926aed322f799638fc7
state/cert/txt_hash None e3ccb4c575b541d4c49d1b207f31421eaa03514fa56eb991d6640bf335c05153
state/report/pdf_hash 6dbdca4b060157a6c9efc3098dfc21c8612a5563e53eadf05c50e660ea3ecf2b 0b54bed36b05dc5182a6b29597741d31f84f909d2f11f8fd17880e0aa67fa384
state/report/txt_hash 32c1df16c972b79a434b557ddffa2f5401aea088c2ef8bf1318c6b592219a692 fe0f0e747c58131cdfba5aaef1faff111d7173c1f716cb2090dde5f650b96b80
state/st/pdf_hash b0ff40fdc34a02a3587a7cea53f3d20adcc49cb40dd3f21854f1d98fc8c84327 d5ba946045959011e6c380dcca03a5de4b9146eef891f319b288f441283006c4
state/st/txt_hash fe0d3f8575a093910c9a811bd9d5f147bb47acf7a90691cf870b15a90fa148bd 6f14a0388ac6a7abe8206f5d5f40041cb53b39d9c7ff17a9554e5eb2d2a7bef2
heuristics/cert_id JISEC-CC-CRP-C0322 JISEC-CC-CRP-C0634-01-2019
heuristics/extracted_versions 1.210.3, 5.12.0, 11.0.1 2.2.0, 1.1.3
heuristics/scheme_data
  • cert_id: C0322
  • supplier: Fuji Xerox Co., Ltd.
  • toe_overseas_name: Xerox WorkCentre 7120/7125 Controller ROM Ver. 1.210.3, IOT ROM Ver. 5.12.0, ADF ROM Ver. 11.0.1
  • expiration_date: 2016-11
  • claim: EAL3
  • certification_date: 2011-10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0322_it1335.html
  • toe_japan_name: -----
  • enhanced:
    • product: Xerox WorkCentre 7120/7125
    • toe_version: Controller ROM Ver. 1.210.3 IOT ROM Ver. 5.12.0 ADF ROM Ver. 11.0.1
    • product_type: Multi Function Device
    • certification_date: 2011-10-14
    • cc_version: 3.1
    • assurance_level: EAL3
    • vendor: Fuji Xerox Co., Ltd.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/c0322_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0322_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0322_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The MFD is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security
  • cert_id: C0634
  • supplier: FUJIFILM Business Innovation Corp.
  • toe_overseas_name: -----
  • expiration_date: 2024-04
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • certification_date: 2019-03
  • toe_overseas_link: None
  • toe_japan_name: Fuji Xerox DocuCentre-VI C2264 model with Hard Disk, Data Security, Scan, and Fax Controller ROM Ver. 1.1.3,FAX ROM Ver. 2.2.0
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0634_it8674.html
  • enhanced:
    • product: Fuji Xerox DocuCentre-VI C2264 model with Hard Disk, Data Security, Scan, and Fax
    • toe_version: Controller ROM Ver. 1.1.3, FAX ROM Ver. 2.2.0
    • product_type: Multi-Function Device
    • cert_id: JISEC-C0634
    • certification_date: 2019-03-18
    • cc_version: 3.1 Release5
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • vendor: FUJIFILM Business Innovation Corp.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/c0634_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0634_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0634_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, scan, network scan, fax, and mailbox. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/cert_id C0322 C0634
heuristics/scheme_data/certification_date 2011-10 2019-03
heuristics/scheme_data/claim EAL3 PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
heuristics/scheme_data/enhanced
  • product: Xerox WorkCentre 7120/7125
  • toe_version: Controller ROM Ver. 1.210.3 IOT ROM Ver. 5.12.0 ADF ROM Ver. 11.0.1
  • product_type: Multi Function Device
  • certification_date: 2011-10-14
  • cc_version: 3.1
  • assurance_level: EAL3
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0322_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0322_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0322_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The MFD is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security
  • product: Fuji Xerox DocuCentre-VI C2264 model with Hard Disk, Data Security, Scan, and Fax
  • toe_version: Controller ROM Ver. 1.1.3, FAX ROM Ver. 2.2.0
  • product_type: Multi-Function Device
  • cert_id: JISEC-C0634
  • certification_date: 2019-03-18
  • cc_version: 3.1 Release5
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: FUJIFILM Business Innovation Corp.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0634_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0634_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0634_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, scan, network scan, fax, and mailbox. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/assurance_level EAL3 EAL2 Augmented by ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 3.1 3.1 Release5
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0322_eimg.pdf https://www.ipa.go.jp/en/security/c0634_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2011-10-14 2019-03-18
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The MFD is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, scan, network scan, fax, and mailbox. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Evaluation Department Information Technology Security Center Evaluation Department
heuristics/scheme_data/enhanced/product Xerox WorkCentre 7120/7125 Fuji Xerox DocuCentre-VI C2264 model with Hard Disk, Data Security, Scan, and Fax
heuristics/scheme_data/enhanced/product_type Multi Function Device Multi-Function Device
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0322_erpt.pdf https://www.ipa.go.jp/en/security/c0634_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0322_est.pdf https://www.ipa.go.jp/en/security/c0634_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 1.210.3 IOT ROM Ver. 5.12.0 ADF ROM Ver. 11.0.1 Controller ROM Ver. 1.1.3, FAX ROM Ver. 2.2.0
heuristics/scheme_data/enhanced/vendor Fuji Xerox Co., Ltd. FUJIFILM Business Innovation Corp.
heuristics/scheme_data/expiration_date 2016-11 2024-04
heuristics/scheme_data/supplier Fuji Xerox Co., Ltd. FUJIFILM Business Innovation Corp.
heuristics/scheme_data/toe_japan_name ----- Fuji Xerox DocuCentre-VI C2264 model with Hard Disk, Data Security, Scan, and Fax Controller ROM Ver. 1.1.3,FAX ROM Ver. 2.2.0
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0322_it1335.html None
heuristics/scheme_data/toe_overseas_name Xerox WorkCentre 7120/7125 Controller ROM Ver. 1.210.3, IOT ROM Ver. 5.12.0, ADF ROM Ver. 11.0.1 -----
pdf_data/cert_filename None c0634_eimg.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0634-01-2019: 1
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ITSC:
      • Information Technology Security Center: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 167849
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20190822093704+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190822093944+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/report_filename c0322_erpt.pdf c0634_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0322-01: 1
  • Certification No. C0322: 1
  • JISEC-CC-CRP-C0634-01-2019: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 1
  • A.SECMODE: 1
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
pdf_data/report_keywords/cc_claims/A/A.ADMIN 1 2
pdf_data/report_keywords/cc_claims/T
  • T.CONSUME: 2
  • T.DATA_SEC: 2
  • T.CONFDATA: 2
  • T.RECOVER: 2
  • T.COMM_TAP: 2
  • T.DOC: 4
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL2: 4
  • EAL2 augmented: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
  • TLS:
    • TLS:
      • TLS: 2
  • IPsec:
    • IPsec: 6
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 1
  • TLS:
    • TLS: 2
pdf_data/report_keywords/eval_facility/ITSC/Information Technology Security Center 3 4
pdf_data/report_keywords/standard_id/CC
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/vendor/Microsoft/Microsoft 22 16
pdf_data/report_metadata//CreationDate D:20111110173533+09'00' D:20190924152938+09'00'
pdf_data/report_metadata//ModDate D:20111110173616+09'00' D:20190924153017+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 396466 579605
pdf_data/report_metadata/pdf_number_of_pages 35 37
pdf_data/st_filename c0322_est.pdf c0634_est.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.AUDITS: 8
    • O.CIPHER: 6
    • O.COMM_SEC: 7
    • O.FAX_SEC: 5
    • O.MANAGE: 9
    • O.RESIDUAL: 6
    • O.USER: 7
    • O.RESTRICT: 7
  • T:
    • T.RECOVER: 5
    • T.CONFDATA: 3
    • T.DATA_SEC: 3
    • T.COMM_TAP: 5
    • T.CONSUME: 5
  • A:
    • A.ADMIN: 5
    • A.SECMODE: 3
  • OE:
    • OE.ADMIN: 3
    • OE.SEC: 7
  • D:
    • D.DOC: 57
    • D.FUNC: 28
    • D.PROT: 4
    • D.CONF: 13
  • O:
    • O.AUDIT_STORAGE: 10
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 8
    • O.DOC: 16
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 14
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
  • T:
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
    • T.CONF: 6
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 12
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 5
  • A.SECMODE: 3
  • A.ACCESS: 3
  • A.USER: 3
  • A.ADMIN: 6
pdf_data/st_keywords/cc_claims/A/A.ADMIN 5 6
pdf_data/st_keywords/cc_claims/O
  • O.AUDITS: 8
  • O.CIPHER: 6
  • O.COMM_SEC: 7
  • O.FAX_SEC: 5
  • O.MANAGE: 9
  • O.RESIDUAL: 6
  • O.USER: 7
  • O.RESTRICT: 7
  • O.AUDIT_STORAGE: 10
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 8
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
pdf_data/st_keywords/cc_claims/O/O.CIPHER 6 8
pdf_data/st_keywords/cc_claims/O/O.USER 7 14
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 3
  • OE.SEC: 7
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 12
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 3 6
pdf_data/st_keywords/cc_claims/T
  • T.RECOVER: 5
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 5
  • T.CONSUME: 5
  • T.DOC: 6
  • T.FUNC: 3
  • T.PROT: 3
  • T.CONF: 6
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 1
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_FLR.2: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 6
  • EAL 3: 1
  • EAL2: 2
  • EAL 2: 1
  • EAL2 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.2: 8
    • FAU_STG.1: 10
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACF.1: 10
    • FDP_IFC.1: 11
    • FDP_IFF.1: 10
    • FDP_RIP.1: 8
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
  • FIA:
    • FIA_AFL.1: 29
    • FIA_ATD.1: 9
    • FIA_SOS.1: 6
    • FIA_UAU.1: 19
    • FIA_UAU.7: 9
    • FIA_UID.1: 16
    • FIA_USB.1: 8
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UIA.1: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 11
    • FMT_MSA.3: 11
    • FMT_MTD.1: 11
    • FMT_SMF.1: 17
    • FMT_SMR.1: 15
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 2
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.2: 9
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_STG.1: 11
    • FAU_STG.4: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
    • FCS_COP: 1
  • FDP:
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ACC.1: 89
    • FDP_ACF.1: 78
    • FDP_RIP.1: 9
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 7
    • FDP_ACF.1.1: 7
    • FDP_ACF.1.2: 7
    • FDP_ACF.1.3: 7
    • FDP_ACF.1.4: 7
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 7
    • FDP_ACC: 2
  • FIA:
    • FIA_AFL.1: 19
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.1: 16
    • FIA_UAU.7: 10
    • FIA_UID.1: 22
    • FIA_USB.1: 9
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA.1: 89
    • FMT_SMR.1: 40
    • FMT_MOF.1: 11
    • FMT_MSA.3: 85
    • FMT_MTD.1: 21
    • FMT_SMF.1: 35
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 7
    • FMT_MSA.3.1: 7
    • FMT_MSA.3.2: 7
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 16
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 9
  • FAU_SAR.2: 8
  • FAU_STG.1: 10
  • FAU_STG.4: 8
  • FAU_GEN.1.2: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 2
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
  • FAU_GEN: 1
  • FAU_GEN.1: 15
  • FAU_GEN.2: 9
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_STG.1: 11
  • FAU_STG.4: 9
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 12 15
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 9 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 2 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 8 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 10 11
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 9
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 11
  • FCS_COP.1: 10
  • FCS_CKM.2: 1
  • FCS_CKM.4: 3
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_CKM.1: 12
  • FCS_COP.1: 11
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 11 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 3 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 10 11
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 12
  • FDP_ACF.1: 10
  • FDP_IFC.1: 11
  • FDP_IFF.1: 10
  • FDP_RIP.1: 8
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACC.1: 89
  • FDP_ACF.1: 78
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 7
  • FDP_ACF.1.1: 7
  • FDP_ACF.1.2: 7
  • FDP_ACF.1.3: 7
  • FDP_ACF.1.4: 7
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 7
  • FDP_ACC: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 12 89
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 1 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 10 78
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 1 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 1 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 1 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 1 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 11 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 8 9
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 29
  • FIA_ATD.1: 9
  • FIA_SOS.1: 6
  • FIA_UAU.1: 19
  • FIA_UAU.7: 9
  • FIA_UID.1: 16
  • FIA_USB.1: 8
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UIA.1: 1
  • FIA_AFL.1: 19
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 16
  • FIA_UAU.7: 10
  • FIA_UID.1: 22
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID.2: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 29 19
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 4 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 4 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 9 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 6 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 19 16
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 9 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 16 22
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 8 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 9 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 11 89
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 1 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 85
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 1 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 1 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 11 21
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 17 35
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 15 40
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 10
  • FPT_STM.1.1: 1
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 16
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 11
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 10 11
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_TRP.1: 8
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 1
  • FTP_TRP.1.3: 1
  • FTP_ITC.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 14
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 10
  • SHA1:
    • SHA1: 2
    • SHA-1: 2
  • SHA2:
    • SHA256: 2
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 10
  • SHA1: 2
  • SHA-1: 2
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 10 2
pdf_data/st_keywords/side_channel_analysis
  • other:
    • cold boot: 1
  • FI:
    • malfunction: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/RFC
  • RFC 2104: 1
  • RFC3414: 1
  • RFC 2104: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 7
  • RC:
    • RC4: 1
    • RC2: 1
  • AES:
    • AES: 5
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 5
pdf_data/st_keywords/symmetric_crypto/DES
  • DES:
    • DES: 1
  • 3DES:
    • Triple-DES: 3
  • 3DES:
    • Triple-DES: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 3 1
pdf_data/st_keywords/tls_cipher_suite/TLS
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 457478
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /Author:
  • /CreationDate: D:20111107110149+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20111107110149+09'00'
  • /Producer: Acrobat Distiller 10.1.1 (Windows)
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1251570
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 129
  • /Author: Fuji Xerox Co., Ltd.
  • /Company: Fuji Xerox Co., Ltd
  • /CreationDate: D:20190918165138+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 19
  • /Manager: Propulsion Team of Security Certification
  • /ModDate: D:20190918170008+09'00'
  • /Producer: Adobe PDF Library 19.12.66
  • /SourceModified: D:20190918074942
  • /Subject:
  • /Title: Fuji Xerox DocuCentre-VI C2264 Security Target
  • pdf_hyperlinks: https://www.ipa.go.jp/security/jisec/jisec_e/prdct_in_eval/FujiXeroxDocuCentre-V_C2265.html, javascript:g('attested'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART2V3.1R2.pdf, javascript:g('characters'), javascript:g('From'), javascript:g('in'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART3V3.1R2.pdf, javascript:g('accordance'), javascript:g('with'), javascript:g('is'), javascript:g('when'), javascript:g('TOE.'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART1V3.1R1.pdf
pdf_data/st_metadata//Author Fuji Xerox Co., Ltd.
pdf_data/st_metadata//CreationDate D:20111107110149+09'00' D:20190918165138+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 Word 用 Acrobat PDFMaker 19
pdf_data/st_metadata//ModDate D:20111107110149+09'00' D:20190918170008+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 10.1.1 (Windows) Adobe PDF Library 19.12.66
pdf_data/st_metadata//Title Fuji Xerox DocuCentre-VI C2264 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 457478 1251570
pdf_data/st_metadata/pdf_hyperlinks https://www.ipa.go.jp/security/jisec/jisec_e/prdct_in_eval/FujiXeroxDocuCentre-V_C2265.html, javascript:g('attested'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART2V3.1R2.pdf, javascript:g('characters'), javascript:g('From'), javascript:g('in'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART3V3.1R2.pdf, javascript:g('accordance'), javascript:g('with'), javascript:g('is'), javascript:g('when'), javascript:g('TOE.'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART1V3.1R1.pdf
pdf_data/st_metadata/pdf_is_encrypted False True
pdf_data/st_metadata/pdf_number_of_pages 90 129
dgst 12e9fc79eff7d341 e5218b96c0250529