Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific Version: Controller ROM Ver. 1.180.7
JISEC-CC-CRP-C0196
Xerox WorkCentre 7328/7335/7345 Version: Controller+PS ROM Ver.1.221.100 IOT ROM Ver.3.0.4 IIT ROM Ver.20.4.1 ADF ROM Ver.11.6.5
JISEC-CC-CRP-C0137
name Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific Version: Controller ROM Ver. 1.180.7 Xerox WorkCentre 7328/7335/7345 Version: Controller+PS ROM Ver.1.221.100 IOT ROM Ver.3.0.4 IIT ROM Ver.20.4.1 ADF ROM Ver.11.6.5
not_valid_before 2008-11-28 2007-12-26
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0196_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0137_st.pdf
security_level EAL3 EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0196_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0137_erpt.pdf
state/report/pdf_hash 387425614014ac262bfdf2c8535d43ccc7e3dfcea9b9910c6204f6dcae8ba290 4ae8dc0ac7bdb323b309245cf522f4547b4b8d1f2beb6f781506123285cf0a6e
state/report/txt_hash 2dc464d2cfac130823e986afedaf4d7d68697612adfae220d5948ca9efba36b0 2405d82fcd783f77e2b6ac0d0b47988992c62eb0d2af2ed229a87cff1c0e1777
state/st/pdf_hash 2ac0d2e3db04f3aaf347df1db59971d908e2c3c4cde15d68055e30d46a1615fb c3cee380822a69180e7488a2bb69893eea63e56301e650f9487794bba4822999
state/st/txt_hash c390e197773d71fab7b8170afb6357332cf331ccd737a8d93b2a8f8768e60bce 3ef3fbe62d950d5e8e2acf0286cf9b203345b92bfe0eb800e8ed884f374488c7
heuristics/cert_id JISEC-CC-CRP-C0196 JISEC-CC-CRP-C0137
heuristics/extracted_versions 1.180.7 3.0.4, 11.6.5, 1.221.100, 20.4.1
heuristics/scheme_data/cert_id C0196 C0137
heuristics/scheme_data/certification_date 2008-11 2007-12
heuristics/scheme_data/claim EAL3 EAL2
heuristics/scheme_data/enhanced
  • product: Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific
  • toe_version: Controller ROM Ver.1.180.7
  • product_type: Control Software for Multi Function Peripheral
  • certification_date: 2008-11-28
  • assurance_level: EAL3
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0196_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0196_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0196_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, and fax functions as basic functions.The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - System Administrator’s Security Management - Customer Engineer Operation Restriction - FAX Flow Security
  • product: Xerox WorkCentre 7328/7335/7345
  • toe_version: Controller+PS ROM Ver.1.221.100 IOT ROM Ver.3.0.4 IIT ROM Ver.20.4.1 ADF ROM Ver.11.6.5
  • product_type: IT Product (Multi Function Peripheral)
  • certification_date: 2007-12-26
  • cc_version: 2.3
  • assurance_level: EAL2
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center
  • report_link: https://www.ipa.go.jp/en/security/c0137_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0137_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0137_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
heuristics/scheme_data/enhanced/assurance_level EAL3 EAL2
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0196_eimg.pdf https://www.ipa.go.jp/en/security/c0137_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2008-11-28 2007-12-26
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, and fax functions as basic functions.The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - System Administrator’s Security Management - Customer Engineer Operation Restriction - FAX Flow Security PRODUCT DESCRIPTION Description of TOE The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Evaluation Department Information Technology Security Center
heuristics/scheme_data/enhanced/product Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific Xerox WorkCentre 7328/7335/7345
heuristics/scheme_data/enhanced/product_type Control Software for Multi Function Peripheral IT Product (Multi Function Peripheral)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0196_erpt.pdf https://www.ipa.go.jp/en/security/c0137_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0196_est.pdf https://www.ipa.go.jp/en/security/c0137_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver.1.180.7 Controller+PS ROM Ver.1.221.100 IOT ROM Ver.3.0.4 IIT ROM Ver.20.4.1 ADF ROM Ver.11.6.5
heuristics/scheme_data/supplier Fuji Xerox Co., Ltd. Fuji Xerox Co., Ltd.
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0196_it8225.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0137_it7159.html
heuristics/scheme_data/toe_overseas_name Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific Controller ROM Ver.1.180.7 Xerox WorkCentre 7328/7335/7345 Controller+PS ROM Ver.1.221.100 IOT ROM Ver.3.0.4 IIT ROM Ver.20.4.1 ADF ROM Ver.11.6.5
pdf_data/report_filename c0196_erpt.pdf c0137_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0196-01: 1
  • Certification No. C0196: 1
  • CRP-C0137-01: 1
  • Certification No. C0137: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 1
  • A.SECMODE: 1
  • A.NET: 1
  • A.ADMIN: 1
  • A.SECMODE: 1
pdf_data/report_keywords/cc_claims/T
  • T.RECOVER: 1
  • T.CONFDATA: 1
  • T.RECOVER: 1
  • T.CONFDATA: 1
  • T.DATA_SEC: 1
  • T.COMM_TAP: 1
  • T.CONSUME: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 3
  • EAL2: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2006-09-001: 2
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2007-09-004: 2
  • CCMB-2005-08-001: 2
  • CCMB-2005-08-002: 2
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-004: 2
pdf_data/report_metadata//CreationDate D:20090109163527+09'00' D:20080208135447+09'00'
pdf_data/report_metadata//ModDate D:20090109163527+09'00' D:20080208135447+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 129825 175898
pdf_data/report_metadata/pdf_number_of_pages 22 26
pdf_data/st_filename c0196_est.pdf c0137_st.pdf
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 4
  • A.SECMODE: 3
  • A.NET: 4
  • A.ADMIN: 4
  • A.SECMODE: 3
pdf_data/st_keywords/cc_claims/O
  • O.CIPHER: 9
  • O.FAX_SEC: 5
  • O.MANAGE: 8
  • O.RESIDUAL: 6
  • O.AUDITS: 10
  • O.CIPHER: 7
  • O.COMM_SEC: 8
  • O.FAX_SEC: 6
  • O.MANAGE: 10
  • O.RESIDUAL: 7
  • O.USER: 8
  • O.RESTRICT: 8
pdf_data/st_keywords/cc_claims/O/O.CIPHER 9 7
pdf_data/st_keywords/cc_claims/O/O.FAX_SEC 5 6
pdf_data/st_keywords/cc_claims/O/O.MANAGE 8 10
pdf_data/st_keywords/cc_claims/O/O.RESIDUAL 6 7
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 4
  • OE.AUTH: 5
  • OE.FUNCTION: 6
  • OE.NET: 3
  • OE.ADMIN: 4
  • OE.AUTH: 8
  • OE.COMMS_SEC: 6
  • OE.FUNCTION: 8
pdf_data/st_keywords/cc_claims/OE/OE.AUTH 5 8
pdf_data/st_keywords/cc_claims/OE/OE.FUNCTION 6 8
pdf_data/st_keywords/cc_claims/T
  • T.RECOVER: 4
  • T.CONFDATA: 3
  • T.RECOVER: 4
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 4
  • T.CONSUME: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 3
    • ADV_TDS.1: 3
    • ADV_FSP.3: 1
    • ADV_FSP.2: 2
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.1: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 3
    • ATE_COV.1: 2
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 3
    • ASE_ECD.1: 2
    • ASE_REQ.1: 2
    • ASE_OBJ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ACM:
    • ACM_CAP.2: 6
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 7
  • ADV:
    • ADV_FSP.1: 13
    • ADV_RCR.1: 7
    • ADV_HLD.1: 6
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 7
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 6
    • ATE_IND.2: 5
  • AVA:
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 3
  • ADV_FSP.1: 3
  • ADV_TDS.1: 3
  • ADV_FSP.3: 1
  • ADV_FSP.2: 2
  • ADV_TDS.2: 1
  • ADV_FSP.1: 13
  • ADV_RCR.1: 7
  • ADV_HLD.1: 6
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.1 3 13
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 3
  • AGD_PRE.1: 3
  • AGD_ADM.1: 8
  • AGD_USR.1: 7
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_FUN.1: 3
  • ATE_COV.1: 2
  • ATE_COV.1: 5
  • ATE_FUN.1: 6
  • ATE_IND.2: 5
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 2 5
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 3 6
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_SOF.1: 3
  • AVA_VLA.1: 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 6
  • EAL 3: 1
  • EAL2: 8
  • EAL 2: 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.2: 1
    • FCS_COP.1: 8
    • FCS_CKM.4: 4
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_IFC.1: 10
    • FDP_IFF.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_UAU.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.2: 10
    • FIA_UID.1: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
    • FIA_UID: 1
    • FIA_UAU: 1
  • FMT:
    • FMT_MSA.3: 1
    • FMT_MOF.1: 9
    • FMT_SMR.1: 8
    • FMT_SMF.1: 13
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FAU:
    • FAU_GEN.1: 17
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 13
    • FAU_SAR.2: 15
    • FAU_STG.1: 14
    • FAU_STG.4: 13
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_COP.1: 16
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACF.1: 13
    • FDP_IFC.1: 14
    • FDP_IFF.1: 12
    • FDP_RIP.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
  • FIA:
    • FIA_AFL.1: 28
    • FIA_UAU.2: 23
    • FIA_UAU.7: 17
    • FIA_UID.2: 21
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU.1: 4
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_UIA.2: 1
    • FIA_UID: 1
    • FIA_UAU: 1
  • FMT:
    • FMT_MOF.1: 27
    • FMT_MSA.1: 13
    • FMT_MSA.3: 12
    • FMT_MTD.1: 12
    • FMT_SMF.1: 17
    • FMT_SMR.1: 24
    • FMT_MSA.2: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
    • FMT_MSA: 2
  • FPT:
    • FPT_STM.1: 15
    • FPT_RVM.1: 48
    • FPT_RVM.1.1: 1
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 11 18
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 8 16
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_IFC.1: 10
  • FDP_IFF.1: 8
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_ACC.1: 15
  • FDP_ACF.1: 13
  • FDP_IFC.1: 14
  • FDP_IFF.1: 12
  • FDP_RIP.1: 13
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF.1.6: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 10 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1 8 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 8 13
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 8
  • FIA_UAU.1: 3
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UAU.2: 10
  • FIA_UID.1: 7
  • FIA_UAU.2.1: 1
  • FIA_UAU.7: 8
  • FIA_UAU.7.1: 1
  • FIA_UID.2: 8
  • FIA_UID.2.1: 1
  • FIA_UID: 1
  • FIA_UAU: 1
  • FIA_AFL.1: 28
  • FIA_UAU.2: 23
  • FIA_UAU.7: 17
  • FIA_UID.2: 21
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UAU.1: 4
  • FIA_UAU.2.1: 1
  • FIA_UID.1: 10
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_UIA.2: 1
  • FIA_UID: 1
  • FIA_UAU: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 8 28
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 3 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 10 23
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 8 17
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 7 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 8 21
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.3: 1
  • FMT_MOF.1: 9
  • FMT_SMR.1: 8
  • FMT_SMF.1: 13
  • FMT_MOF.1.1: 1
  • FMT_MTD.1: 7
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 1
  • FMT_MOF.1: 27
  • FMT_MSA.1: 13
  • FMT_MSA.3: 12
  • FMT_MTD.1: 12
  • FMT_SMF.1: 17
  • FMT_SMR.1: 24
  • FMT_MSA.2: 4
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_MSA: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 9 27
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 1 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 7 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 13 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 8 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 1 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 10
pdf_data/st_keywords/side_channel_analysis
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • ISO:
    • ISO/IEC 15408: 4
  • X509:
    • X.509: 2
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2006-09-001: 1
  • CCMB-2007-09-002: 1
  • CCMB-2007-09-003: 1
  • CCMB-2007-09-004: 1
  • CCMB-2005-08-001: 1
  • CCMB-2005-08-002: 1
  • CCMB-2005-08-003: 1
  • CCMB-2005-08-004: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • AES_competition:
    • AES:
      • AES: 4
    • Rijndael:
      • Rijndael: 1
    • RC:
      • RC4: 1
      • RC2: 1
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • Triple-DES: 3
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 4
  • AES:
    • AES: 4
  • Rijndael:
    • Rijndael: 1
  • RC:
    • RC4: 1
    • RC2: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 327717
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /CreationDate: D:20090105132826+09'00'
  • /Author: kurata-masami
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /ModDate: D:20090109101350+09'00'
  • /Title: Microsoft Word - ApeosPort-Ⅱ 7000_AP_ ST_V1.0.9_E.doc
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1164197
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
  • /ModDate: D:20080205111549+09'00'
  • /CreationDate: D:20080205111549+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20090105132826+09'00' D:20080205111549+09'00'
pdf_data/st_metadata//ModDate D:20090109101350+09'00' D:20080205111549+09'00'
pdf_data/st_metadata//Title Microsoft Word - ApeosPort-Ⅱ 7000_AP_ ST_V1.0.9_E.doc untitled
pdf_data/st_metadata/pdf_file_size_bytes 327717 1164197
pdf_data/st_metadata/pdf_number_of_pages 51 85
dgst 35dd94d58cbf463e 4525da4808394317