Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software Version: Controller ROM Ver. 1.0.13
JISEC-CC-CRP-C0201
Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific Version: Controller ROM V1.180.0
JISEC-CC-CRP-C0143
name Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software Version: Controller ROM Ver. 1.0.13 Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific Version: Controller ROM V1.180.0
not_valid_before 2009-02-12 2008-01-25
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0201_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080310_c0143_est.pdf
security_level EAL3 EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0201_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080310_c0143_erpt.pdf
state/report/pdf_hash 7e93ba8373de55776afcfb6cea4e2899eb50be5cf4414ed09d914670596ebae1 7177a5e27f26f6d4c4548b1ec0a962e0061b010d1539cce44afdb7f879edf957
state/report/txt_hash 56760cf3b8a54763fed28384ef74eb935083e2c4e18ccab316f56a7a573e2be3 1b155eb1d53f5c45b9a1726d4605ebcb8b87cd014bcef83e9a825e5db9f53366
state/st/pdf_hash bbe3c93cd09b258fd50cde188a9d9f55915b1995254361b9322e54ae3108257a 3f3c9dea99918243cd46d2116312ad66c8e967d1d6c8b86ea888fe17badeceb9
state/st/txt_hash 47ffe0723fc6b990b94aa5c26a02a7081d2b25203aa8f5f67e22497e1473c088 87dd708bf08bc206ddd4f9c19333310c111986e1373d7c90979b5748b4ca9ab7
heuristics/cert_id JISEC-CC-CRP-C0201 JISEC-CC-CRP-C0143
heuristics/extracted_versions 1.0.13 1.180.0
heuristics/scheme_data
  • cert_id: C0201
  • supplier: Fuji Xerox Co., Ltd.
  • toe_overseas_name: -----
  • expiration_date: 2013-03
  • claim: EAL3
  • certification_date: 2009-02
  • toe_overseas_link: None
  • toe_japan_name: Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software Controller ROM Ver. 1.0.13
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0201_it8229.html
  • enhanced:
    • product: Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software
    • toe_version: Controller ROM Ver. 1.0.13
    • product_type: Control Software for Multi Function Peripheral
    • certification_date: 2009-02-12
    • assurance_level: EAL3
    • vendor: Fuji Xerox Co., Ltd.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/c0201_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0201_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0201_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator痴 Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
  • cert_id: C0143
  • supplier: Fuji Xerox Co., Ltd.
  • toe_overseas_name: Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific Controller ROM V1.180.0
  • expiration_date: 2013-03
  • claim: EAL2
  • certification_date: 2008-01
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0143_it7173.html
  • toe_japan_name: -----
  • enhanced:
    • product: Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific
    • toe_version: Controller ROM V1.180.0
    • product_type: IT Product (Control Software for Multi Function Peripheral)
    • certification_date: 2008-01-25
    • cc_version: 2.3
    • assurance_level: EAL2
    • vendor: Fuji Xerox Co., Ltd.
    • evaluation_facility: Information Technology Security Center
    • report_link: https://www.ipa.go.jp/en/security/c0143_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0143_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0143_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, and fax functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - System Administrator's Security Management - Customer Engineer Operation Restriction - FAX Flow Security
heuristics/scheme_data/cert_id C0201 C0143
heuristics/scheme_data/certification_date 2009-02 2008-01
heuristics/scheme_data/claim EAL3 EAL2
heuristics/scheme_data/enhanced
  • product: Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software
  • toe_version: Controller ROM Ver. 1.0.13
  • product_type: Control Software for Multi Function Peripheral
  • certification_date: 2009-02-12
  • assurance_level: EAL3
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0201_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0201_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0201_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator痴 Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
  • product: Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific
  • toe_version: Controller ROM V1.180.0
  • product_type: IT Product (Control Software for Multi Function Peripheral)
  • certification_date: 2008-01-25
  • cc_version: 2.3
  • assurance_level: EAL2
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center
  • report_link: https://www.ipa.go.jp/en/security/c0143_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0143_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0143_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, and fax functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - System Administrator's Security Management - Customer Engineer Operation Restriction - FAX Flow Security
heuristics/scheme_data/enhanced/assurance_level EAL3 EAL2
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0201_eimg.pdf https://www.ipa.go.jp/en/security/c0143_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2009-02-12 2008-01-25
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator痴 Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, and fax functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - System Administrator's Security Management - Customer Engineer Operation Restriction - FAX Flow Security
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Evaluation Department Information Technology Security Center
heuristics/scheme_data/enhanced/product Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific
heuristics/scheme_data/enhanced/product_type Control Software for Multi Function Peripheral IT Product (Control Software for Multi Function Peripheral)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0201_erpt.pdf https://www.ipa.go.jp/en/security/c0143_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0201_est.pdf https://www.ipa.go.jp/en/security/c0143_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 1.0.13 Controller ROM V1.180.0
heuristics/scheme_data/supplier Fuji Xerox Co., Ltd. Fuji Xerox Co., Ltd.
heuristics/scheme_data/toe_japan_name Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software Controller ROM Ver. 1.0.13 -----
heuristics/scheme_data/toe_overseas_link None https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0143_it7173.html
heuristics/scheme_data/toe_overseas_name ----- Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific Controller ROM V1.180.0
pdf_data/report_filename c0201_erpt.pdf 20080310_c0143_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0201-01: 1
  • Certification No. C0201: 1
  • CRP-C0143-01: 1
  • Certification No. C0143: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 1
  • A.SECMODE: 1
  • A.ADMIN: 1
  • A.SECMODE: 1
  • A.NET: 1
pdf_data/report_keywords/cc_claims/T
  • T.RECOVER: 1
  • T.CONFDATA: 1
  • T.DATA_SEC: 1
  • T.COMM_TAP: 1
  • T.CONSUME: 1
  • T.RECOVER: 1
  • T.CONFDATA: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 3
  • EAL2: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2006-09-001: 2
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2007-09-004: 2
  • CCMB-2005-08-001: 2
  • CCMB-2005-08-002: 2
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-004: 2
pdf_data/report_metadata//CreationDate D:20090401163114+09'00' D:20080307104907+09'00'
pdf_data/report_metadata//ModDate D:20090401163114+09'00' D:20080307104907+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 138447 179384
pdf_data/report_metadata/pdf_number_of_pages 24 20
pdf_data/st_filename c0201_est.pdf 20080310_c0143_est.pdf
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 4
  • A.SECMODE: 3
  • A.ADMIN: 4
  • A.SECMODE: 3
  • A.NET: 4
pdf_data/st_keywords/cc_claims/O
  • O.AUDITS: 8
  • O.CIPHER: 5
  • O.COMM_SEC: 7
  • O.FAX_SEC: 4
  • O.MANAGE: 9
  • O.RESIDUAL: 5
  • O.USER: 7
  • O.RESTRICT: 6
  • O.CIPHER: 8
  • O.FAX_SEC: 6
  • O.MANAGE: 7
  • O.RESIDUAL: 6
pdf_data/st_keywords/cc_claims/O/O.CIPHER 5 8
pdf_data/st_keywords/cc_claims/O/O.FAX_SEC 4 6
pdf_data/st_keywords/cc_claims/O/O.MANAGE 9 7
pdf_data/st_keywords/cc_claims/O/O.RESIDUAL 5 6
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 3
  • OE.AUTH: 4
  • OE.COMMS_SEC: 3
  • OE.FUNCTION: 5
  • OE.COMM_SEC: 1
  • OE.ADMIN: 4
  • OE.AUTH: 6
  • OE.FUNCTION: 6
  • OE.NET: 4
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 3 4
pdf_data/st_keywords/cc_claims/OE/OE.AUTH 4 6
pdf_data/st_keywords/cc_claims/OE/OE.FUNCTION 5 6
pdf_data/st_keywords/cc_claims/T
  • T.RECOVER: 4
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 4
  • T.CONSUME: 4
  • T.RECOVER: 4
  • T.CONFDATA: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 3
    • ADV_TDS.1: 3
    • ADV_FSP.3: 1
    • ADV_FSP.2: 2
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.1: 1
    • ALC_DVS.1: 2
    • ALC_DEL.1: 1
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 3
    • ATE_COV.1: 2
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 3
    • ASE_ECD.1: 2
    • ASE_REQ.1: 2
    • ASE_OBJ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ACM:
    • ACM_CAP.2: 6
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 7
  • ADV:
    • ADV_FSP.1: 12
    • ADV_RCR.1: 6
    • ADV_HLD.1: 6
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 7
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 6
    • ATE_IND.2: 5
  • AVA:
    • AVA_SOF.1: 5
    • AVA_VLA.1: 5
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 3
  • ADV_FSP.1: 3
  • ADV_TDS.1: 3
  • ADV_FSP.3: 1
  • ADV_FSP.2: 2
  • ADV_TDS.2: 1
  • ADV_FSP.1: 12
  • ADV_RCR.1: 6
  • ADV_HLD.1: 6
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.1 3 12
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 3
  • AGD_PRE.1: 3
  • AGD_ADM.1: 8
  • AGD_USR.1: 7
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_FUN.1: 3
  • ATE_COV.1: 2
  • ATE_COV.1: 5
  • ATE_FUN.1: 6
  • ATE_IND.2: 5
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 2 5
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 3 6
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_SOF.1: 5
  • AVA_VLA.1: 5
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 6
  • EAL 3: 1
  • EAL2: 8
  • EAL 2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.2: 8
    • FAU_STG.1: 8
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 8
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACF.1: 8
    • FDP_IFC.1: 11
    • FDP_IFF.1: 8
    • FDP_RIP.1: 8
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
    • FDP_IFC: 1
  • FIA:
    • FIA_AFL.1: 17
    • FIA_ATD.1: 10
    • FIA_UAU.2: 13
    • FIA_UAU.7: 10
    • FIA_UID.2: 12
    • FIA_USB.1: 7
    • FIA_UAU.1: 4
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1.1: 1
    • FIA_UID.1: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UIA.2: 1
    • FIA_UID: 1
    • FIA_UAU: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 9
    • FMT_MSA.3: 11
    • FMT_MTD.1: 10
    • FMT_SMF.1: 14
    • FMT_SMR.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FCS:
    • FCS_CKM.1: 14
    • FCS_CKM.1.1: 1
    • FCS_COP: 1
    • FCS_CKM.4: 4
    • FCS_COP.1: 13
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
  • FDP:
    • FDP_ITC.2: 1
    • FDP_IFC.1: 13
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 11
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 17
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 8
    • FIA_UAU.7: 13
    • FIA_UAU.7.1: 1
    • FIA_UID.2: 14
    • FIA_UID.2.1: 1
    • FIA_UID: 1
    • FIA_UAU: 1
    • FIA_AFL: 1
  • FMT:
    • FMT_MSA.2: 4
    • FMT_MSA.3: 1
    • FMT_MOF.1: 17
    • FMT_MOF.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMR.1: 14
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 3
    • FMT_MTD: 1
    • FMT_SMT.1: 1
  • FPT:
    • FPT_RVM.1: 27
    • FPT_RVM.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 12
  • FCS_COP.1: 8
  • FCS_CKM.2: 1
  • FCS_CKM.4: 3
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.1: 14
  • FCS_CKM.1.1: 1
  • FCS_COP: 1
  • FCS_CKM.4: 4
  • FCS_COP.1: 13
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 12 14
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 3 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 8 13
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 12
  • FDP_ACF.1: 8
  • FDP_IFC.1: 11
  • FDP_IFF.1: 8
  • FDP_RIP.1: 8
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ITC.2: 1
  • FDP_IFC.1: 13
  • FDP_IFC.1.1: 1
  • FDP_IFF.1: 11
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF.1.6: 1
  • FDP_RIP.1: 12
  • FDP_RIP.1.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 11 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1 8 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 8 12
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 17
  • FIA_ATD.1: 10
  • FIA_UAU.2: 13
  • FIA_UAU.7: 10
  • FIA_UID.2: 12
  • FIA_USB.1: 7
  • FIA_UAU.1: 4
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_ATD.1.1: 1
  • FIA_UID.1: 7
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UIA.2: 1
  • FIA_UID: 1
  • FIA_UAU: 1
  • FIA_AFL.1: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UAU.1: 3
  • FIA_UAU.2: 17
  • FIA_UAU.2.1: 1
  • FIA_UID.1: 8
  • FIA_UAU.7: 13
  • FIA_UAU.7.1: 1
  • FIA_UID.2: 14
  • FIA_UID.2.1: 1
  • FIA_UID: 1
  • FIA_UAU: 1
  • FIA_AFL: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 17 13
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 4 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 13 17
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 10 13
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 7 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 12 14
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MOF.1: 9
  • FMT_MSA.1: 9
  • FMT_MSA.3: 11
  • FMT_MTD.1: 10
  • FMT_SMF.1: 14
  • FMT_SMR.1: 14
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 1
  • FMT_MSA.2: 4
  • FMT_MSA.3: 1
  • FMT_MOF.1: 17
  • FMT_MOF.1.1: 1
  • FMT_SMF.1: 12
  • FMT_SMR.1: 14
  • FMT_MTD.1: 10
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 3
  • FMT_MTD: 1
  • FMT_SMT.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 9 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 14 12
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 10
  • FPT_STM.1.1: 1
  • FPT_RVM.1: 27
  • FPT_RVM.1.1: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 10
pdf_data/st_keywords/side_channel_analysis
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • X509:
    • X.509: 3
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408: 4
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2006-09-001: 1
  • CCMB-2007-09-002: 1
  • CCMB-2007-09-003: 1
  • CCMB-2007-09-004: 1
  • CCMB-2005-08-001: 1
  • CCMB-2005-08-002: 1
  • CCMB-2005-08-003: 1
  • CCMB-2005-08-004: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
    • RC:
      • RC4: 1
      • RC2: 1
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • Triple-DES: 3
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 1
    • Rijndael:
      • Rijndael: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 7
  • RC:
    • RC4: 1
    • RC2: 1
  • AES:
    • AES: 1
  • Rijndael:
    • Rijndael: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 427134
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
  • /ModDate: D:20090325111324+09'00'
  • /CreationDate: D:20090325111324+09'00'
  • /Title: Microsoft Word - 英訳_IT認証8229_Security Target.doc
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Author: kurata-masami
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 788130
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
  • /ModDate: D:20080304133016+09'00'
  • /CreationDate: D:20080304133016+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20090325111324+09'00' D:20080304133016+09'00'
pdf_data/st_metadata//ModDate D:20090325111324+09'00' D:20080304133016+09'00'
pdf_data/st_metadata//Title Microsoft Word - 英訳_IT認証8229_Security Target.doc untitled
pdf_data/st_metadata/pdf_file_size_bytes 427134 788130
pdf_data/st_metadata/pdf_number_of_pages 85 56
dgst 3b5619e0300d8e19 197a54a34ce5007c