Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Fuji Xerox ApeosPort-IV 3065/3060/2060 for Asia Pacific Controller ROM Ver. 1.140.21, IOT ROM Ver. 40.2.0, ADF ROM Ver. 7.9.0
JISEC-CC-CRP-C0461
Dell C7765dn Color Multifunction Printer Version: Controller ROM Ver. 2.205.5 IOT ROM Ver. 41.1.0 ADF ROM Ver. 12.5.0
JISEC-CC-CRP-C0438
name Fuji Xerox ApeosPort-IV 3065/3060/2060 for Asia Pacific Controller ROM Ver. 1.140.21, IOT ROM Ver. 40.2.0, ADF ROM Ver. 7.9.0 Dell C7765dn Color Multifunction Printer Version: Controller ROM Ver. 2.205.5 IOT ROM Ver. 41.1.0 ADF ROM Ver. 12.5.0
not_valid_before 2014-12-25 2014-09-25
not_valid_after 2020-01-06 2019-10-03
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0461_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0438_est.pdf
manufacturer Fuji Xerox Co., Ltd. Dell, Inc.
manufacturer_web https://www.fujixerox.co.jp/eng/ https://www.dell.com
security_level ALC_FLR.2, EAL3+ EAL3
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0461_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0438_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})})
state/report/pdf_hash 7449867c26aab2b79f6e7f0e3b30ac11e7f846346113ee6e7a4da9869c2d32d5 6e5c988511138b986065e70033a0ba59e1be5c6a9e72afdf7fa176317d433f33
state/report/txt_hash 45c3ee5199065e0488eedf447b4d1b3011684a344e006cf08dd0981b0bf4b022 5cdbde88f8de8f00231b4d3fad02a9971e503b38c63b1e85e4732decf6c4ff05
state/st/pdf_hash 09bdeca871d55b5cb6c7d6d9eea3053d26ce5b9e31416c8846f9f4ff6fbec59f 4f860044b6d04d7228c2c1e8f9f0a3cdcae33b88cb2a13e5962177373af5f538
state/st/txt_hash 3dcf808935e69833ff314a37a594b499bce5e6b2473fc3ed42a9b8939d3b09cf 5e9d60562562d31983fb68075c00e8e0b26b47b3fd9e65179d176496c558ef18
heuristics/cert_id JISEC-CC-CRP-C0461 JISEC-CC-CRP-C0438
heuristics/cpe_matches cpe:2.3:h:fujixerox:apeosport_3060:-:*:*:*:*:*:*:* None
heuristics/extracted_versions 40.2.0, 7.9.0, 1.140.21 2.205.5, 12.5.0, 41.1.0
heuristics/scheme_data/cert_id C0461 C0438
heuristics/scheme_data/certification_date 2014-12 2014-09
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP EAL3
heuristics/scheme_data/enhanced
  • product: Fuji Xerox ApeosPort-IV 3065/3060/2060 for Asia Pacific
  • toe_version: Controller ROM Ver. 1.140.21, IOT ROM Ver. 40.2.0, ADF ROM Ver. 7.9.0
  • product_type: Multi Function Device
  • certification_date: 2014-12-25
  • cc_version: 3.1 Release4
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1™-2009
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0461_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0461_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0461_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
  • product: Dell C7765dn Color Multifunction Printer
  • toe_version: Controller ROM Ver. 2.205.5 IOT ROM Ver. 41.1.0 ADF ROM Ver. 12.5.0
  • product_type: Multi Function Device
  • certification_date: 2014-09-25
  • cc_version: 3.1 Release4
  • assurance_level: EAL3
  • vendor: Dell Inc.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0438_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0438_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0438_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security - Self Test
heuristics/scheme_data/enhanced/assurance_level EAL3 Augmented with ALC_FLR.2 EAL3
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0461_eimg.pdf https://www.ipa.go.jp/en/security/c0438_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2014-12-25 2014-09-25
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data. PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security - Self Test
heuristics/scheme_data/enhanced/product Fuji Xerox ApeosPort-IV 3065/3060/2060 for Asia Pacific Dell C7765dn Color Multifunction Printer
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0461_erpt.pdf https://www.ipa.go.jp/en/security/c0438_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0461_est.pdf https://www.ipa.go.jp/en/security/c0438_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 1.140.21, IOT ROM Ver. 40.2.0, ADF ROM Ver. 7.9.0 Controller ROM Ver. 2.205.5 IOT ROM Ver. 41.1.0 ADF ROM Ver. 12.5.0
heuristics/scheme_data/enhanced/vendor Fuji Xerox Co., Ltd. Dell Inc.
heuristics/scheme_data/expiration_date 2020-01 2019-10
heuristics/scheme_data/supplier Fuji Xerox Co., Ltd. Dell Inc.
heuristics/scheme_data/toe_japan_name ----- Dell C7765dn Color Multifunction PrinterController ROM Ver. 2.205.5, IOT ROM Ver. 41.1.0, ADF ROM Ver. 12.5.0
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0461_it4491.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0438_it3446.html
heuristics/scheme_data/toe_overseas_name Fuji Xerox ApeosPort-IV 3065/3060/2060 for Asia Pacific Controller ROM Ver. 1.140.21, IOT ROM Ver. 40.2.0, ADF ROM Ver. 7.9.0 Dell C7765dn Color Multifunction PrinterController ROM Ver. 2.205.5, IOT ROM Ver. 41.1.0, ADF ROM Ver. 12.5.0
pdf_data/report_filename c0461_erpt.pdf c0438_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0461-01: 1
  • Certification No. C0461: 1
  • CRP-C0438-01: 1
  • Certification No. C0438: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.ADMIN: 1
  • A.USER: 1
  • A.SECMODE: 1
  • A.ACCESS: 1
pdf_data/report_keywords/cc_claims/A/A.ADMIN 2 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 4
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
  • T.CONSUME: 2
  • T.DATA_SEC: 2
  • T.CONFDATA: 2
  • T.RECOVER: 2
  • T.COMM_TAP: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 2
  • EAL3: 4
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLSv1.0: 1
      • TLS: 1
  • IPsec:
    • IPsec: 7
  • TLS:
    • SSL:
      • SSL 3.0: 1
      • SSL: 1
    • TLS:
      • TLS 1.0: 1
      • TLS 1.2: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • TLS:
    • TLSv1.0: 1
    • TLS: 1
  • SSL:
    • SSL 3.0: 1
    • SSL: 1
  • TLS:
    • TLS 1.0: 1
    • TLS 1.2: 1
pdf_data/report_keywords/crypto_protocol/TLS/TLS
  • TLSv1.0: 1
  • TLS: 1
  • TLS 1.0: 1
  • TLS 1.2: 1
pdf_data/report_keywords/eval_facility/ITSC/Information Technology Security Center 4 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • X509:
    • X.509: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 2 1
pdf_data/report_keywords/vendor/Microsoft/Microsoft 15 11
pdf_data/report_metadata//CreationDate D:20150217171634+09'00' D:20141112134616+09'00'
pdf_data/report_metadata//ModDate D:20150217171722+09'00' D:20141112134721+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 379225 346820
pdf_data/report_metadata/pdf_number_of_pages 37 38
pdf_data/st_filename c0461_est.pdf c0438_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.FUNC: 53
    • D.DOC: 60
    • D.PROT: 3
    • D.CONF: 13
  • O:
    • O.AUDIT_STORAGE: 10
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 8
    • O.DOC: 16
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 14
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
  • T:
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
    • T.CONF: 6
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 12
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
  • O:
    • O.AUDITS: 8
    • O.CIPHER: 6
    • O.COMM_SEC: 7
    • O.FAX_SEC: 5
    • O.MANAGE: 9
    • O.RESIDUAL: 4
    • O.USER: 7
    • O.RESTRICT: 7
    • O.VERIFY: 4
  • T:
    • T.RECOVER: 5
    • T.CONFDATA: 3
    • T.DATA_SEC: 3
    • T.COMM_TAP: 5
    • T.CONSUME: 5
  • A:
    • A.ADMIN: 5
    • A.USER: 3
    • A.SECMODE: 5
    • A.ACCESS: 3
  • OE:
    • OE.ADMIN: 3
    • OE.USER: 3
    • OE.SEC: 9
    • OE.PHYSICAL: 3
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 3
  • A.USER: 3
  • A.ADMIN: 6
  • A.ADMIN: 5
  • A.USER: 3
  • A.SECMODE: 5
  • A.ACCESS: 3
pdf_data/st_keywords/cc_claims/A/A.ADMIN 6 5
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT_STORAGE: 10
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 8
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDITS: 8
  • O.CIPHER: 6
  • O.COMM_SEC: 7
  • O.FAX_SEC: 5
  • O.MANAGE: 9
  • O.RESIDUAL: 4
  • O.USER: 7
  • O.RESTRICT: 7
  • O.VERIFY: 4
pdf_data/st_keywords/cc_claims/O/O.CIPHER 8 6
pdf_data/st_keywords/cc_claims/O/O.USER 14 7
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 12
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
  • OE.ADMIN: 3
  • OE.USER: 3
  • OE.SEC: 9
  • OE.PHYSICAL: 3
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 6 3
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL 2 3
pdf_data/st_keywords/cc_claims/OE/OE.USER 12 3
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 6
  • T.FUNC: 3
  • T.PROT: 3
  • T.CONF: 6
  • T.RECOVER: 5
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 5
  • T.CONSUME: 5
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 5
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 2
  • EAL 3: 1
  • EAL3 augmented: 1
  • EAL3: 6
  • EAL 3: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL3 2 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.2: 9
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_STG.1: 11
    • FAU_STG.4: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
    • FCS_COP: 1
  • FDP:
    • FDP_ACC.1: 100
    • FDP_ACF.1: 92
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_RIP.1: 9
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 8
    • FDP_ACF.1.1: 8
    • FDP_ACF.1.2: 8
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 8
    • FDP_ACC: 2
  • FIA:
    • FIA_AFL.1: 35
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.1: 18
    • FIA_UAU.7: 10
    • FIA_UID.1: 22
    • FIA_USB.1: 9
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_SMR.1: 45
    • FMT_MOF.1: 11
    • FMT_MSA.1: 90
    • FMT_MSA.3: 89
    • FMT_MTD.1: 23
    • FMT_SMF.1: 38
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 8
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 16
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.2: 8
    • FAU_STG.1: 10
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACF.1: 10
    • FDP_IFC.1: 11
    • FDP_IFF.1: 10
    • FDP_RIP.1: 8
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
  • FIA:
    • FIA_AFL.1: 30
    • FIA_ATD.1: 9
    • FIA_SOS.1: 6
    • FIA_UAU.1: 19
    • FIA_UAU.7: 9
    • FIA_UID.1: 15
    • FIA_USB.1: 8
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UIA.1: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 11
    • FMT_MSA.3: 11
    • FMT_MTD.1: 11
    • FMT_SMF.1: 17
    • FMT_SMR.1: 15
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 2
  • FPT:
    • FPT_STM.1: 10
    • FPT_TST.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN: 1
  • FAU_GEN.1: 15
  • FAU_GEN.2: 9
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_STG.1: 11
  • FAU_STG.4: 9
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 9
  • FAU_SAR.2: 8
  • FAU_STG.1: 10
  • FAU_STG.4: 8
  • FAU_GEN.1.2: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 2
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 15 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 9 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 11 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 9 8
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 12
  • FCS_COP.1: 11
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
  • FCS_CKM.1: 11
  • FCS_COP.1: 10
  • FCS_CKM.2: 1
  • FCS_CKM.4: 3
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 12 11
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 11 10
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 100
  • FDP_ACF.1: 92
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 8
  • FDP_ACF.1.1: 8
  • FDP_ACF.1.2: 8
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 8
  • FDP_ACC: 2
  • FDP_ACC.1: 12
  • FDP_ACF.1: 10
  • FDP_IFC.1: 11
  • FDP_IFF.1: 10
  • FDP_RIP.1: 8
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 100 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 92 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 8 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 9 8
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 35
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 18
  • FIA_UAU.7: 10
  • FIA_UID.1: 22
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID.2: 1
  • FIA_AFL.1: 30
  • FIA_ATD.1: 9
  • FIA_SOS.1: 6
  • FIA_UAU.1: 19
  • FIA_UAU.7: 9
  • FIA_UID.1: 15
  • FIA_USB.1: 8
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UIA.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 35 30
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 11 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 18 19
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 10 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 22 15
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 9 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 11 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 90 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 8 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 89 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 8 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 8 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 23 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 38 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 45 15
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 16
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 11
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1: 10
  • FPT_TST.1: 8
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 11 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 9 8
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 8
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 1
  • FTP_TRP.1.3: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLSv1.0: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA1: 5
    • SHA-1: 5
  • SHA1:
    • SHA1: 4
    • SHA-1: 8
  • SHA2:
    • SHA256: 3
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 5 8
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 5 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • other:
    • cold boot: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 5
  • AES:
    • AES: 12
  • RC:
    • RC4: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 5 12
pdf_data/st_keywords/tls_cipher_suite/TLS
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_metadata//CreationDate D:20150212094116+09'00' D:20141014111149+09'00'
pdf_data/st_metadata//ModDate D:20150212094116+09'00' D:20141014111149+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 10.1.13 (Windows) Acrobat Distiller 10.1.12 (Windows)
pdf_data/st_metadata/pdf_file_size_bytes 798503 500834
pdf_data/st_metadata/pdf_number_of_pages 138 95
dgst 4903073ea5829b75 61a92cc272926e40