Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Controller ROM Ver. 1.12.32
JISEC-CC-CRP-C0609-01-2018
Xerox D110/D125 Copier/Printer Version: Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0
JISEC-CC-CRP-C0362
name Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Controller ROM Ver. 1.12.32 Xerox D110/D125 Copier/Printer Version: Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0
not_valid_before 2018-08-02 2012-07-30
not_valid_after 2023-08-02 2017-08-03
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0609_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0362_est.pdf
manufacturer Xerox Corporation Fuji Xerox Co., Ltd.
manufacturer_web https://www.xerox.com https://www.fujixerox.co.jp/eng/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0609_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0362_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0609_eimg.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash c2d8d7848e3e50be185bdc6df97e1e96e00f23309737f2d5e8d44c38ef247c21 None
state/cert/txt_hash 1cce267ff19dde66b994fbfb3bcc98930dbc8c537274ba7d4ea5638e563f0cf4 None
state/report/pdf_hash ad7c0e9471e7cd1103ec47a3e29a2df28f03306bfa34e7b6c636a8dccd9d0786 8c1690bee923714909fe3f8a02fb805dd61617c93e599d49f0a06a63384d4f1d
state/report/txt_hash cb8232a3d3892393f92e2cfc6f2c046857cee08ee14f5550d1cc69c5f8eb9749 e44c82e54485d5d46fbc33a3e285c1752a2a8157a9422d6657bbc9e8f7d38f0b
state/st/pdf_hash cc62ef47f2d68e69bff90ef02024e00d6cfaf83145211383abc917fddbecbb63 e491400b414b027695edca2961b366e87e08adfa2706dcf5d0195b9276c7cfe3
state/st/txt_hash 43bf35b619e5482705f7d26c282e5dacee528b3f96e4b277dcdcf573e1b4d28c 5360f192da5064d06940846b89e8c2890239d39fcef02965b873bd5e4124d702
heuristics/cert_id JISEC-CC-CRP-C0609-01-2018 JISEC-CC-CRP-C0362
heuristics/cpe_matches cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*, cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:* None
heuristics/extracted_versions 1.12.32 9.8.0, 83.25.0, 1.201.1, 13.10.0
heuristics/scheme_data/cert_id C0609 C0362
heuristics/scheme_data/certification_date 2018-08 2012-07
heuristics/scheme_data/claim PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) EAL3+ ALC_FLR.2 PP
heuristics/scheme_data/enhanced
  • product: Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax
  • toe_version: Controller ROM Ver. 1.12.32
  • product_type: Multi-Function Device
  • cert_id: JISEC-C0609
  • certification_date: 2018-8-02
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: Xerox Corporation
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0609_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0609_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0609_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE Security functions To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
  • product: Xerox D110/D125 Copier/Printer
  • toe_version: Controller+PS ROM Ver. 1.201.1 IOT ROM Ver. 83.25.0 IIT ROM Ver. 9.8.0 ADF ROM Ver. 13.10.0
  • product_type: Multi Function Device
  • certification_date: 2012-07-30
  • cc_version: 3.1
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1-2009
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0362_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0362_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0362_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/assurance_level EAL2 Augmented by ALC_FLR.2 EAL3 Augmented with ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 3.1 Release4 3.1
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0609_eimg.pdf https://www.ipa.go.jp/en/security/c0362_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2018-8-02 2012-07-30
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE Security functions To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data. PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/product Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Xerox D110/D125 Copier/Printer
heuristics/scheme_data/enhanced/product_type Multi-Function Device Multi Function Device
heuristics/scheme_data/enhanced/protection_profile U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) IEEE Std 2600.1-2009
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0609_erpt.pdf https://www.ipa.go.jp/en/security/c0362_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0609_est.pdf https://www.ipa.go.jp/en/security/c0362_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 1.12.32 Controller+PS ROM Ver. 1.201.1 IOT ROM Ver. 83.25.0 IIT ROM Ver. 9.8.0 ADF ROM Ver. 13.10.0
heuristics/scheme_data/enhanced/vendor Xerox Corporation Fuji Xerox Co., Ltd.
heuristics/scheme_data/expiration_date 2023-09 2017-08
heuristics/scheme_data/supplier Xerox Corporation Fuji Xerox Co., Ltd.
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0609_it7630.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0362_it1380.html
heuristics/scheme_data/toe_overseas_name Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Controller ROM Ver. 1.12.32 Xerox D110/D125 Copier/Printer Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0
pdf_data/cert_filename c0609_eimg.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0609-01-2018: 1
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ITSC:
      • Information Technology Security Center: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 150890
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20180822142712+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180822142817+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
None
pdf_data/report_filename c0609_erpt.pdf c0362_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0609-01-2018: 1
  • CRP-C0362-01: 1
  • Certification No. C0362: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2 augmented: 2
  • EAL3: 4
  • EAL3 augmented: 2
pdf_data/report_keywords/certification_process/OutOfScope
  • out of scope: 1
  • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
  • out of scope: 2
  • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
  • print data from the printer driver of user client to the MFD. Therefore, the following function is out of scope of the evaluated security functions. - Printer driver requires a user to enter user ID and password: 1
pdf_data/report_keywords/certification_process/OutOfScope/out of scope 1 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • IPsec:
    • IPsec: 5
  • TLS:
    • SSL:
      • SSL 3.0: 1
      • SSL: 1
    • TLS:
      • TLS 1.0: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • TLS:
    • TLS: 2
  • SSL:
    • SSL 3.0: 1
    • SSL: 1
  • TLS:
    • TLS 1.0: 1
pdf_data/report_keywords/crypto_protocol/TLS/TLS
  • TLS: 2
  • TLS 1.0: 1
pdf_data/report_keywords/eval_facility/ITSC/Information Technology Security Center 4 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 5
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 2 1
pdf_data/report_keywords/vendor/Microsoft/Microsoft 17 9
pdf_data/report_metadata//CreationDate D:20181005165910+09'00' D:20121031165826+09'00'
pdf_data/report_metadata//ModDate D:20181005165955+09'00' D:20121031165849+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 421873 334585
pdf_data/report_metadata/pdf_number_of_pages 37 36
pdf_data/st_filename c0609_est.pdf c0362_est.pdf
pdf_data/st_keywords/cc_claims/D/D.DOC 41 61
pdf_data/st_keywords/cc_claims/D/D.FUNC 19 59
pdf_data/st_keywords/cc_claims/D/D.PROT 4 3
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT_STORAGE: 10
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 8
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDIT_STORAGE: 9
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 9
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDIT_STORAG: 1
pdf_data/st_keywords/cc_claims/O/O.AUDIT_STORAGE 10 9
pdf_data/st_keywords/cc_claims/O/O.CIPHER 8 9
pdf_data/st_keywords/cc_claims/T/T.CONF 6 7
pdf_data/st_keywords/cc_claims/T/T.DOC 6 7
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_FLR.2: 5
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 2
  • EAL 2: 1
  • EAL2 augmented: 1
  • EAL3: 2
  • EAL 3: 1
  • EAL3 augmented: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 11 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 2 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 75 86
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 6 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 68 80
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 6 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 6 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 6 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 6 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 6 7
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 19
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 16
  • FIA_UAU.7: 10
  • FIA_UID.1: 22
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID.2: 1
  • FIA_AFL.1: 35
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 18
  • FIA_UAU.7: 10
  • FIA_UID.2: 21
  • FIA_UID.1: 11
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID: 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 19 35
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 2 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 2 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 16 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 22 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 1 21
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 75 79
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 6 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 68 80
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 6 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 6 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 23 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 34 36
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 39 43
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 16 15
pdf_data/st_keywords/certification_process/ConfidentialDocument
  • is set to [authority of user to only Store Print], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Embedded Web Server Embedded Web Server is a: 1
  • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Job Flow A function to enable efficient standard: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 20
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA1: 2
    • SHA-1: 2
  • SHA2:
    • SHA256: 8
    • SHA384: 2
    • SHA512: 2
    • SHA-2: 3
  • SHA1:
    • SHA-1: 10
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA1: 2
  • SHA-1: 2
  • SHA-1: 10
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 2 10
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 1 2
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 180-2: 2
  • FIPS PUB 197: 1
  • FIPS PUB 197: 1
pdf_data/st_keywords/standard_id/RFC
  • RFC 2104: 1
  • RFC 2104: 1
  • RFC3414: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 8
  • AES:
    • AES: 7
  • RC:
    • RC4: 1
    • RC2: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 8 7
pdf_data/st_keywords/symmetric_crypto/DES
  • 3DES:
    • Triple-DES: 1
  • DES:
    • DES: 1
  • 3DES:
    • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 3
pdf_data/st_keywords/tls_cipher_suite/TLS
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 682920
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 120
  • /CreationDate: D:20181004130534+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20181004132231+09'00'
  • /Producer: Acrobat Distiller 10.1.16 (Windows)
  • /Subject: Security Target
  • /Title: Xerox VersaLink C505/C605 Color Multifunction Printer
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 618720
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 134
  • /Author:
  • /CreationDate: D:20121031140314+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20121031140314+09'00'
  • /Producer: Acrobat Distiller 10.1.4 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20181004130534+09'00' D:20121031140314+09'00'
pdf_data/st_metadata//ModDate D:20181004132231+09'00' D:20121031140314+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 10.1.16 (Windows) Acrobat Distiller 10.1.4 (Windows)
pdf_data/st_metadata//Title Xerox VersaLink C505/C605 Color Multifunction Printer
pdf_data/st_metadata/pdf_file_size_bytes 682920 618720
pdf_data/st_metadata/pdf_is_encrypted True False
pdf_data/st_metadata/pdf_number_of_pages 120 134
dgst 59f884b645f9a608 1a13d276f611f29e