Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Controller ROM Ver. 1.12.32
JISEC-CC-CRP-C0609-01-2018
Xerox VersaLink C405 Color Multifunction Printer Diskless modelController ROM Ver.1.0.31
JISEC-CC-CRP-C0594
name Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Controller ROM Ver. 1.12.32 Xerox VersaLink C405 Color Multifunction Printer Diskless modelController ROM Ver.1.0.31
not_valid_before 2018-08-02 2018-04-16
not_valid_after 2023-08-02 2023-04-16
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0609_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0594_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0609_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0594_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0609_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0600_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/cert/pdf_hash c2d8d7848e3e50be185bdc6df97e1e96e00f23309737f2d5e8d44c38ef247c21 04897e08fa7df020a6acf874c3013839907b9b39d3a5eba1cfb2546b59938b03
state/cert/txt_hash 1cce267ff19dde66b994fbfb3bcc98930dbc8c537274ba7d4ea5638e563f0cf4 c904b800dab6bf6184d5ecac1c836b42f6f110b1dbe9b81ddf97343518e5a23e
state/report/pdf_hash ad7c0e9471e7cd1103ec47a3e29a2df28f03306bfa34e7b6c636a8dccd9d0786 c73b35b1caf3607c49ca1758165fe8c33bd8a0ad0501e507c2c3244806be0a46
state/report/txt_hash cb8232a3d3892393f92e2cfc6f2c046857cee08ee14f5550d1cc69c5f8eb9749 f8ad5e8fd9293620f5f260a035547be5a30065e8d2a17645c739204c26f34bb1
state/st/pdf_hash cc62ef47f2d68e69bff90ef02024e00d6cfaf83145211383abc917fddbecbb63 fda5cf455cbdc350bca6c18db3a0eb30566599bb6672699524d0ac2d97e6860c
state/st/txt_hash 43bf35b619e5482705f7d26c282e5dacee528b3f96e4b277dcdcf573e1b4d28c 5db58b0233c43494729cb783835cc44c0c054c8a5fa5e583ca1a16c160ca626f
heuristics/cert_id JISEC-CC-CRP-C0609-01-2018 JISEC-CC-CRP-C0594
heuristics/cpe_matches cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*, cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:* cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*
heuristics/extracted_versions 1.12.32 1.0.31
heuristics/scheme_data/cert_id C0609 C0594
heuristics/scheme_data/certification_date 2018-08 2018-04
heuristics/scheme_data/claim PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) EAL2+ ALC_FLR.2
heuristics/scheme_data/enhanced
  • product: Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax
  • toe_version: Controller ROM Ver. 1.12.32
  • product_type: Multi-Function Device
  • cert_id: JISEC-C0609
  • certification_date: 2018-8-02
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: Xerox Corporation
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0609_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0609_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0609_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE Security functions To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
  • product: Xerox VersaLink C405 Color Multifunction Printer Diskless model
  • toe_version: Controller ROM Ver.1.0.31
  • product_type: Multi-Function Device
  • certification_date: 2018-04-16
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • vendor: Xerox Corporation
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0594_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0594_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0594_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Flash Memory Data EncryptionA function to encrypt the document data before the data is stored into the internal eMMC memory. - User AuthenticationA function to identify and authenticate users. This function also allows only owners of document data and system administrators to handle document data stored in the TOE. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Fax Flow SecurityA function to restrict the unpermitted communication between public telephone line and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0609_eimg.pdf https://www.ipa.go.jp/en/security/c0594_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2018-8-02 2018-04-16
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE Security functions To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data. PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Flash Memory Data EncryptionA function to encrypt the document data before the data is stored into the internal eMMC memory. - User AuthenticationA function to identify and authenticate users. This function also allows only owners of document data and system administrators to handle document data stored in the TOE. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Fax Flow SecurityA function to restrict the unpermitted communication between public telephone line and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Evaluation Department Information Technology Security Center Evaluation Department
heuristics/scheme_data/enhanced/product Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Xerox VersaLink C405 Color Multifunction Printer Diskless model
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0609_erpt.pdf https://www.ipa.go.jp/en/security/c0594_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0609_est.pdf https://www.ipa.go.jp/en/security/c0594_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 1.12.32 Controller ROM Ver.1.0.31
heuristics/scheme_data/expiration_date 2023-09 2023-05
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0609_it7630.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0594_it6608.html
heuristics/scheme_data/toe_overseas_name Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Controller ROM Ver. 1.12.32 Xerox VersaLink C405 Color Multifunction Printer Diskless modelController ROM Ver.1.0.31
pdf_data/cert_filename c0609_eimg.pdf c0600_eimg.pdf
pdf_data/cert_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0609-01-2018: 1
  • JISEC-CC-CRP-C0600-01-2018: 1
pdf_data/cert_metadata//CreationDate D:20180822142712+09'00' D:20180608134850+09'00'
pdf_data/cert_metadata//ModDate D:20180822142817+09'00' D:20180608161051+09'00'
pdf_data/cert_metadata/pdf_file_size_bytes 150890 145696
pdf_data/report_filename c0609_erpt.pdf c0594_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0609-01-2018: 1
  • CRP-C0594-01: 1
  • Certification No. C0594: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.ADMIN: 1
  • A.USER: 1
  • A.SECMODE: 1
  • A.ACCESS: 1
pdf_data/report_keywords/cc_claims/A/A.ADMIN 2 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 4
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
  • T.CONSUME: 2
  • T.DATA_SEC: 2
  • T.CONFDATA: 2
  • T.COMM_TAP: 2
pdf_data/report_keywords/crypto_protocol/IPsec/IPsec 5 6
pdf_data/report_keywords/hash_function/SHA
  • SHA2:
    • SHA-256: 1
    • SHA256: 5
  • SHA1:
    • SHA1: 4
  • SHA2:
    • SHA-256: 1
pdf_data/report_keywords/hash_function/SHA/SHA2
  • SHA-256: 1
  • SHA256: 5
  • SHA-256: 1
pdf_data/report_keywords/vendor/Microsoft/Microsoft 17 13
pdf_data/report_metadata//CreationDate D:20181005165910+09'00' D:20180723133701+09'00'
pdf_data/report_metadata//ModDate D:20181005165955+09'00' D:20180723133755+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 421873 370217
pdf_data/report_metadata/pdf_number_of_pages 37 34
pdf_data/st_filename c0609_est.pdf c0594_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.DOC: 41
    • D.FUNC: 19
    • D.PROT: 4
    • D.CONF: 13
  • O:
    • O.AUDIT_STORAGE: 10
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 8
    • O.DOC: 16
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 14
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
  • T:
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
    • T.CONF: 6
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 12
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
  • O:
    • O.AUDITS: 8
    • O.CIPHER: 5
    • O.COMM_SEC: 7
    • O.FAX_SEC: 6
    • O.MANAGE: 9
    • O.USER: 9
    • O.RESTRICT: 5
    • O.VERIFY: 2
  • T:
    • T.CONFDATA: 4
    • T.DATA_SEC: 4
    • T.COMM_TAP: 3
    • T.CONSUME: 3
  • A:
    • A.ADMIN: 4
    • A.USER: 3
    • A.SECMODE: 4
    • A.ACCESS: 3
  • OE:
    • OE.ADMIN: 3
    • OE.USER: 3
    • OE.SEC: 7
    • OE.PHYSICAL: 3
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 3
  • A.USER: 3
  • A.ADMIN: 6
  • A.ADMIN: 4
  • A.USER: 3
  • A.SECMODE: 4
  • A.ACCESS: 3
pdf_data/st_keywords/cc_claims/A/A.ADMIN 6 4
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT_STORAGE: 10
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 8
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDITS: 8
  • O.CIPHER: 5
  • O.COMM_SEC: 7
  • O.FAX_SEC: 6
  • O.MANAGE: 9
  • O.USER: 9
  • O.RESTRICT: 5
  • O.VERIFY: 2
pdf_data/st_keywords/cc_claims/O/O.CIPHER 8 5
pdf_data/st_keywords/cc_claims/O/O.USER 14 9
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 12
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
  • OE.ADMIN: 3
  • OE.USER: 3
  • OE.SEC: 7
  • OE.PHYSICAL: 3
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 6 3
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL 2 3
pdf_data/st_keywords/cc_claims/OE/OE.USER 12 3
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 6
  • T.FUNC: 3
  • T.PROT: 3
  • T.CONF: 6
  • T.CONFDATA: 4
  • T.DATA_SEC: 4
  • T.COMM_TAP: 3
  • T.CONSUME: 3
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 5 4
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 2
  • EAL 2: 1
  • EAL2 augmented: 1
  • EAL2: 2
  • EAL2 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.2: 9
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_STG.1: 11
    • FAU_STG.4: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
    • FCS_COP: 1
  • FDP:
    • FDP_ACC.1: 75
    • FDP_ACF.1: 68
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_RIP.1: 9
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 6
    • FDP_ACF.1.1: 6
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 6
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 6
    • FDP_ACC: 2
  • FIA:
    • FIA_AFL.1: 19
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.1: 16
    • FIA_UAU.7: 10
    • FIA_UID.1: 22
    • FIA_USB.1: 9
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA.1: 75
    • FMT_SMR.1: 39
    • FMT_MOF.1: 11
    • FMT_MSA.3: 68
    • FMT_MTD.1: 23
    • FMT_SMF.1: 34
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 6
    • FMT_MSA.3.1: 6
    • FMT_MSA.3.2: 6
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 16
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.2: 8
    • FAU_STG.1: 10
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_COP.1: 10
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACF.1: 10
    • FDP_IFC.1: 11
    • FDP_IFF.1: 10
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF: 1
  • FIA:
    • FIA_AFL.1: 16
    • FIA_ATD.1: 10
    • FIA_SOS.1: 7
    • FIA_UAU.1: 14
    • FIA_UAU.7: 9
    • FIA_UID.1: 15
    • FIA_USB.1: 8
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UIA.1: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 11
    • FMT_MSA.3: 11
    • FMT_MTD.1: 11
    • FMT_SMF.1: 17
    • FMT_SMR.1: 15
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 2
  • FPT:
    • FPT_STM.1: 10
    • FPT_TST.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN: 1
  • FAU_GEN.1: 15
  • FAU_GEN.2: 9
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_STG.1: 11
  • FAU_STG.4: 9
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 9
  • FAU_SAR.2: 8
  • FAU_STG.1: 10
  • FAU_STG.4: 8
  • FAU_GEN.1.2: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 2
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 15 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 9 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 11 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 9 8
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 12
  • FCS_COP.1: 11
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
  • FCS_CKM.1: 10
  • FCS_COP.1: 10
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 12 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 11 10
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 75
  • FDP_ACF.1: 68
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 6
  • FDP_ACF.1.1: 6
  • FDP_ACF.1.2: 6
  • FDP_ACF.1.3: 6
  • FDP_ACF.1.4: 6
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 6
  • FDP_ACC: 2
  • FDP_ACC.1: 12
  • FDP_ACF.1: 10
  • FDP_IFC.1: 11
  • FDP_IFF.1: 10
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 75 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 68 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 6 11
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 19
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 16
  • FIA_UAU.7: 10
  • FIA_UID.1: 22
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID.2: 1
  • FIA_AFL.1: 16
  • FIA_ATD.1: 10
  • FIA_SOS.1: 7
  • FIA_UAU.1: 14
  • FIA_UAU.7: 9
  • FIA_UID.1: 15
  • FIA_USB.1: 8
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UIA.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 19 16
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 11 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 16 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 10 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 22 15
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 9 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 11 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 75 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 6 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 68 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 6 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 6 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 23 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 34 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 39 15
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 16
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 11
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1: 10
  • FPT_TST.1: 8
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 11 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 9 8
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_ITC.1: 7
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 13 7
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • is set to [authority of user to only Store Print], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Embedded Web Server Embedded Web Server is a: 1
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS 20 21
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 2 3
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA256: 8
  • SHA384: 2
  • SHA512: 2
  • SHA-2: 3
  • SHA256: 2
  • SHA-2: 3
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 8 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • cold boot: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 8 12
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 682920
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 120
  • /CreationDate: D:20181004130534+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20181004132231+09'00'
  • /Producer: Acrobat Distiller 10.1.16 (Windows)
  • /Subject: Security Target
  • /Title: Xerox VersaLink C505/C605 Color Multifunction Printer
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 948581
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 84
  • /Comments:
  • /Company:
  • /CreationDate: D:20180723155100+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 18
  • /Keywords:
  • /Manager:
  • /ModDate: D:20180723155419+09'00'
  • /Producer: Adobe PDF Library 15.0
  • /SourceModified: D:20180723065018
  • /Subject: Security Target
  • /Title: Xerox VersaLink C405 Color Multifunction Printer
  • pdf_hyperlinks: http://www.ipa.go.jp/security/jisec/cc/documents/CCPART2V3.1R2.pdf, javascript:g('characters'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART3V3.1R2.pdf, javascript:g('is'), javascript:g('when'), javascript:g('From'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART1V3.1R1.pdf
pdf_data/st_metadata//CreationDate D:20181004130534+09'00' D:20180723155100+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 Word 用 Acrobat PDFMaker 18
pdf_data/st_metadata//ModDate D:20181004132231+09'00' D:20180723155419+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 10.1.16 (Windows) Adobe PDF Library 15.0
pdf_data/st_metadata//Title Xerox VersaLink C505/C605 Color Multifunction Printer Xerox VersaLink C405 Color Multifunction Printer
pdf_data/st_metadata/pdf_file_size_bytes 682920 948581
pdf_data/st_metadata/pdf_hyperlinks http://www.ipa.go.jp/security/jisec/cc/documents/CCPART2V3.1R2.pdf, javascript:g('characters'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART3V3.1R2.pdf, javascript:g('is'), javascript:g('when'), javascript:g('From'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART1V3.1R1.pdf
pdf_data/st_metadata/pdf_number_of_pages 120 84
dgst 59f884b645f9a608 6b8532a967ac4820