Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Controller ROM Ver. 1.12.32
JISEC-CC-CRP-C0609-01-2018
Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer Diskless modelsController ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8
JISEC-CC-CRP-C0600-01-2018
name Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Controller ROM Ver. 1.12.32 Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer Diskless modelsController ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8
not_valid_before 2018-08-02 2018-05-22
not_valid_after 2023-08-02 2023-05-22
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0609_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0600_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0609_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0600_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0609_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0600_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/cert/pdf_hash c2d8d7848e3e50be185bdc6df97e1e96e00f23309737f2d5e8d44c38ef247c21 04897e08fa7df020a6acf874c3013839907b9b39d3a5eba1cfb2546b59938b03
state/cert/txt_hash 1cce267ff19dde66b994fbfb3bcc98930dbc8c537274ba7d4ea5638e563f0cf4 c904b800dab6bf6184d5ecac1c836b42f6f110b1dbe9b81ddf97343518e5a23e
state/report/pdf_hash ad7c0e9471e7cd1103ec47a3e29a2df28f03306bfa34e7b6c636a8dccd9d0786 0623ef55790e03903eb5d127a70132876b8c977f4f643a14ef54ef10934770ca
state/report/txt_hash cb8232a3d3892393f92e2cfc6f2c046857cee08ee14f5550d1cc69c5f8eb9749 4c18798e8e909ea22d4dfbaba1c3fe4060d779088e6ac1745f6ba3bbe7ffdf22
state/st/pdf_hash cc62ef47f2d68e69bff90ef02024e00d6cfaf83145211383abc917fddbecbb63 1f9aab84dcea5f96aa444ea4de77529893f164414a968ad01e0bfadc9808ba91
state/st/txt_hash 43bf35b619e5482705f7d26c282e5dacee528b3f96e4b277dcdcf573e1b4d28c bbafefcc3eb3ff04ae13b313b6435770966203512250169796d56d06b901bd2f
heuristics/cert_id JISEC-CC-CRP-C0609-01-2018 JISEC-CC-CRP-C0600-01-2018
heuristics/cpe_matches cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*, cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:* cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*, cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*, cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*
heuristics/extracted_versions 1.12.32 1.11.33, 2.0.8
heuristics/scheme_data/cert_id C0609 C0600
heuristics/scheme_data/certification_date 2018-08 2018-05
heuristics/scheme_data/claim PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) EAL2+ ALC_FLR.2
heuristics/scheme_data/enhanced
  • product: Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax
  • toe_version: Controller ROM Ver. 1.12.32
  • product_type: Multi-Function Device
  • cert_id: JISEC-C0609
  • certification_date: 2018-8-02
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: Xerox Corporation
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0609_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0609_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0609_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE Security functions To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
  • product: Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer Diskless models
  • toe_version: Controller ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8
  • product_type: Multi-Function Device
  • cert_id: JISEC-C0600
  • certification_date: 2018-05-22
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • vendor: Xerox Corporation
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0600_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0600_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0600_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Flash Memory Data EncryptionA function to encrypt the document data before the data is stored into the internal SD memory. - User AuthenticationA function to identify and authenticate users. This function also allows only owners of document data and system administrators to handle document data stored in the TOE. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Fax Flow SecurityA function to restrict the unpermitted communication between public telephone line and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/cert_id JISEC-C0609 JISEC-C0600
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0609_eimg.pdf https://www.ipa.go.jp/en/security/c0600_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2018-8-02 2018-05-22
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE Security functions To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data. PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Flash Memory Data EncryptionA function to encrypt the document data before the data is stored into the internal SD memory. - User AuthenticationA function to identify and authenticate users. This function also allows only owners of document data and system administrators to handle document data stored in the TOE. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Fax Flow SecurityA function to restrict the unpermitted communication between public telephone line and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Evaluation Department Information Technology Security Center Evaluation Department
heuristics/scheme_data/enhanced/product Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer Diskless models
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0609_erpt.pdf https://www.ipa.go.jp/en/security/c0600_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0609_est.pdf https://www.ipa.go.jp/en/security/c0600_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 1.12.32 Controller ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8
heuristics/scheme_data/expiration_date 2023-09 2023-06
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0609_it7630.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0600_it7629.html
heuristics/scheme_data/toe_overseas_name Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Controller ROM Ver. 1.12.32 Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer Diskless models Controller ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8
pdf_data/cert_filename c0609_eimg.pdf c0600_eimg.pdf
pdf_data/cert_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0609-01-2018: 1
  • JISEC-CC-CRP-C0600-01-2018: 1
pdf_data/cert_metadata//CreationDate D:20180822142712+09'00' D:20180608134850+09'00'
pdf_data/cert_metadata//ModDate D:20180822142817+09'00' D:20180608161051+09'00'
pdf_data/cert_metadata/pdf_file_size_bytes 150890 145696
pdf_data/report_filename c0609_erpt.pdf c0600_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0609-01-2018: 1
  • JISEC-CC-CRP-C0600-01-2018: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.ADMIN: 1
  • A.USER: 1
  • A.SECMODE: 1
  • A.ACCESS: 1
pdf_data/report_keywords/cc_claims/A/A.ADMIN 2 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 4
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
  • T.CONSUME: 2
  • T.DATA_SEC: 2
  • T.CONFDATA: 2
  • T.COMM_TAP: 2
pdf_data/report_keywords/crypto_protocol/IPsec/IPsec 5 6
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA256 5 4
pdf_data/report_keywords/vendor/Microsoft/Microsoft 17 13
pdf_data/report_metadata//CreationDate D:20181005165910+09'00' D:20180723134008+09'00'
pdf_data/report_metadata//ModDate D:20181005165955+09'00' D:20180723134024+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 421873 402939
pdf_data/report_metadata/pdf_number_of_pages 37 34
pdf_data/st_filename c0609_est.pdf c0600_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.DOC: 41
    • D.FUNC: 19
    • D.PROT: 4
    • D.CONF: 13
  • O:
    • O.AUDIT_STORAGE: 10
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 8
    • O.DOC: 16
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 14
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
  • T:
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
    • T.CONF: 6
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 12
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
  • O:
    • O.AUDITS: 8
    • O.CIPHER: 5
    • O.COMM_SEC: 7
    • O.FAX_SEC: 6
    • O.MANAGE: 9
    • O.USER: 9
    • O.RESTRICT: 5
    • O.VERIFY: 2
  • T:
    • T.CONFDATA: 4
    • T.DATA_SEC: 4
    • T.COMM_TAP: 3
    • T.CONSUME: 3
  • A:
    • A.ADMIN: 4
    • A.USER: 3
    • A.SECMODE: 4
    • A.ACCESS: 3
  • OE:
    • OE.ADMIN: 3
    • OE.USER: 3
    • OE.SEC: 7
    • OE.PHYSICAL: 3
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 3
  • A.USER: 3
  • A.ADMIN: 6
  • A.ADMIN: 4
  • A.USER: 3
  • A.SECMODE: 4
  • A.ACCESS: 3
pdf_data/st_keywords/cc_claims/A/A.ADMIN 6 4
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT_STORAGE: 10
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 8
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDITS: 8
  • O.CIPHER: 5
  • O.COMM_SEC: 7
  • O.FAX_SEC: 6
  • O.MANAGE: 9
  • O.USER: 9
  • O.RESTRICT: 5
  • O.VERIFY: 2
pdf_data/st_keywords/cc_claims/O/O.CIPHER 8 5
pdf_data/st_keywords/cc_claims/O/O.USER 14 9
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 12
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
  • OE.ADMIN: 3
  • OE.USER: 3
  • OE.SEC: 7
  • OE.PHYSICAL: 3
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 6 3
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL 2 3
pdf_data/st_keywords/cc_claims/OE/OE.USER 12 3
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 6
  • T.FUNC: 3
  • T.PROT: 3
  • T.CONF: 6
  • T.CONFDATA: 4
  • T.DATA_SEC: 4
  • T.COMM_TAP: 3
  • T.CONSUME: 3
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 5 4
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 2
  • EAL 2: 1
  • EAL2 augmented: 1
  • EAL2: 2
  • EAL2 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.2: 9
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_STG.1: 11
    • FAU_STG.4: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
    • FCS_COP: 1
  • FDP:
    • FDP_ACC.1: 75
    • FDP_ACF.1: 68
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_RIP.1: 9
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 6
    • FDP_ACF.1.1: 6
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 6
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 6
    • FDP_ACC: 2
  • FIA:
    • FIA_AFL.1: 19
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.1: 16
    • FIA_UAU.7: 10
    • FIA_UID.1: 22
    • FIA_USB.1: 9
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA.1: 75
    • FMT_SMR.1: 39
    • FMT_MOF.1: 11
    • FMT_MSA.3: 68
    • FMT_MTD.1: 23
    • FMT_SMF.1: 34
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 6
    • FMT_MSA.3.1: 6
    • FMT_MSA.3.2: 6
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 16
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.2: 8
    • FAU_STG.1: 10
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_COP.1: 10
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACF.1: 10
    • FDP_IFC.1: 11
    • FDP_IFF.1: 10
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF: 1
  • FIA:
    • FIA_AFL.1: 16
    • FIA_ATD.1: 10
    • FIA_SOS.1: 7
    • FIA_UAU.1: 14
    • FIA_UAU.7: 9
    • FIA_UID.1: 15
    • FIA_USB.1: 8
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UIA.1: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 11
    • FMT_MSA.3: 11
    • FMT_MTD.1: 11
    • FMT_SMF.1: 17
    • FMT_SMR.1: 15
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 2
  • FPT:
    • FPT_STM.1: 10
    • FPT_TST.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN: 1
  • FAU_GEN.1: 15
  • FAU_GEN.2: 9
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_STG.1: 11
  • FAU_STG.4: 9
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 9
  • FAU_SAR.2: 8
  • FAU_STG.1: 10
  • FAU_STG.4: 8
  • FAU_GEN.1.2: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 2
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 15 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 9 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 11 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 9 8
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 12
  • FCS_COP.1: 11
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
  • FCS_CKM.1: 10
  • FCS_COP.1: 10
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 12 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 11 10
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 75
  • FDP_ACF.1: 68
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 6
  • FDP_ACF.1.1: 6
  • FDP_ACF.1.2: 6
  • FDP_ACF.1.3: 6
  • FDP_ACF.1.4: 6
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 6
  • FDP_ACC: 2
  • FDP_ACC.1: 12
  • FDP_ACF.1: 10
  • FDP_IFC.1: 11
  • FDP_IFF.1: 10
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 75 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 68 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 6 11
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 19
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 16
  • FIA_UAU.7: 10
  • FIA_UID.1: 22
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID.2: 1
  • FIA_AFL.1: 16
  • FIA_ATD.1: 10
  • FIA_SOS.1: 7
  • FIA_UAU.1: 14
  • FIA_UAU.7: 9
  • FIA_UID.1: 15
  • FIA_USB.1: 8
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UIA.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 19 16
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 11 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 16 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 10 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 22 15
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 9 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 11 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 75 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 6 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 68 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 6 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 6 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 23 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 34 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 39 15
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 16
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 11
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1: 10
  • FPT_TST.1: 8
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 11 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 9 8
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_ITC.1: 7
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 13 7
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • is set to [authority of user to only Store Print], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Embedded Web Server Embedded Web Server is a: 1
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS 20 21
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA1: 2
  • SHA-1: 2
  • SHA-1: 2
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA256: 8
  • SHA384: 2
  • SHA512: 2
  • SHA-2: 3
  • SHA256: 5
  • SHA-2: 3
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 8 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • cold boot: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 8 12
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata//CreationDate D:20181004130534+09'00' D:20180713151331+09'00'
pdf_data/st_metadata//ModDate D:20181004132231+09'00' D:20180713151601+09'00'
pdf_data/st_metadata//Title Xerox VersaLink C505/C605 Color Multifunction Printer Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer
pdf_data/st_metadata/pdf_file_size_bytes 682920 501527
pdf_data/st_metadata/pdf_number_of_pages 120 84
dgst 59f884b645f9a608 893f2b1984c96a3f