name |
Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax Controller ROM Ver. 1.12.32
|
Xerox D136 Copier/Printer Version:Controller+PS ROM Ver. 1.200.6, IOT ROM Ver. 113.27.0, IIT ROM Ver. 13.1.0, ADF ROM Ver. 13.17.1
|
category |
Multi-Function Devices
|
Multi-Function Devices
|
not_valid_before |
2018-08-02
|
2013-10-30
|
not_valid_after |
2023-08-02
|
2018-11-26
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0609_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0411_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Xerox Corporation
|
Fuji Xerox Co., Ltd.
|
manufacturer_web |
https://www.xerox.com
|
https://www.fujixerox.co.jp/eng/
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0609_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0411_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0609_eimg.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
c2d8d7848e3e50be185bdc6df97e1e96e00f23309737f2d5e8d44c38ef247c21
|
None
|
state/cert/txt_hash |
1cce267ff19dde66b994fbfb3bcc98930dbc8c537274ba7d4ea5638e563f0cf4
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
ad7c0e9471e7cd1103ec47a3e29a2df28f03306bfa34e7b6c636a8dccd9d0786
|
9b7e68f4d1611eee21db3ef5c848e2eb6d9c0797042436126869a245408864cf
|
state/report/txt_hash |
cb8232a3d3892393f92e2cfc6f2c046857cee08ee14f5550d1cc69c5f8eb9749
|
cb203ef06787f0615cf98c6bd482baa9ea111994c259c9d433bdc8fc6ec58fba
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
cc62ef47f2d68e69bff90ef02024e00d6cfaf83145211383abc917fddbecbb63
|
08cdb654349f93f61620bb49808263b28992a2841303450b143d63c7bb781f39
|
state/st/txt_hash |
43bf35b619e5482705f7d26c282e5dacee528b3f96e4b277dcdcf573e1b4d28c
|
583ade20bbb7d7935244dff719280c08f643277a62c49fab050063a4e7cfcbe5
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0609-01-2018
|
JISEC-CC-CRP-C0411
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*, cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:* |
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.12.32 |
13.1.0, 13.17.1, 1.200.6, 113.27.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data/cert_id |
C0609
|
C0411
|
heuristics/scheme_data/certification_date |
2018-08
|
2013-10
|
heuristics/scheme_data/claim |
PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
|
EAL3+
ALC_FLR.2
PP
|
heuristics/scheme_data/enhanced |
- product:
Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax
- toe_version:
Controller ROM Ver. 1.12.32
- product_type:
Multi-Function Device
- cert_id: JISEC-C0609
- certification_date:
2018-8-02
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented by ALC_FLR.2
- protection_profile:
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- vendor:
Xerox Corporation
- evaluation_facility:
Information Technology Security Center Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0609_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0609_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0609_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE.
TOE Security functions
To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions:
-
Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD.
-
Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD.
-
User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data.
-
System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions.
-
Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations.
-
Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them.
-
Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols.
-
Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network.
-
Self testA function to verify the integrity of TSF executable code and TOE setting data.
|
- product:
Xerox D136 Copier/Printer
- toe_version:
Controller+PS ROM
Ver. 1.200.6
IOT ROM
Ver. 113.27.0
IIT ROM
Ver. 13.1.0
ADF ROM
Ver. 13.17.1
- product_type:
Multi Function Device
- certification_date:
2013-10-30
- cc_version:
3.1 Release4
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor:
Fuji Xerox Co., Ltd.
- evaluation_facility:
Information Technology Security Center Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0411_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0411_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0411_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE.
TOE security functionality
To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions:
-
Hard Disk Data Overwrite
A function to overwrite and delete the document data in the internal HDD.
-
Hard Disk Data Encryption
A function to encrypt the document data before the data is stored into the internal HDD.
-
User Authentication
A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data.
-
System Administrator's Security Management
A function to allow only system administrators to configure the settings of security functions.
-
Customer Engineer Operation Restriction
A function to allow only system administrators to configure the settings for restricting customer engineer operations.
-
Security Audit Log
A function to generate audit logs of security events and allow only system administrators to refer to them.
-
Internal Network Data Protection
A function to protect communication data by using encryption communication protocols.
-
Information Flow Security
A function to restrict the unpermitted communication between the TOE interface and internal network.
-
Self test
A function to verify the integrity of TSF executable code and TOE setting data.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL2 Augmented by ALC_FLR.2
|
EAL3 Augmented with ALC_FLR.2
|
heuristics/scheme_data/enhanced/cc_version |
3.1 Release4
|
3.1 Release4
|
heuristics/scheme_data/enhanced/cert_link |
https://www.ipa.go.jp/en/security/c0609_eimg.pdf
|
https://www.ipa.go.jp/en/security/c0411_eimg.pdf
|
heuristics/scheme_data/enhanced/certification_date |
2018-8-02
|
2013-10-30
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE.
TOE Security functions
To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions:
-
Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD.
-
Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD.
-
User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data.
-
System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions.
-
Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations.
-
Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them.
-
Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols.
-
Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network.
-
Self testA function to verify the integrity of TSF executable code and TOE setting data.
|
PRODUCT DESCRIPTION
Description of TOE
The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE.
TOE security functionality
To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions:
-
Hard Disk Data Overwrite
A function to overwrite and delete the document data in the internal HDD.
-
Hard Disk Data Encryption
A function to encrypt the document data before the data is stored into the internal HDD.
-
User Authentication
A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data.
-
System Administrator's Security Management
A function to allow only system administrators to configure the settings of security functions.
-
Customer Engineer Operation Restriction
A function to allow only system administrators to configure the settings for restricting customer engineer operations.
-
Security Audit Log
A function to generate audit logs of security events and allow only system administrators to refer to them.
-
Internal Network Data Protection
A function to protect communication data by using encryption communication protocols.
-
Information Flow Security
A function to restrict the unpermitted communication between the TOE interface and internal network.
-
Self test
A function to verify the integrity of TSF executable code and TOE setting data.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Information Technology Security Center Evaluation Department
|
Information Technology Security Center Evaluation Department
|
heuristics/scheme_data/enhanced/product |
Xerox VersaLink C505/C605 Color Multifunction Printer models with Hard Disk, Fax
|
Xerox D136 Copier/Printer
|
heuristics/scheme_data/enhanced/product_type |
Multi-Function Device
|
Multi Function Device
|
heuristics/scheme_data/enhanced/protection_profile |
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
|
IEEE Std 2600.1-2009
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0609_erpt.pdf
|
https://www.ipa.go.jp/en/security/c0411_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0609_est.pdf
|
https://www.ipa.go.jp/en/security/c0411_est.pdf
|
heuristics/scheme_data/enhanced/toe_version |
Controller ROM Ver. 1.12.32
|
Controller+PS ROM
Ver. 1.200.6
IOT ROM
Ver. 113.27.0
IIT ROM
Ver. 13.1.0
ADF ROM
Ver. 13.17.1
|
heuristics/scheme_data/enhanced/vendor |
Xerox Corporation
|
Fuji Xerox Co., Ltd.
|
heuristics/scheme_data/expiration_date |
2023-09
|
2018-11
|
heuristics/scheme_data/supplier |
Xerox Corporation
|
Fuji Xerox Co., Ltd.
|
heuristics/scheme_data/toe_japan_name |
-----
|
-----
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0609_it7630.html
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0411_it3451.html
|
heuristics/scheme_data/toe_overseas_name |
Xerox VersaLink C505/C605
Color Multifunction Printer models with Hard Disk, Fax
Controller ROM Ver. 1.12.32
|
Xerox D136 Copier/Printer
Controller+PS ROM Ver. 1.200.6, IOT ROM Ver. 113.27.0, IIT ROM Ver. 13.1.0, ADF ROM Ver. 13.17.1
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
c0609_eimg.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- JP:
- JISEC-CC-CRP-C0609-01-2018:
1
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- ITSC:
- Information Technology Security Center:
1
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
150890
- pdf_is_encrypted:
True
- pdf_number_of_pages:
2
- /CreationDate:
D:20180822142712+09'00'
- /Creator:
Microsoft® Word 2010
- /ModDate:
D:20180822142817+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
c0609_erpt.pdf
|
c0411_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- JISEC-CC-CRP-C0609-01-2018:
1
|
- CRP-C0411-01:
1
- Certification No. C0411:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.DOC:
4
- T.FUNC:
2
- T.PROT:
2
- T.CONF:
4
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
- T:
- T.DOC:
4
- T.FUNC:
2
- T.PROT:
2
- T.CONF:
4
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL2:
4
- EAL2 augmented:
2
|
- EAL3:
4
- EAL3 augmented:
2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process/OutOfScope |
- out of scope:
1
- of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described:
1
|
- out of scope:
2
- of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described:
1
- print data from the printer driver of user client to the MFD. Therefore, the following function is out of scope of the evaluated security functions. - Printer driver requires a user to enter user ID and password: 1
|
pdf_data/report_keywords/certification_process/OutOfScope/of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described |
1
|
1
|
pdf_data/report_keywords/certification_process/OutOfScope/out of scope |
1
|
2
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_protocol/TLS |
|
|
pdf_data/report_keywords/crypto_protocol/TLS/TLS |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility/ITSC/Information Technology Security Center |
4
|
3
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
2
|
1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/Microsoft/Microsoft |
17
|
10
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20181005165910+09'00'
|
D:20131216144108+09'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//ModDate |
D:20181005165955+09'00'
|
D:20131216144135+09'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata/pdf_file_size_bytes |
421873
|
335515
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
37
|
37
|
pdf_data/st_filename |
c0609_est.pdf
|
c0411_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
pdf_data/st_keywords/cc_claims/D/D.CONF |
13
|
13
|
pdf_data/st_keywords/cc_claims/D/D.DOC |
41
|
61
|
pdf_data/st_keywords/cc_claims/D/D.FUNC |
19
|
59
|
pdf_data/st_keywords/cc_claims/D/D.PROT |
4
|
3
|
pdf_data/st_keywords/cc_claims/O |
- O.AUDIT_STORAGE:
10
- O.AUDIT_ACCESS:
10
- O.CIPHER:
8
- O.DOC:
16
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
14
- O.INTERFACE:
8
- O.SOFTWARE:
8
- O.AUDIT:
8
|
- O.AUDIT_STORAGE:
9
- O.AUDIT_ACCESS:
10
- O.CIPHER:
9
- O.DOC:
16
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
14
- O.INTERFACE:
8
- O.SOFTWARE:
8
- O.AUDIT:
8
- O.AUDIT_STORAG: 1
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT |
8
|
8
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT_ACCESS |
10
|
10
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT_STORAGE |
10
|
9
|
pdf_data/st_keywords/cc_claims/O/O.CIPHER |
8
|
9
|
pdf_data/st_keywords/cc_claims/O/O.CONF |
16
|
16
|
pdf_data/st_keywords/cc_claims/O/O.DOC |
16
|
16
|
pdf_data/st_keywords/cc_claims/O/O.FUNC |
8
|
8
|
pdf_data/st_keywords/cc_claims/O/O.INTERFACE |
8
|
8
|
pdf_data/st_keywords/cc_claims/O/O.PROT |
8
|
8
|
pdf_data/st_keywords/cc_claims/O/O.SOFTWARE |
8
|
8
|
pdf_data/st_keywords/cc_claims/O/O.USER |
14
|
14
|
pdf_data/st_keywords/cc_claims/OE |
- OE.AUDIT_STORAGE:
2
- OE.AUDIT_ACCESS:
2
- OE.PHYSICAL:
2
- OE.USER:
12
- OE.ADMIN:
6
- OE.AUDIT:
3
- OE.INTERFACE:
3
- OE.PHYISCAL:
1
|
- OE.AUDIT_STORAGE:
2
- OE.AUDIT_ACCESS:
2
- OE.PHYSICAL:
2
- OE.USER:
12
- OE.ADMIN:
6
- OE.AUDIT:
3
- OE.INTERFACE:
3
- OE.PHYISCAL:
1
|
pdf_data/st_keywords/cc_claims/T/T.CONF |
6
|
7
|
pdf_data/st_keywords/cc_claims/T/T.DOC |
6
|
7
|
pdf_data/st_keywords/cc_claims/T/T.FUNC |
3
|
3
|
pdf_data/st_keywords/cc_claims/T/T.PROT |
3
|
3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
|
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.2:
5
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1:
1
|
- ALC_FLR.2:
5
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 |
5
|
5
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL2:
2
- EAL 2:
1
- EAL2 augmented:
1
|
- EAL3:
2
- EAL 3:
1
- EAL3 augmented:
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
15
|
15
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 |
11
|
10
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM.1:
12
- FCS_COP.1:
11
- FCS_CKM.2:
1
- FCS_CKM.4:
2
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
- FCS_CKM:
1
- FCS_COP:
1
|
- FCS_CKM.1:
12
- FCS_COP.1:
11
- FCS_CKM.2:
1
- FCS_CKM.4:
2
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
- FCS_CKM:
1
- FCS_COP:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
75
|
86
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
68
|
80
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1:
19
- FIA_ATD.1:
11
- FIA_SOS.1:
8
- FIA_UAU.1:
16
- FIA_UAU.7:
10
- FIA_UID.1:
22
- FIA_USB.1:
9
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_UID.2:
1
|
- FIA_AFL.1:
35
- FIA_ATD.1:
11
- FIA_SOS.1:
8
- FIA_UAU.1:
18
- FIA_UAU.7:
10
- FIA_UID.2:
21
- FIA_UID.1:
11
- FIA_USB.1:
9
- FIA_AFL.1.1:
4
- FIA_AFL.1.2:
4
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.2.1: 1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_UID: 4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
19
|
35
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
16
|
18
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
22
|
11
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 |
1
|
21
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
75
|
79
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
68
|
80
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
23
|
22
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
34
|
36
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
39
|
43
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 |
16
|
15
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_SSL.3:
10
- FTA_SSL.3.1:
1
|
- FTA_SSL.3:
10
- FTA_SSL.3.1:
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
13
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
- FTP_ITC.1:
13
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/certification_process/ConfidentialDocument |
- is set to [authority of user to only Store Print], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Embedded Web Server Embedded Web Server is a:
1
|
- When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Job Flow A function to enable efficient standard:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA256:
8
- SHA384:
2
- SHA512:
2
- SHA-2:
3
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 |
2
|
10
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/malfunction |
1
|
2
|
pdf_data/st_keywords/side_channel_analysis/other |
|
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004: 1
|
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-001 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-002 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-003 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS PUB 180-2: 2
- FIPS PUB 197:
1
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 |
1
|
1
|
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/standard_id/RFC/RFC 2104 |
1
|
1
|
pdf_data/st_keywords/standard_id/X509 |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
8
|
7
|
pdf_data/st_keywords/symmetric_crypto/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
1
|
3
|
pdf_data/st_keywords/symmetric_crypto/constructions |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite/TLS |
- TLS_RSA_WITH_AES_128_CBC_SHA:
1
- TLS_RSA_WITH_AES_256_CBC_SHA:
1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
- TLS_RSA_WITH_AES_128_CBC_SHA:
1
- TLS_RSA_WITH_AES_256_CBC_SHA:
1
|
pdf_data/st_keywords/tls_cipher_suite/TLS/TLS_RSA_WITH_AES_128_CBC_SHA |
1
|
1
|
pdf_data/st_keywords/tls_cipher_suite/TLS/TLS_RSA_WITH_AES_256_CBC_SHA |
1
|
1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
682920
- pdf_is_encrypted:
True
- pdf_number_of_pages:
120
- /CreationDate:
D:20181004130534+09'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20181004132231+09'00'
- /Producer:
Acrobat Distiller 10.1.16 (Windows)
- /Subject: Security Target
- /Title:
Xerox VersaLink C505/C605 Color Multifunction Printer
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
621279
- pdf_is_encrypted:
False
- pdf_number_of_pages:
133
- /Author:
- /CreationDate:
D:20131216090059+09'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20131216090059+09'00'
- /Producer:
Acrobat Distiller 10.1.8 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/st_metadata//CreationDate |
D:20181004130534+09'00'
|
D:20131216090059+09'00'
|
pdf_data/st_metadata//Creator |
PScript5.dll Version 5.2.2
|
PScript5.dll Version 5.2.2
|
pdf_data/st_metadata//ModDate |
D:20181004132231+09'00'
|
D:20131216090059+09'00'
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 10.1.16 (Windows)
|
Acrobat Distiller 10.1.8 (Windows)
|
pdf_data/st_metadata//Title |
Xerox VersaLink C505/C605 Color Multifunction Printer
|
|
pdf_data/st_metadata/pdf_file_size_bytes |
682920
|
621279
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
120
|
133
|
dgst |
59f884b645f9a608
|
de140f8f9bb75b61
|