name |
Luna PCI-E Cryptographic Module, Firmware version 6.10.9 (AVA_VAN.5) |
FUJIFILM Apeos C4030 / C3530 models with Copy, Print, Fax, Scan and Overwrite StorageController ROM Ver. 21.26.12 |
category |
Products for Digital Signatures |
Multi-Function Devices |
scheme |
NL |
JP |
status |
archived |
active |
not_valid_after |
29.12.2022 |
04.09.2029 |
not_valid_before |
29.12.2017 |
04.09.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Get%20cert%20CC-17-179205.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0824_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-179205-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0824_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20CR-3524_23%20-%20Security%20Target.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0824_est.pdf |
manufacturer |
SafeNet Inc. |
FUJIFILM Business Innovation Corp. |
manufacturer_web |
https://www.safenet-inc.com/ |
https://www.fujifilm.com/fb/eng |
security_level |
ALC_FLR.2, EAL4+, AVA_VAN.5 |
{} |
dgst |
5aff27b2a405d882 |
e97e1d9f050d3b54 |
heuristics/cert_id |
NSCIB-CC-179205-CR |
JISEC-CC-CRP-C0824-01-2024 |
heuristics/cert_lab |
|
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_IMP.1, ASE_OBJ.2, ADV_ARC.1, AVA_VAN.5, ATE_IND.2, ATE_DPT.1, ALC_FLR.2, ATE_COV.2, ALC_LCD.1, ASE_TSS.1, ALC_DVS.1, ALC_CMS.4, ASE_ECD.1, AGD_OPE.1, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ASE_REQ.2, ATE_FUN.1, ADV_TDS.3, ALC_TAT.1, AGD_PRE.1, ALC_DEL.1, ASE_CCL.1, ALC_CMC.4 |
ASE_TSS.1, ASE_ECD.1, AGD_PRE.1, AVA_VAN.1, ALC_CMC.1, ASE_OBJ.1, ASE_REQ.1, AGD_OPE.1, ALC_CMS.1, ATE_IND.1, ADV_FSP.1, ASE_CCL.1, ASE_INT.1, ASE_SPD.1 |
heuristics/extracted_versions |
6.10.9 |
21.26.12 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
NSCIB-CC-38671-CR |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
NSCIB-CC-38671-CR |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0824
- certification_date: 01.09.2024
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0824
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/dc4m6e000001sa1e-att/c0824_eimg.pdf
- certification_date: 04.09.2024
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device that has the functions such as copy, scan, print, fax, document storage and retrieval. The TOE provides the security functionality required by the protection profile for Multifunction Device, “Protection Profile for Hardcopy Devices 1.0. TOE security functionality The TOE provides the following security functions: Identification and Authentication Access Control Data Encryption Trusted Communications Security Management Security Auditing Trusted Operation PSTN Fax-Network Separation Overwrite Storage
- evaluation_facility: Information Technology Security Center, Evaluation Department
- expiration_date: 04.09.2029
- product: FUJIFILM Apeos C4030 / C3530 models with Copy, Print, Fax, Scan and Overwrite Storage
- product_type: Multi-Function Device
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/dc4m6e000001sa1e-att/c0824_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/dc4m6e000001sa1e-att/c0824_est.pdf
- toe_version: Controller ROM Ver. 21.26.12
- vendor: FUJIFILM Business Innovation Corp.
- expiration_date: 01.09.2029
- supplier: FUJIFILM Business Innovation Corp.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0824_it4879.html
- toe_overseas_name: FUJIFILM Apeos C4030 / C3530 models with Copy, Print, Fax, Scan and Overwrite Storage Controller ROM Ver. 21.26.12
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b2cfec7a92fa2940 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
pdf_data/cert_filename |
Get cert CC-17-179205.pdf |
c0824_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0824-01-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL7: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20171229160529+01'00'
- /Creator: BHC364e
- /ModDate: D:20171229160529+01'00'
- /Producer: KONICA MINOLTA bizhub C364e
- /Title: BHC364e-20171229160529
- pdf_file_size_bytes: 194726
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author:
- /CreationDate: D:20241010140236+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /Keywords:
- /ModDate: D:20241010140450+09'00'
- /Producer: Adobe PDF Library 20.5.172
- /Subject:
- /Title:
- pdf_file_size_bytes: 234883
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
[CR] NSCIB-CC-179205-CR.pdf |
c0824_erpt.pdf |
pdf_data/report_frontpage |
- NL:
- cert_id: NSCIB-CC-179205-CR
- cert_item: Luna PCI-E Cryptographic Module, Firmware Version 6.10.9
- cert_lab: Brightsight
- developer: SafeNet Inc
|
|
pdf_data/report_keywords/cc_cert_id |
- NL:
- CC-17-38671: 2
- CC-38671: 2
- NSCIB-CC-179205-CR: 13
|
- JP:
- JISEC-CC-CRP-C0824-01-2024: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
|
|
pdf_data/report_keywords/cc_sar |
- ALC:
- AVA:
- AVA_VAN.4: 2
- AVA_VAN.5: 6
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FPT:
- FPT_PHP: 1
- FPT_PHP.1: 1
- FPT_PHP.3: 1
|
- FCS:
- FCS_RBG_EXT.1: 1
- FCS_TLS_EXT.1.1: 1
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- interfaces not exposed to the host computer (such as serial and USB interfaces on the device), are out of scope of these evaluations. The user of the TOE is reminded to operate the TOE in a physically and: 2
- out of scope: 2
- such as serial and USB interfaces on the device), are out of scope of these evaluations: 2
|
|
pdf_data/report_metadata |
- /Author: p646
- /CreationDate: D:20171229163718+01'00'
- /Creator: PDFCreator Version 1.2.0
- /Keywords:
- /ModDate: D:20171229163718+01'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: Certification Report NSCIB-CC-179205-CR
- pdf_file_size_bytes: 575783
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /Author:
- /CreationDate: D:20241010133353+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /ModDate: D:20241024095003+09'00'
- /Producer: Adobe PDF Library 20.5.172
- pdf_file_size_bytes: 363388
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
pdf_data/st_filename |
[ST] CR-3524_23 - Security Target.pdf |
c0824_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-00078: 1
- BSI-CC-PP-00080: 1
- BSI-CC-PP-0078: 6
- BSI-PP-00078: 1
- BSI-PP-CC-00078: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 6
- EAL 4 augmented: 3
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.4: 5
- ADV_IMP.1: 3
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 19
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 11
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 72
- FCS_CKM.1: 18
- FCS_CKM.1.1: 1
- FCS_CKM.2: 17
- FCS_CKM.4: 15
- FCS_CKM.4.1: 1
- FCS_COP: 37
- FCS_COP.1: 10
- FCS_RNG: 3
- FCS_RNG.1: 12
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 31
- FDP_ACC.1: 11
- FDP_ACC.2: 8
- FDP_ACF: 33
- FDP_ACF.1: 22
- FDP_ACF.1.4: 1
- FDP_ETC.2: 8
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 2
- FDP_IFC.1: 4
- FDP_ITC.1: 4
- FDP_ITC.2: 17
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 2
- FDP_RIP.2: 6
- FDP_RIP.2.1: 1
- FDP_UCT.1: 1
- FDP_UIT.1: 1
- FIA:
- FIA_AFL: 15
- FIA_AFL.1: 7
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 14
- FMT_MOF.1: 4
- FMT_MSA: 26
- FMT_MSA.1: 4
- FMT_MSA.2: 12
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 12
- FMT_MTD.1: 3
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.2: 12
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 11
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_PHP.1: 14
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_STM.1: 1
- FPT_TDC.1: 15
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 16
- FPT_TST.2.1: 3
- FPT_TST.2.2: 2
- FPT_TST.2.3: 2
- FPT_TST.2.4: 2
- FPT_TST.2.5: 2
- FPT_TST.2.6: 3
- FPT_TST.2.7: 2
- FPT_TST.2.8: 2
- FTP:
- FTP_ITC: 11
- FTP_ITC.1: 4
- FTP_TRP.1: 1
|
- FAU:
- FAU_GEN: 13
- FAU_GEN.1: 26
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 15
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 37
- FCS_CKM.1.1: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 31
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 99
- FCS_COP.1.1: 8
- FCS_KDF_EXT.1: 5
- FCS_KYC_EXT: 1
- FCS_KYC_EXT.1: 9
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 14
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 5
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 19
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 1
- FDP_DSK_EXT.1: 7
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 1
- FDP_FXS_EXT.1: 7
- FDP_FXS_EXT.1.1: 2
- FDP_RIP.1: 4
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 3
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 1
- FPT_KYP_EXT.1: 7
- FPT_KYP_EXT.1.1: 2
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 7
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 12
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 9
- O.COMMS: 1
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.IMAGE_OVERWRITE: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE: 1
- O.UPDATE_VERIFICATION: 1
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAININ: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROT: 1
- OE.PHYSICAL_PROTE: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_A: 1
- T.UNAUTHORIZED_U: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 36
- AES-256: 4
- AES256: 2
- DES:
- constructions:
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 10
- SHA-256: 16
- SHA-384: 14
- SHA-512: 9
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 4
- SHA-512: 3
- SHA256: 6
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 66
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 7
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- B-163: 6
- B-233: 5
- B-283: 6
- B-409: 5
- B-571: 6
- K-163: 5
- K-233: 5
- K-283: 5
- K-409: 5
- K-571: 4
- P-192: 12
- P-224: 10
- P-256: 12
- P-384: 10
- P-521: 12
|
- NIST:
- P-256: 10
- P-384: 6
- P-521: 6
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 5
- Physical tampering: 1
- malfunction: 2
- physical tampering: 4
- SCA:
- physical probing: 1
- side-channels: 2
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- AIS 20: 2
- AIS 31: 2
- AIS20: 1
- AIS31: 1
- FIPS:
- FIPS PUB 113: 3
- FIPS PUB 180-4: 7
- FIPS PUB 186-3: 17
- FIPS PUB 197: 9
- FIPS PUB 198-1: 3
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 19790:2012: 5
- NIST:
- NIST SP 800-38B: 4
- NIST SP 800-38D: 2
- NIST SP 800-56A: 1
- NIST SP 800-57: 1
- NIST SP 800-67: 4
- NIST SP 800-90: 2
- NIST SP 800-90A: 1
- SP 800-108: 3
- SP 800-38B: 1
- SP 800-38D: 1
- SP 800-57: 2
- PKCS:
- PKCS #1: 9
- PKCS #11: 10
- PKCS #8: 2
- PKCS#11: 3
|
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 7
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 1
- ISO/IEC 19772: 4
- ISO/IEC18031:2011: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38B: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-90A: 2
- RFC:
- RFC 2246: 2
- RFC 2818: 3
- RFC 4346: 2
- RFC 5246: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20171208160736+01'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20171208160736+01'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 1327623
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 117
|
- /Author: FUJIFILM Business Innovation Corp.
- /Comments:
- /Company: Fuji Xerox Co., Ltd
- /ComplianceAssetId:
- /ContentTypeId: 0x010100EDD0ECE172EDB142B5548E7F6B1A64E700D9B77697AA0A1F4CA2330A76C36A895A
- /CreationDate: D:20240930170534+09'00'
- /Creator: Word 用 Acrobat PDFMaker 23
- /Keywords:
- /Manager:
- /MediaServiceImageTags:
- /ModDate: D:20240930171103+09'00'
- /Order: 6809400.000000
- /Producer: Adobe PDF Library 23.3.45
- /SourceModified: D:20240930080210
- /Subject:
- /TemplateUrl:
- /Title: FUJIFILM Apeos C4030 / C3530 Security Target (for Europe, America, Middle East, Africa, South Asia)
- /TriggerFlowInfo:
- /_ExtendedDescription:
- /_dlc_DocIdItemGuid: bd8b49bc-dd46-412e-ba7c-a13e70ffd5b6
- /xd_ProgID:
- /xd_Signature: 0
- pdf_file_size_bytes: 1160651
- pdf_hyperlinks: http://www.ipa.go.jp/security/jisec/cc/documents/CCPART3V3.1R2.pdf, http://www.ipa.go.jp/security/jisec/cc/documents/CCPART2V3.1R2.pdf, http://www.ipa.go.jp/security/jisec/cc/documents/CCPART1V3.1R1.pdf
- pdf_is_encrypted: True
- pdf_number_of_pages: 98
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |