Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Xerox Color 560/570 Printer Version:Controller ROM Ver. 1.208.1, IOT ROM Ver. 64.19.0, IIT ROM Ver. 6.16.1, ADF ROM Ver. 12.11.0
JISEC-CC-CRP-C0410
Xerox WorkCentre 7120 Version:Controller ROM Ver. 1.201.6, IOT ROM Ver. 4.21.0, ADF ROM Ver. 7.06.50
JISEC-CC-CRP-C0257
name Xerox Color 560/570 Printer Version:Controller ROM Ver. 1.208.1, IOT ROM Ver. 64.19.0, IIT ROM Ver. 6.16.1, ADF ROM Ver. 12.11.0 Xerox WorkCentre 7120 Version:Controller ROM Ver. 1.201.6, IOT ROM Ver. 4.21.0, ADF ROM Ver. 7.06.50
not_valid_before 2013-10-30 2010-06-17
not_valid_after 2018-11-26 2015-06-30
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0410_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0257_est.pdf
security_level ALC_FLR.2, EAL3+ EAL3
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0410_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0257_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})})
state/report/pdf_hash f984e9d60ec31e4738b4fad074782309e152688fcdf42356bfc85016902d29cf 20ecdc4e84374417caae0c919e4fcb9cb56bc33a907a8653d4deea56f9aeb48a
state/report/txt_hash b2542c47d6325799bd4da86852da719984ef830a4f6b235583d74c2e83ea5ea0 64469727f43002499752f5b762098b69d6785b138d06dbc113b2a7a2b14cffed
state/st/pdf_hash 99b9123ce03b107f7fcb24b654539f3ef07d4c74085580aa32c20dbc6564d19d 7707f7b636e027682aaf10e408eb0265b7329b3cb6705dc3948995c59f72bb78
state/st/txt_hash ad74a362e93617506310cfe308bc6b9bef9e73ed8a1ebf6a37429f2d169b384a 4bbc66df413e3ae68370fa2eb5ba2eb5aa554ee865b056243a3177e5118f46de
heuristics/cert_id JISEC-CC-CRP-C0410 JISEC-CC-CRP-C0257
heuristics/extracted_versions 64.19.0, 12.11.0, 6.16.1, 1.208.1 7.06.50, 4.21.0, 1.201.6
heuristics/scheme_data/cert_id C0410 C0257
heuristics/scheme_data/certification_date 2013-10 2010-06
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP EAL3
heuristics/scheme_data/enhanced
  • product: Xerox Color 560/570 Printer
  • toe_version: Controller ROM Ver. 1.208.1 IOT ROM Ver. 64.19.0 IIT ROM Ver. 6.16.1 ADF ROM Ver. 12.11.0
  • product_type: Multi Function Device
  • certification_date: 2013-10-30
  • cc_version: 3.1 Release4
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1-2009
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0410_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0410_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0410_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
  • product: Xerox WorkCentre 7120
  • toe_version: Controller ROM Ver. 1.201.6 IOT ROM Ver. 4.21.0 ADF ROM Ver. 7.06.50
  • product_type: Multi Function Device
  • certification_date: 2010-06-17
  • cc_version: 3.1
  • assurance_level: EAL3
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0257_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0257_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0257_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator痴 Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
heuristics/scheme_data/enhanced/assurance_level EAL3 Augmented with ALC_FLR.2 EAL3
heuristics/scheme_data/enhanced/cc_version 3.1 Release4 3.1
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0410_eimg.pdf https://www.ipa.go.jp/en/security/c0257_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2013-10-30 2010-06-17
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data. PRODUCT DESCRIPTION Description of TOE The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator痴 Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
heuristics/scheme_data/enhanced/product Xerox Color 560/570 Printer Xerox WorkCentre 7120
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0410_erpt.pdf https://www.ipa.go.jp/en/security/c0257_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0410_est.pdf https://www.ipa.go.jp/en/security/c0257_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 1.208.1 IOT ROM Ver. 64.19.0 IIT ROM Ver. 6.16.1 ADF ROM Ver. 12.11.0 Controller ROM Ver. 1.201.6 IOT ROM Ver. 4.21.0 ADF ROM Ver. 7.06.50
heuristics/scheme_data/expiration_date 2018-11 2015-07
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0410_it3450.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0257_it9281.html
heuristics/scheme_data/toe_overseas_name Xerox Color 560/570 Printer Controller ROM Ver. 1.208.1, IOT ROM Ver. 64.19.0, IIT ROM Ver. 6.16.1, ADF ROM Ver. 12.11.0 Xerox WorkCentre 7120 Controller ROM Ver. 1.201.6 IOT ROM Ver. 4.21.0 ADF ROM Ver. 7.06.50
pdf_data/report_filename c0410_erpt.pdf c0257_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0410-01: 1
  • Certification No. C0410: 1
  • CRP-C0257-01: 1
  • Certification No. C0257: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.ADMIN: 1
  • A.SECMODE: 1
pdf_data/report_keywords/cc_claims/A/A.ADMIN 2 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 4
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
  • T.RECOVER: 1
  • T.CONFDATA: 1
  • T.DATA_SEC: 1
  • T.COMM_TAP: 1
  • T.CONSUME: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 2
  • EAL3: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL3 4 3
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
    • print data from the printer driver of user client to the MFD. Therefore, the following function is out of scope of the evaluated security functions. CRP-C0410-01 17 - Printer driver requires a user to enter: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL 3.0: 1
      • SSL: 1
    • TLS:
      • TLS 1.0: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2006-09-001: 2
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2007-09-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 11
pdf_data/report_metadata
  • pdf_file_size_bytes: 394348
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 39
  • /CreationDate: D:20131216144240+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20131216144303+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 153194
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /CreationDate: D:20100715144814+09'00'
  • /Author: IPA/JISEC
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Producer: Acrobat Distiller 8.2.3 (Windows)
  • /ModDate: D:20100715144817+09'00'
  • /Company: IPA
  • /Manager: IPA
  • /Title: CRP-e
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20131216144240+09'00' D:20100715144814+09'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 Word 用 Acrobat PDFMaker 8.1
pdf_data/report_metadata//ModDate D:20131216144303+09'00' D:20100715144817+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 8.2.3 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 394348 153194
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 39 23
pdf_data/st_filename c0410_est.pdf c0257_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.FUNC: 66
    • D.DOC: 71
    • D.PROT: 3
    • D.CONF: 13
  • O:
    • O.AUDIT_STORAGE: 9
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 9
    • O.DOC: 16
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 14
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
    • O.AUDIT_STORAG: 1
  • T:
    • T.DOC: 7
    • T.CONF: 7
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 12
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
  • O:
    • O.AUDITS: 8
    • O.CIPHER: 5
    • O.COMM_SEC: 7
    • O.FAX_SEC: 4
    • O.MANAGE: 9
    • O.RESIDUAL: 5
    • O.USER: 7
    • O.RESTRICT: 7
  • T:
    • T.RECOVER: 5
    • T.CONFDATA: 3
    • T.DATA_SEC: 3
    • T.COMM_TAP: 5
    • T.CONSUME: 5
  • A:
    • A.ADMIN: 5
    • A.SECMODE: 3
  • OE:
    • OE.ADMIN: 3
    • OE.SEC: 6
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 3
  • A.USER: 3
  • A.ADMIN: 6
  • A.ADMIN: 5
  • A.SECMODE: 3
pdf_data/st_keywords/cc_claims/A/A.ADMIN 6 5
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT_STORAGE: 9
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 9
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDIT_STORAG: 1
  • O.AUDITS: 8
  • O.CIPHER: 5
  • O.COMM_SEC: 7
  • O.FAX_SEC: 4
  • O.MANAGE: 9
  • O.RESIDUAL: 5
  • O.USER: 7
  • O.RESTRICT: 7
pdf_data/st_keywords/cc_claims/O/O.CIPHER 9 5
pdf_data/st_keywords/cc_claims/O/O.USER 14 7
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 12
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
  • OE.ADMIN: 3
  • OE.SEC: 6
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 6 3
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 7
  • T.CONF: 7
  • T.FUNC: 3
  • T.PROT: 3
  • T.RECOVER: 5
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 5
  • T.CONSUME: 5
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 5
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 2
  • EAL 3: 1
  • EAL3 augmented: 1
  • EAL3: 6
  • EAL 3: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL3 2 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.2: 9
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_STG.1: 11
    • FAU_STG.4: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
    • FCS_COP: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ACC.1: 97
    • FDP_ACF.1: 90
    • FDP_RIP.1: 9
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 8
    • FDP_ACF.1.1: 8
    • FDP_ACF.1.2: 8
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 8
  • FIA:
    • FIA_AFL.1: 35
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.1: 18
    • FIA_UAU.7: 10
    • FIA_UID.1: 23
    • FIA_USB.1: 9
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_SMR.1: 45
    • FMT_MOF.1: 11
    • FMT_MSA.1: 90
    • FMT_MSA.3: 90
    • FMT_MTD.1: 23
    • FMT_SMF.1: 38
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 8
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 15
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.2: 8
    • FAU_STG.1: 8
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 8
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACF.1: 8
    • FDP_IFC.1: 11
    • FDP_IFF.1: 7
    • FDP_RIP.1: 8
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
  • FIA:
    • FIA_AFL.1: 32
    • FIA_ATD.1: 10
    • FIA_UAU.2: 17
    • FIA_UAU.7: 10
    • FIA_UID.2: 13
    • FIA_USB.1: 8
    • FIA_UAU.1: 6
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_UID.1: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UIA.2: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 10
    • FMT_MSA.3: 10
    • FMT_MTD.1: 10
    • FMT_SMF.1: 14
    • FMT_SMR.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN: 1
  • FAU_GEN.1: 15
  • FAU_GEN.2: 9
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_STG.1: 11
  • FAU_STG.4: 9
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 7
  • FAU_SAR.2: 8
  • FAU_STG.1: 8
  • FAU_STG.4: 8
  • FAU_GEN.1.2: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 2
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 15 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 7
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 9 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 11 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 9 8
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 12
  • FCS_COP.1: 11
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
  • FCS_CKM.1: 12
  • FCS_COP.1: 8
  • FCS_CKM.2: 1
  • FCS_CKM.4: 3
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 11 8
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 4
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACC.1: 97
  • FDP_ACF.1: 90
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 8
  • FDP_ACF.1.1: 8
  • FDP_ACF.1.2: 8
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 8
  • FDP_ACC.1: 12
  • FDP_ACF.1: 8
  • FDP_IFC.1: 11
  • FDP_IFF.1: 7
  • FDP_RIP.1: 8
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 97 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 90 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 8 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 9 8
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 35
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 18
  • FIA_UAU.7: 10
  • FIA_UID.1: 23
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID.2: 1
  • FIA_AFL.1: 32
  • FIA_ATD.1: 10
  • FIA_UAU.2: 17
  • FIA_UAU.7: 10
  • FIA_UID.2: 13
  • FIA_USB.1: 8
  • FIA_UAU.1: 6
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_UID.1: 7
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UIA.2: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 35 32
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 11 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 18 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 23 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 1 13
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 9 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 11 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 90 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 8 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 90 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 8 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 8 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 23 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 38 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 45 14
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 15
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 11
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1: 10
  • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 11 10
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 8
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 1
  • FTP_TRP.1.3: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Job Flow A function to enable efficient standard: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • other:
    • cold boot: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2006-09-001: 1
  • CCMB-2007-09-002: 1
  • CCMB-2007-09-003: 1
  • CCMB-2007-09-004: 1
pdf_data/st_metadata//Author user1
pdf_data/st_metadata//CreationDate D:20131126151313+09'00' D:20100707112017+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 PScript5.dll Version 5.2
pdf_data/st_metadata//ModDate D:20131126151313+09'00' D:20100707112017+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 10.1.8 (Windows) Acrobat Distiller 6.0 (Windows)
pdf_data/st_metadata//Title Microsoft Word - C0257_Security Target.doc
pdf_data/st_metadata/pdf_file_size_bytes 635737 510456
pdf_data/st_metadata/pdf_number_of_pages 140 90
dgst 5c9dc4f0cc1519dc ffd67cddbad157c5