name |
CA ACF2 r16 |
Fuji Xerox DocuCentre-II C3000 Series Controller Software for Asia Pacific Version: Controller ROM V1.121.4 |
category |
Other Devices and Systems |
Multi-Function Devices |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
27.12.2010 |
not_valid_before |
01.09.2017 |
25.01.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10811-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10811-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080310_c0140_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10811-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080310_c0140_est.pdf |
manufacturer |
CA Technologies |
Fuji Xerox Co., Ltd. |
manufacturer_web |
https://www.ca.com |
https://www.fujixerox.co.jp/eng/ |
security_level |
{} |
EAL2 |
dgst |
61c9cd7cd4d905c5 |
49d7fa6c4eb23bfd |
heuristics/cert_id |
CCEVS-VR-VID-10811-2017 |
JISEC-CC-CRP-C0140 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
heuristics/extracted_versions |
- |
1.121.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Enterprise Security Management
- certification_date: 18.08.2017
- evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
- expiration_date: 18.08.2019
- id: CCEVS-VR-VID10811
- product: CA ACF2 r16
- scheme: US
- url: https://www.niap-ccevs.org/product/10811
- vendor: CA Technologies
|
- cert_id: JISEC-CC-CRP-C0140
- certification_date: 01.01.2008
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0140_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, and fax functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - System Administrator's Security Management - Customer Engineer Operation Restriction - FAX Flow Security
- evaluation_facility: Information Technology Security Center
- product: Fuji Xerox DocuCentre-II C3000 Series Controller Software for Asia Pacific
- product_type: IT Product (Control Software for Multi Function Peripheral)
- report_link: https://www.ipa.go.jp/en/security/c0140_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0140_est.pdf
- toe_version: Controller ROM V1.121.4
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.01.2011
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0140_it7157.html
- toe_overseas_name: Fuji Xerox DocuCentre-II C3000 Series Controller Software for Asia Pacific Controller ROM V1.121.4
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
292a489599472031, 64065af56aac20cf |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_esm_ac_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_esm_pm_v2.1.pdf |
{} |
pdf_data/cert_filename |
st_vid10811-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10811-2017: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20170901125546-04'00'
- /ModDate: D:20170901125657-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 178593
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10811-vr.pdf |
20080310_c0140_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10811-2017
- cert_item: CAACF2 r16
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10811-2017: 1
|
- JP:
- CRP-C0140-01: 1
- Certification No. C0140: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- O:
- O.ACCESSID: 1
- O.AUDIT: 1
- O.AUTH: 1
- O.CONSISTENT: 1
- O.DATAPROT: 1
- O.DISTRIB: 1
- O.INTEGRITY: 2
- O.MAINTAIN: 1
- O.MANAGE: 1
- O.MNGRID: 1
- O.MONITOR: 1
- O.OFLOWS: 1
- O.POLICY: 1
- O.PROTCOMMS: 1
- O.ROBUST: 1
- O.SELFID: 2
- T:
- T.ADMIN_ERROR: 1
- T.CONTRADICT: 1
- T.DISABLE: 1
- T.EAVES: 1
- T.FALSIFY: 1
- T.FORGE: 2
- T.MASK: 1
- T.NOROUTE: 1
- T.OFLOWS: 1
- T.UNAUTH: 2
- T.WEAKIA: 1
- T.WEAKPOL: 1
|
- A:
- A.ADMIN: 1
- A.NET: 1
- A.SECMODE: 1
- T:
- T.CONFDATA: 1
- T.RECOVER: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20080307104403+09'00'
- /ModDate: D:20080307104403+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 178622
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
st_vid10811-st.pdf |
20080310_c0140_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 11
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.1: 5
- ALC_CMS.1: 6
- ATE:
- AVA:
|
- ACM:
- ADO:
- ADO_DEL.1: 7
- ADO_IGS.1: 7
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 6
- ADV_RCR.1: 6
- AGD:
- AGD_ADM.1: 8
- AGD_USR.1: 7
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 6
- ATE_IND.2: 5
- AVA:
- AVA_SOF.1: 5
- AVA_VLA.1: 5
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 2
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 1
- FAU_SEL: 2
- FAU_SEL.1: 4
- FAU_SEL.1.1: 1
- FAU_SEL_EXT: 2
- FAU_SEL_EXT.1: 6
- FAU_SEL_EXT.1.1: 1
- FAU_STG: 2
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 7
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCO:
- FCO_NRR: 2
- FCO_NRR.2: 3
- FCO_NRR.2.1: 2
- FCO_NRR.2.2: 1
- FCO_NRR.2.3: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 2
- FDP_ACF.1: 11
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 3
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_USB: 2
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 12
- FMT_MOF.1.1: 4
- FMT_MOF_EXT: 2
- FMT_MOF_EXT.1: 5
- FMT_MOF_EXT.1.1: 1
- FMT_MSA: 4
- FMT_MSA.1: 2
- FMT_MSA.1.1: 1
- FMT_MSA.3: 3
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA_EXT: 2
- FMT_MSA_EXT.5: 5
- FMT_MSA_EXT.5.1: 1
- FMT_MSA_EXT.5.2: 1
- FMT_SMF: 2
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 4
- FPT_FLS_EXT: 2
- FPT_FLS_EXT.1: 4
- FPT_FLS_EXT.1.1: 1
- FPT_RPL: 2
- FPT_RPL.1: 3
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 2
- FPT_SKP_EXT.1.1: 1
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 2
- FRU_FLT.1.1: 1
- FTA:
- FTA_TAB.1: 4
- FTA_TSE: 2
- FTA_TSE.1: 4
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 2
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 13
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 13
- FDP_IFC.1.1: 1
- FDP_IFF.1: 11
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 13
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 17
- FIA_UAU.2.1: 1
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 8
- FIA_UID.2: 14
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 17
- FMT_MOF.1.1: 1
- FMT_MSA: 3
- FMT_MSA.2: 4
- FMT_MSA.3: 1
- FMT_MTD: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMT.1: 1
- FPT:
- FPT_RVM.1: 27
- FPT_RVM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CRYPTO: 1
- A.ESM: 1
- A.INSTALL: 1
- A.MANAGE: 1
- A.POLICY: 1
- A.SYSTIME: 1
- A.USERID: 1
- O:
- O.ACCESSID: 1
- O.AUDIT: 1
- O.AUTH: 1
- O.BANNER: 1
- O.CONSISTENT: 1
- O.DATAPROT: 1
- O.DISTRIB: 1
- O.INTEGRITY: 1
- O.MAINTAIN: 1
- O.MANAGE: 1
- O.MNGRID: 1
- O.MONITOR: 1
- O.OFLOWS: 1
- O.POLICY: 1
- O.PROTCOMMS: 1
- O.ROBUST: 1
- O.SELFID: 2
- OE:
- OE.ADMIN: 2
- OE.BANNER: 2
- OE.CRYPTO: 3
- OE.INSTALL: 2
- OE.PERSON: 2
- OE.POLICY: 2
- OE.PROTECT: 2
- OE.ROBUST: 1
- OE.SYSTIME: 2
- OE.USERID: 3
- T:
- T.ADMIN_ERROR: 1
- T.CONTRADICT: 1
- T.DISABLE: 1
- T.EAVES: 1
- T.FALSIFY: 1
- T.FORGE: 1
- T.MASK: 1
- T.NOROUTE: 1
- T.OFLOWS: 1
- T.UNAUTH: 3
- T.WEAKIA: 1
- T.WEAKPOL: 1
|
- A:
- A.ADMIN: 4
- A.NET: 4
- A.SECMODE: 3
- O:
- O.CIPHER: 8
- O.FAX_SEC: 6
- O.MANAGE: 7
- O.RESIDUAL: 6
- OE:
- OE.ADMIN: 4
- OE.AUTH: 6
- OE.FUNCTION: 6
- OE.NET: 4
- T:
- T.CONFDATA: 3
- T.RECOVER: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-009-001: 1
- CCMB-2012-009-003: 1
- CCMB-2012-009-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 197: 2
- PKCS:
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- ISO:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- boundary. It does not matter if they are installed on the Operational Environment because they are out of scope for the requirements in this evaluation as explained below. EUA – Extended User Authentication: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /CreationDate: D:20080304130916+09'00'
- /ModDate: D:20080304130916+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 760764
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 56
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |