Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Trend Micro TippingPoint Security Management System (SMS) v6.2.0
ISCB-5-RPT-C133-CR-v1
Xerox VersaLink B605/B615 Multifunction Printer models with Fax Controller ROM Ver. 1.13.32
JISEC-CC-CRP-C0610-01-2018
name Trend Micro TippingPoint Security Management System (SMS) v6.2.0 Xerox VersaLink B605/B615 Multifunction Printer models with Fax Controller ROM Ver. 1.13.32
category Network and Network-Related Devices and Systems Multi-Function Devices
scheme MY JP
status active archived
not_valid_after 03.05.2029 02.08.2023
not_valid_before 03.05.2024 02.08.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C133-CERTIFICATE-V1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0610_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C133-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0610_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Trend%20Micro%20SMS%206.2.0%20ST-v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0610_est.pdf
manufacturer Trend Micro Incorporated. Xerox Corporation
manufacturer_web https://www.trendmicro.com https://www.xerox.com
security_level EAL2 EAL2+, ALC_FLR.2
dgst 633dc7480c953157 919e17196c7c130f
heuristics/cert_id ISCB-5-RPT-C133-CR-v1 JISEC-CC-CRP-C0610-01-2018
heuristics/cpe_matches {} cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*, cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 6.2.0 1.13.32
heuristics/scheme_data
  • cert_no: 2024-003-C133
  • certification_date: 03.05.2024
  • developer: Trend Micro Incorporated.
  • enhanced:
    • assurance_level: EAL2
    • category: Network and Network-Related Devices and Systems
    • cert_id: C133
    • certification_date: 03.05.2024
    • developer: 11305 Alterra ParkwayAustin, TX 78758Phone: +1 (817) 569-8900Toll-free: (888) 762-8736https://www.trendmicro.com/en_za/contact.html
    • expiration_date: 03.05.2029
    • mutual_recognition: CCRA
    • product: Trend Micro TippingPoint Security Management System (SMS) v6.2.0
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C133/ISCB-5-RPT-C133-CR-v1.pdf
    • scope: The TOE provides centralized control for managing large-scale deployments of the following TippingPoint products: TippingPoint NX Series Next-Generation Intrusion Prevention System (IPS)—uses a combination of technologies, including deep packet inspection, threat reputation, and advanced malware analysis, on a flow-by-flow basis to detect and prevent attacks on the network. TippingPoint Threat Protection System (TPS)—a network security platform that offers comprehensive threat protection, shielding network vulnerabilities, blocking exploits, and defending against known and zero-day attacks. The TOE also provides capabilities for communicating threat data with TippingPoint Deep Discovery (DD) devices. TippingPoint DD is a threat protection platform providing capabilities to detect, analyze and respond to network-based attacks.
    • status: Valid
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C133/Trend_Micro_SMS_6.2.0_ST-v1.0.pdf
    • type: Network and Network-Related Devices and Systems
  • expiration_date: 03.05.2029
  • level: EAL2
  • product: Trend Micro TippingPoint Security Management System (SMS) v6.2.0
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/171
  • cert_id: JISEC-CC-CRP-C0610
  • certification_date: 01.08.2018
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_id: JISEC-CC-CRP-C0610
    • cert_link: https://www.ipa.go.jp/en/security/c0610_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE Security functions To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Xerox VersaLink B605/B615 Multifunction Printer models with Fax
    • product_type: Multi-Function Device
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0610_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0610_est.pdf
    • toe_version: Controller ROM Ver. 1.13.32
    • vendor: Xerox Corporation
  • expiration_date: 01.09.2023
  • supplier: Xerox Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0610_it7632.html
  • toe_overseas_name: Xerox VersaLink B605/B615 Multifunction Printer models with Fax Controller ROM Ver. 1.13.32
heuristics/protection_profiles {} 43ce79b420f23a00
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf
pdf_data/cert_filename ISCB-5-CERT-C133-CERTIFICATE-V1.pdf c0610_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0610-01-2018: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/cert_metadata
  • /CreationDate: D:20240506114507+08'00'
  • /Creator: TOSHIBA e-STUDIO3525AC
  • /ModDate: D:20240510121415+08'00'
  • /Producer: SECnvtToPDF V1.0
  • pdf_file_size_bytes: 815976
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20180822142921+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180822143055+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 150854
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename ISCB-5-RPT-C133-CR-v1.pdf c0610_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C133-CR-V1: 33
    • ISCB-5-RPT-C133-CR-v1: 2
  • JP:
    • JISEC-CC-CRP-C0610-01-2018: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 6
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 1
    • FAU_SAR.3: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.5: 1
    • FIA_UAU.7: 1
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 3
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 1
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 1
  • FPT:
    • FPT_ITT.1: 1
  • FTA:
    • FTA_MCS.1: 1
    • FTA_SSL.1: 1
    • FTA_TAB.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.MANAGE: 1
    • A.PROTECT: 1
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 17
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 1
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 4
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 5
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 3
  • IPsec:
    • IPsec: 5
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20240510051519Z00'00'
  • /Creator: Word
  • /ModDate: D:20240510051519Z00'00'
  • /Producer: macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext
  • /Title: ISCB-5-RPT-C133-CR-v1
  • pdf_file_size_bytes: 1537825
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
  • /CreationDate: D:20181005170205+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20181005170228+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 421071
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
pdf_data/st_filename Trend Micro SMS 6.2.0 ST-v1.0.pdf c0610_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL2: 1
  • EAL:
    • EAL 2: 1
    • EAL2: 2
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 11
    • ADV_FSP.2: 12
    • ADV_TDS.1: 12
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.2: 9
    • ALC_CMS.2: 7
    • ALC_DEL.1: 6
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 11
    • ASE_INT.1: 13
    • ASE_OBJ.2: 11
    • ASE_REQ.2: 14
    • ASE_SPD.1: 8
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 9
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR: 6
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_COP.1: 2
    • FCS_COP.1.1: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 2
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_SOS: 2
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 8
    • FIA_UAU.1: 4
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 6
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 3
    • FMT_MTD.1: 17
    • FMT_MTD.1.1: 6
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 2
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_STM: 3
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_MCS: 2
    • FTA_MCS.1: 6
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_SSL: 6
    • FTA_SSL.1: 6
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 1
    • FTA_TAH: 2
    • FTA_TAH.1: 6
    • FTA_TAH.1.1: 1
    • FTA_TAH.1.2: 1
    • FTA_TAH.1.3: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 2
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_COP: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 75
    • FDP_ACC.1.1: 6
    • FDP_ACF.1: 68
    • FDP_ACF.1.1: 6
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 6
    • FDP_IFC: 1
    • FDP_IFC.1: 6
    • FDP_IFF: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 19
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 16
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 22
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 75
    • FMT_MSA.1.1: 6
    • FMT_MSA.3: 68
    • FMT_MSA.3.1: 6
    • FMT_MSA.3.2: 6
    • FMT_MTD.1: 23
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 34
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 39
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 16
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.MANAGE: 2
    • A.PROTECT: 3
  • O:
    • O.AUDIT: 6
    • O.AUDIT_REVIEW: 3
    • O.I_AND_A: 8
    • O.LOGIN_BANNER: 3
    • O.LOGIN_HISTORY: 5
    • O.PASSWORD_CONTROLS: 3
    • O.PROTECTED: 1
    • O.PROTECTED_COMMS: 4
    • O.SECURITY_MANAGEMENT: 3
    • O.SESSION_LIMITS: 5
    • O.SESSION_SECURITY: 3
    • O.STORAGE: 5
    • O.THROTTLE: 3
  • OE:
    • OE.PERSONNEL: 2
    • OE.PHYSICAL: 2
  • T:
    • T.BRUTE_FORCE: 3
    • T.INAPPRORIATE_USE: 2
    • T.INTEGRITY_COMPROMISE: 3
    • T.NETWORK_COMPROMISE: 2
    • T.NO_ACCOUNTABILITY: 3
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_ACTIVITY: 3
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 13
    • D.DOC: 41
    • D.FUNC: 19
    • D.PROT: 4
  • O:
    • O.AUDIT: 8
    • O.AUDIT_ACCESS: 10
    • O.AUDIT_STORAGE: 10
    • O.CIPHER: 8
    • O.CONF: 16
    • O.DOC: 16
    • O.FUNC: 8
    • O.INTERFACE: 8
    • O.PROT: 8
    • O.SOFTWARE: 8
    • O.USER: 14
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_STORAGE: 2
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 2
    • SHA2:
      • SHA-2: 3
      • SHA256: 7
      • SHA384: 2
      • SHA512: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 11
  • TLS:
    • TLS:
      • TLS: 12
      • TLS 1.2: 1
      • TLS v1.0: 2
      • TLS v1.1: 2
      • TLS v1.2: 3
  • TLS:
    • TLS:
      • TLS: 20
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS PUB 180-2: 2
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
  • X509:
    • X.509: 3
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • is set to [authority of user to only Store Print], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Embedded Web Server Embedded Web Server is a: 1
pdf_data/st_metadata
  • /Author: Apted, Tony J. [RA]
  • /CreationDate: D:20240403093836+08'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240403093836+08'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: Third Party Protected Information
  • /Title: Trend Micro SMS
  • pdf_file_size_bytes: 852877
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 45
  • /CreationDate: D:20180831095202+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20180831100535+09'00'
  • /Producer: Acrobat Distiller 10.1.16 (Windows)
  • /Subject: Security Target
  • /Title: Xerox VersaLink B605/B615 Color Multifunction Printer
  • pdf_file_size_bytes: 686687
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 120
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different