Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Xerox D95 Copier/Printer Version: Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0
JISEC-CC-CRP-C0361
Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software Version: Controller ROM Ver. 1.0.13
JISEC-CC-CRP-C0201
name Xerox D95 Copier/Printer Version: Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0 Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software Version: Controller ROM Ver. 1.0.13
not_valid_before 2012-07-30 2009-02-12
not_valid_after 2017-08-03 2013-01-17
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0361_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0201_est.pdf
security_level ALC_FLR.2, EAL3+ EAL3
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0361_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0201_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})})
state/report/pdf_hash 300035c7232a2672c5299e781c783c86c6bb069a57759872e1fc7bb249ddd55a 7e93ba8373de55776afcfb6cea4e2899eb50be5cf4414ed09d914670596ebae1
state/report/txt_hash 69225cea5b5ca3e6bb38fe28935650f28caaff89776c9da3b6576ce1cbd2e5fe 56760cf3b8a54763fed28384ef74eb935083e2c4e18ccab316f56a7a573e2be3
state/st/pdf_hash dcc769336439e1badf329050223b61b7285536bec9c36f3ca4decc58a24b9080 bbe3c93cd09b258fd50cde188a9d9f55915b1995254361b9322e54ae3108257a
state/st/txt_hash d047e0209b7c807bdaf20a57e0c1a428efd9a24aa104511b9fc4f875d10d62b9 47ffe0723fc6b990b94aa5c26a02a7081d2b25203aa8f5f67e22497e1473c088
heuristics/cert_id JISEC-CC-CRP-C0361 JISEC-CC-CRP-C0201
heuristics/extracted_versions 9.8.0, 83.25.0, 1.201.1, 13.10.0 1.0.13
heuristics/scheme_data
  • cert_id: C0361
  • supplier: Fuji Xerox Co., Ltd.
  • toe_overseas_name: Xerox D95 Copier/Printer Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0
  • expiration_date: 2017-08
  • claim: EAL3+ ALC_FLR.2 PP
  • certification_date: 2012-07
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0361_it1379.html
  • toe_japan_name: -----
  • enhanced:
    • product: Xerox D95 Copier/Printer
    • toe_version: Controller+PS ROM Ver. 1.201.1 IOT ROM Ver. 83.25.0 IIT ROM Ver. 9.8.0 ADF ROM Ver. 13.10.0
    • product_type: Multi Function Device
    • certification_date: 2012-07-30
    • cc_version: 3.1
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • protection_profile: IEEE Std 2600.1-2009
    • vendor: Fuji Xerox Co., Ltd.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/c0361_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0361_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0361_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
  • cert_id: C0201
  • supplier: Fuji Xerox Co., Ltd.
  • toe_overseas_name: -----
  • expiration_date: 2013-03
  • claim: EAL3
  • certification_date: 2009-02
  • toe_overseas_link: None
  • toe_japan_name: Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software Controller ROM Ver. 1.0.13
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0201_it8229.html
  • enhanced:
    • product: Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software
    • toe_version: Controller ROM Ver. 1.0.13
    • product_type: Control Software for Multi Function Peripheral
    • certification_date: 2009-02-12
    • assurance_level: EAL3
    • vendor: Fuji Xerox Co., Ltd.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/c0201_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0201_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0201_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator痴 Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
heuristics/scheme_data/cert_id C0361 C0201
heuristics/scheme_data/certification_date 2012-07 2009-02
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP EAL3
heuristics/scheme_data/enhanced
  • product: Xerox D95 Copier/Printer
  • toe_version: Controller+PS ROM Ver. 1.201.1 IOT ROM Ver. 83.25.0 IIT ROM Ver. 9.8.0 ADF ROM Ver. 13.10.0
  • product_type: Multi Function Device
  • certification_date: 2012-07-30
  • cc_version: 3.1
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1-2009
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0361_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0361_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0361_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
  • product: Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software
  • toe_version: Controller ROM Ver. 1.0.13
  • product_type: Control Software for Multi Function Peripheral
  • certification_date: 2009-02-12
  • assurance_level: EAL3
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0201_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0201_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0201_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator痴 Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
heuristics/scheme_data/enhanced/assurance_level EAL3 Augmented with ALC_FLR.2 EAL3
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0361_eimg.pdf https://www.ipa.go.jp/en/security/c0201_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2012-07-30 2009-02-12
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data. PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator痴 Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
heuristics/scheme_data/enhanced/product Xerox D95 Copier/Printer Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software
heuristics/scheme_data/enhanced/product_type Multi Function Device Control Software for Multi Function Peripheral
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0361_erpt.pdf https://www.ipa.go.jp/en/security/c0201_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0361_est.pdf https://www.ipa.go.jp/en/security/c0201_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller+PS ROM Ver. 1.201.1 IOT ROM Ver. 83.25.0 IIT ROM Ver. 9.8.0 ADF ROM Ver. 13.10.0 Controller ROM Ver. 1.0.13
heuristics/scheme_data/expiration_date 2017-08 2013-03
heuristics/scheme_data/supplier Fuji Xerox Co., Ltd. Fuji Xerox Co., Ltd.
heuristics/scheme_data/toe_japan_name ----- Fuji Xerox ApeosPort-III 7000/6000/5000 DocuCentre-III 7000/6000/5000 Series Controller Software Controller ROM Ver. 1.0.13
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0361_it1379.html None
heuristics/scheme_data/toe_overseas_name Xerox D95 Copier/Printer Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0 -----
pdf_data/report_filename c0361_erpt.pdf c0201_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0361-01: 1
  • Certification No. C0361: 1
  • CRP-C0201-01: 1
  • Certification No. C0201: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.ADMIN: 1
  • A.SECMODE: 1
pdf_data/report_keywords/cc_claims/A/A.ADMIN 2 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 4
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
  • T.RECOVER: 1
  • T.CONFDATA: 1
  • T.DATA_SEC: 1
  • T.COMM_TAP: 1
  • T.CONSUME: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 2
  • EAL3: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL3 4 3
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
    • print data from the printer driver of user client to the MFD. Therefore, the following function is out of scope of the evaluated security functions. - Printer driver requires a user to enter user ID and password: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL 3.0: 1
      • SSL: 1
    • TLS:
      • TLS 1.0: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
  • CCMB-2006-09-001: 2
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2007-09-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 9
pdf_data/report_metadata
  • pdf_file_size_bytes: 335728
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
  • /CreationDate: D:20121031165654+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20121031165721+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 138447
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
  • /ModDate: D:20090401163114+09'00'
  • /CreationDate: D:20090401163114+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20121031165654+09'00' D:20090401163114+09'00'
pdf_data/report_metadata//ModDate D:20121031165721+09'00' D:20090401163114+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 6.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 335728 138447
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 37 24
pdf_data/st_filename c0361_est.pdf c0201_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.FUNC: 59
    • D.DOC: 61
    • D.PROT: 3
    • D.CONF: 13
  • O:
    • O.AUDIT_STORAGE: 9
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 9
    • O.DOC: 16
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 14
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
    • O.AUDIT_STORAG: 1
  • T:
    • T.DOC: 7
    • T.CONF: 7
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 12
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
  • O:
    • O.AUDITS: 8
    • O.CIPHER: 5
    • O.COMM_SEC: 7
    • O.FAX_SEC: 4
    • O.MANAGE: 9
    • O.RESIDUAL: 5
    • O.USER: 7
    • O.RESTRICT: 6
  • T:
    • T.RECOVER: 4
    • T.CONFDATA: 3
    • T.DATA_SEC: 3
    • T.COMM_TAP: 4
    • T.CONSUME: 4
  • A:
    • A.ADMIN: 4
    • A.SECMODE: 3
  • OE:
    • OE.ADMIN: 3
    • OE.AUTH: 4
    • OE.COMMS_SEC: 3
    • OE.FUNCTION: 5
    • OE.COMM_SEC: 1
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 3
  • A.USER: 3
  • A.ADMIN: 6
  • A.ADMIN: 4
  • A.SECMODE: 3
pdf_data/st_keywords/cc_claims/A/A.ADMIN 6 4
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT_STORAGE: 9
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 9
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDIT_STORAG: 1
  • O.AUDITS: 8
  • O.CIPHER: 5
  • O.COMM_SEC: 7
  • O.FAX_SEC: 4
  • O.MANAGE: 9
  • O.RESIDUAL: 5
  • O.USER: 7
  • O.RESTRICT: 6
pdf_data/st_keywords/cc_claims/O/O.CIPHER 9 5
pdf_data/st_keywords/cc_claims/O/O.USER 14 7
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 12
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
  • OE.ADMIN: 3
  • OE.AUTH: 4
  • OE.COMMS_SEC: 3
  • OE.FUNCTION: 5
  • OE.COMM_SEC: 1
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 6 3
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 7
  • T.CONF: 7
  • T.FUNC: 3
  • T.PROT: 3
  • T.RECOVER: 4
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 4
  • T.CONSUME: 4
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 1
  • ADV_ARC.1: 3
  • ADV_FSP.1: 3
  • ADV_TDS.1: 3
  • ADV_FSP.3: 1
  • ADV_FSP.2: 2
  • ADV_TDS.2: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 1 3
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 1 3
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 1 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 5
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_CMC.3: 1
  • ALC_CMS.1: 1
  • ALC_DVS.1: 2
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 1 2
pdf_data/st_keywords/cc_sar/ASE
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
  • ASE_CCL.1: 1
  • ASE_INT.1: 3
  • ASE_ECD.1: 2
  • ASE_REQ.1: 2
  • ASE_OBJ.2: 2
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 1 3
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 1 2
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 1
  • ATE_FUN.1: 3
  • ATE_COV.1: 2
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 2
  • EAL 3: 1
  • EAL3 augmented: 1
  • EAL3: 6
  • EAL 3: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL3 2 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.2: 9
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_STG.1: 11
    • FAU_STG.4: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
    • FCS_COP: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ACC.1: 86
    • FDP_ACF.1: 80
    • FDP_RIP.1: 9
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 7
    • FDP_ACF.1.1: 7
    • FDP_ACF.1.2: 7
    • FDP_ACF.1.3: 7
    • FDP_ACF.1.4: 7
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 7
  • FIA:
    • FIA_AFL.1: 35
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.1: 18
    • FIA_UAU.7: 10
    • FIA_UID.2: 21
    • FIA_UID.1: 11
    • FIA_USB.1: 9
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UID: 4
  • FMT:
    • FMT_SMR.1: 42
    • FMT_MOF.1: 11
    • FMT_MSA.1: 80
    • FMT_MSA.3: 80
    • FMT_MTD.1: 23
    • FMT_SMF.1: 36
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 7
    • FMT_MSA.3.1: 7
    • FMT_MSA.3.2: 7
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 15
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.2: 8
    • FAU_STG.1: 8
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 8
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACF.1: 8
    • FDP_IFC.1: 11
    • FDP_IFF.1: 8
    • FDP_RIP.1: 8
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
    • FDP_IFC: 1
  • FIA:
    • FIA_AFL.1: 17
    • FIA_ATD.1: 10
    • FIA_UAU.2: 13
    • FIA_UAU.7: 10
    • FIA_UID.2: 12
    • FIA_USB.1: 7
    • FIA_UAU.1: 4
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1.1: 1
    • FIA_UID.1: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UIA.2: 1
    • FIA_UID: 1
    • FIA_UAU: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 9
    • FMT_MSA.3: 11
    • FMT_MTD.1: 10
    • FMT_SMF.1: 14
    • FMT_SMR.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN: 1
  • FAU_GEN.1: 15
  • FAU_GEN.2: 9
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_STG.1: 11
  • FAU_STG.4: 9
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 7
  • FAU_SAR.2: 8
  • FAU_STG.1: 8
  • FAU_STG.4: 8
  • FAU_GEN.1.2: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 2
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 15 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 7
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 9 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 11 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 9 8
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 12
  • FCS_COP.1: 11
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
  • FCS_CKM.1: 12
  • FCS_COP.1: 8
  • FCS_CKM.2: 1
  • FCS_CKM.4: 3
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 11 8
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 4
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACC.1: 86
  • FDP_ACF.1: 80
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 7
  • FDP_ACF.1.1: 7
  • FDP_ACF.1.2: 7
  • FDP_ACF.1.3: 7
  • FDP_ACF.1.4: 7
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 7
  • FDP_ACC.1: 12
  • FDP_ACF.1: 8
  • FDP_IFC.1: 11
  • FDP_IFF.1: 8
  • FDP_RIP.1: 8
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
  • FDP_IFC: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 86 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 80 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 7 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 9 8
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 35
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 18
  • FIA_UAU.7: 10
  • FIA_UID.2: 21
  • FIA_UID.1: 11
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID: 4
  • FIA_AFL.1: 17
  • FIA_ATD.1: 10
  • FIA_UAU.2: 13
  • FIA_UAU.7: 10
  • FIA_UID.2: 12
  • FIA_USB.1: 7
  • FIA_UAU.1: 4
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_ATD.1.1: 1
  • FIA_UID.1: 7
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UIA.2: 1
  • FIA_UID: 1
  • FIA_UAU: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 35 17
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 4 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 4 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 11 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 18 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 4 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 11 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 21 12
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 9 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 11 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 80 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 7 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 80 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 7 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 7 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 23 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 36 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 42 14
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 15
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 11
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1: 10
  • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 11 10
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 8
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 1
  • FTP_TRP.1.3: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Job Flow A function to enable efficient standard: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • other:
    • cold boot: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
  • CCMB-2006-09-001: 1
  • CCMB-2007-09-002: 1
  • CCMB-2007-09-003: 1
  • CCMB-2007-09-004: 1
pdf_data/st_metadata//Author kurata-masami
pdf_data/st_metadata//CreationDate D:20121031140404+09'00' D:20090325111324+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 PScript5.dll Version 5.2
pdf_data/st_metadata//ModDate D:20121031140404+09'00' D:20090325111324+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 10.1.4 (Windows) Acrobat Distiller 6.0 (Windows)
pdf_data/st_metadata//Title Microsoft Word - 英訳_IT認証8229_Security Target.doc
pdf_data/st_metadata/pdf_file_size_bytes 621639 427134
pdf_data/st_metadata/pdf_number_of_pages 134 85
dgst 6614aa46346b6bec 3b5619e0300d8e19