Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Fuji Xerox ApeosPort-III C4400 DocuCentre-III C4400 Series Controller Software for Asia Pacific Version: Controller ROM Ver. 1.121.3
JISEC-CC-CRP-C0203
Fuji Xerox ApeosPort C7550 I/C6550 I/C5540 I, DocuCentre C7550 I/C6550 I/C5540 I Series Security Kit for Asia Pacific Controller ROM Ver1.102.2
JISEC-CC-CRP-C0053
name Fuji Xerox ApeosPort-III C4400 DocuCentre-III C4400 Series Controller Software for Asia Pacific Version: Controller ROM Ver. 1.121.3 Fuji Xerox ApeosPort C7550 I/C6550 I/C5540 I, DocuCentre C7550 I/C6550 I/C5540 I Series Security Kit for Asia Pacific Controller ROM Ver1.102.2
not_valid_before 2009-02-12 2006-09-07
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0203_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0053_est.pdf
security_level EAL3 EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0203_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0053_erpt.pdf
state/report/pdf_hash 0a5f57b41baa2e6846caceeb53f90b1a31695ad03c45fff40706a306cdc80fab 867b77e8ace86e070e1c9e42342e3c58fcd567f3a878fc883a50b2a708b88c39
state/report/txt_hash a5da6129c1240163b947cb8dc141e21790d0f8c2b2d45d49ffdb082b6d59d4c5 0a13717f157b0da1e86017c5a3e7253e29ad4f8e9e57b1cab5a92a57542e4da7
state/st/pdf_hash 7aa740f439634e617c2c14faec0b3d0a84abf0230ce53cb39d6dd37a85c571ef 8bf4dbadedc96d5795053b6c567da77efb89b90f553197ce01b87d6dc48cc8a2
state/st/txt_hash 47367f74c4e06400d85e6fcbd95029635573726bcb1136abc2b1e5b99f64f9a6 0dbd95ca6126450d85c8089ace0b6dc7c8b33f0b5d2abe6840dcdc378efd24bd
heuristics/cert_id JISEC-CC-CRP-C0203 JISEC-CC-CRP-C0053
heuristics/extracted_versions 1.121.3 1.102.2
heuristics/scheme_data/cert_id C0203 C0053
heuristics/scheme_data/certification_date 2009-02 2006-09
heuristics/scheme_data/claim EAL3 EAL2
heuristics/scheme_data/enhanced
  • product: Fuji Xerox ApeosPort-III C4400 DocuCentre-III C4400 Series Controller Software for Asia Pacific
  • toe_version: Controller ROM Ver. 1.121.3
  • product_type: Control Software for Multi Function Peripheral
  • certification_date: 2009-02-12
  • assurance_level: EAL3
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0203_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0203_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0203_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator痴 Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
  • product: Fuji Xerox ApeosPort C7550 I/C6550 I/C5540 I, DocuCentre C7550 I/C6550 I/C5540 I Series Security Kit for Asia Pacific
  • toe_version: Controller ROM Ver1.102.2
  • product_type: IT Product (data protection function in digital Copier)
  • certification_date: 2006-09-07
  • cc_version: 2.1
  • assurance_level: EAL2
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
  • report_link: https://www.ipa.go.jp/en/security/c0053_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0053_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0053_est.pdf
  • description: PRODUCT DESCRIPTION The TOE is an option for ApeosPort C7550 I/C6550 I/C5540 I, DocuCentre C7550 I/C6550 I/C5540 I Series digital multifunction device with copy, print and scan. Data security kit is a firmware for digital multifunction device protecting the residual document data in HDD from iniquity disclosure after scan, copy and print. This TOE has the following security functions. - HDD overwriting for residual data. - HDD data encryption. - Key operator authentication. - Customer engineer operation restriction.
heuristics/scheme_data/enhanced/assurance_level EAL3 EAL2
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0203_eimg.pdf https://www.ipa.go.jp/en/security/c0053_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2009-02-12 2006-09-07
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator痴 Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security PRODUCT DESCRIPTION The TOE is an option for ApeosPort C7550 I/C6550 I/C5540 I, DocuCentre C7550 I/C6550 I/C5540 I Series digital multifunction device with copy, print and scan. Data security kit is a firmware for digital multifunction device protecting the residual document data in HDD from iniquity disclosure after scan, copy and print. This TOE has the following security functions. - HDD overwriting for residual data. - HDD data encryption. - Key operator authentication. - Customer engineer operation restriction.
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Evaluation Department Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
heuristics/scheme_data/enhanced/product Fuji Xerox ApeosPort-III C4400 DocuCentre-III C4400 Series Controller Software for Asia Pacific Fuji Xerox ApeosPort C7550 I/C6550 I/C5540 I, DocuCentre C7550 I/C6550 I/C5540 I Series Security Kit for Asia Pacific
heuristics/scheme_data/enhanced/product_type Control Software for Multi Function Peripheral IT Product (data protection function in digital Copier)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0203_erpt.pdf https://www.ipa.go.jp/en/security/c0053_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0203_est.pdf https://www.ipa.go.jp/en/security/c0053_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 1.121.3 Controller ROM Ver1.102.2
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0203_it8231.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0053_it6087.html
heuristics/scheme_data/toe_overseas_name Fuji Xerox ApeosPort-III C4400 DocuCentre-III C4400 Series Controller Software for Asia Pacific Controller ROM Ver. 1.121.3 Fuji Xerox ApeosPort C7550 I/C6550 I/C5540 I, DocuCentre C7550I/C6550I/C5540I Series Security Kit for Asia Pacific Controller ROM Ver1.102.2
pdf_data/report_filename c0203_erpt.pdf c0053_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0203-01: 1
  • Certification No. C0203: 1
  • CRP-C0053-01: 1
  • Certification No. C0053: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 1
  • A.SECMODE: 1
  • A.SECMODE: 1
  • A.ADMIN: 1
  • A.NET: 1
pdf_data/report_keywords/cc_claims/T
  • T.RECOVER: 1
  • T.CONFDATA: 1
  • T.DATA_SEC: 1
  • T.COMM_TAP: 1
  • T.CONSUME: 1
  • T.RECOVER: 1
  • T.CONFDATA: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 3
  • EAL2: 3
pdf_data/report_keywords/standard_id/CC
  • CCMB-2006-09-001: 2
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2007-09-004: 2
  • CCIMB-99-032: 2
  • CCIMB-99-033: 2
  • CCIMB-99-031: 1
pdf_data/report_metadata//CreationDate D:20090403181557+09'00' D:20070709164120+09'00'
pdf_data/report_metadata//ModDate D:20090403181557+09'00' D:20070709164120+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 137092 142989
pdf_data/report_metadata/pdf_number_of_pages 24 22
pdf_data/st_filename c0203_est.pdf c0053_est.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.AUDITS: 8
    • O.CIPHER: 5
    • O.COMM_SEC: 7
    • O.FAX_SEC: 4
    • O.MANAGE: 9
    • O.RESIDUAL: 5
    • O.USER: 7
    • O.RESTRICT: 6
  • T:
    • T.RECOVER: 4
    • T.CONFDATA: 3
    • T.DATA_SEC: 3
    • T.COMM_TAP: 4
    • T.CONSUME: 4
  • A:
    • A.ADMIN: 4
    • A.SECMODE: 3
  • OE:
    • OE.ADMIN: 3
    • OE.AUTH: 4
    • OE.COMMS_SEC: 3
    • OE.FUNCTION: 5
    • OE.COMM_SEC: 1
  • O:
    • O.RESIDUAL: 8
    • O.DECIPHER: 8
    • O.MANAGE: 6
  • T:
    • T.RECOVER: 4
    • T.CONFDATA: 3
  • A:
    • A.SECMODE: 4
    • A.ADMIN: 4
    • A.NET: 3
  • R:
    • R.DOCDATA: 2
    • R.CONFDATA: 2
  • OE:
    • OE.AUTH: 4
    • OE.FUNCON: 4
    • OE.ADMIN: 4
    • OE.NET: 6
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 4
  • A.SECMODE: 3
  • A.SECMODE: 4
  • A.ADMIN: 4
  • A.NET: 3
pdf_data/st_keywords/cc_claims/A/A.SECMODE 3 4
pdf_data/st_keywords/cc_claims/O
  • O.AUDITS: 8
  • O.CIPHER: 5
  • O.COMM_SEC: 7
  • O.FAX_SEC: 4
  • O.MANAGE: 9
  • O.RESIDUAL: 5
  • O.USER: 7
  • O.RESTRICT: 6
  • O.RESIDUAL: 8
  • O.DECIPHER: 8
  • O.MANAGE: 6
pdf_data/st_keywords/cc_claims/O/O.MANAGE 9 6
pdf_data/st_keywords/cc_claims/O/O.RESIDUAL 5 8
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 3
  • OE.AUTH: 4
  • OE.COMMS_SEC: 3
  • OE.FUNCTION: 5
  • OE.COMM_SEC: 1
  • OE.AUTH: 4
  • OE.FUNCON: 4
  • OE.ADMIN: 4
  • OE.NET: 6
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 3 4
pdf_data/st_keywords/cc_claims/T
  • T.RECOVER: 4
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 4
  • T.CONSUME: 4
  • T.RECOVER: 4
  • T.CONFDATA: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 3
    • ADV_TDS.1: 3
    • ADV_FSP.3: 1
    • ADV_FSP.2: 2
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.1: 1
    • ALC_DVS.1: 2
    • ALC_DEL.1: 1
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 3
    • ATE_COV.1: 2
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 3
    • ASE_ECD.1: 2
    • ASE_REQ.1: 2
    • ASE_OBJ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ACM:
    • ACM_CAP.2: 5
  • ADO:
    • ADO_DEL.1: 5
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 10
    • ADV_RCR.1: 5
    • ADV_FSP: 1
    • ADV_HLD.1: 4
  • AGD:
    • AGD_ADM.1: 6
    • AGD_USR.1: 4
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 5
    • ATE_IND.2: 4
  • AVA:
    • AVA_SOF.1: 4
    • AVA_VLA.1: 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 3
  • ADV_FSP.1: 3
  • ADV_TDS.1: 3
  • ADV_FSP.3: 1
  • ADV_FSP.2: 2
  • ADV_TDS.2: 1
  • ADV_FSP.1: 10
  • ADV_RCR.1: 5
  • ADV_FSP: 1
  • ADV_HLD.1: 4
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.1 3 10
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 3
  • AGD_PRE.1: 3
  • AGD_ADM.1: 6
  • AGD_USR.1: 4
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_FUN.1: 3
  • ATE_COV.1: 2
  • ATE_COV.1: 4
  • ATE_FUN.1: 5
  • ATE_IND.2: 4
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 2 4
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 3 5
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_SOF.1: 4
  • AVA_VLA.1: 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 6
  • EAL 3: 1
  • EAL2: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.2: 8
    • FAU_STG.1: 8
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 8
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACF.1: 8
    • FDP_IFC.1: 11
    • FDP_IFF.1: 8
    • FDP_RIP.1: 8
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
    • FDP_IFC: 1
  • FIA:
    • FIA_AFL.1: 17
    • FIA_ATD.1: 10
    • FIA_UAU.2: 13
    • FIA_UAU.7: 10
    • FIA_UID.2: 12
    • FIA_USB.1: 7
    • FIA_UAU.1: 4
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1.1: 1
    • FIA_UID.1: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UIA.2: 1
    • FIA_UID: 1
    • FIA_UAU: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 9
    • FMT_MSA.3: 11
    • FMT_MTD.1: 10
    • FMT_SMF.1: 14
    • FMT_SMR.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_COP.1: 14
    • FCS_CKM.4: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_RIP.1: 14
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 15
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 4
    • FIA_UID.2: 16
    • FIA_UID.1: 11
    • FIA_UAU.2: 18
    • FIA_UAU.7: 11
    • FIA_UAU.7.1: 1
  • FMT:
    • FMT_MSA.2: 6
    • FMT_MOF.1: 47
    • FMT_MOF.1.1: 3
    • FMT_SMF.1: 22
    • FMT_SMR.1: 18
    • FMT_MTD.1: 39
    • FMT_MTD.1.1: 3
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 25
    • FPT_RVM.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 12
  • FCS_COP.1: 8
  • FCS_CKM.2: 1
  • FCS_CKM.4: 3
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.1: 15
  • FCS_CKM.1.1: 1
  • FCS_COP.1: 14
  • FCS_CKM.4: 6
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 12 15
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 3 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 8 14
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 12
  • FDP_ACF.1: 8
  • FDP_IFC.1: 11
  • FDP_IFF.1: 8
  • FDP_RIP.1: 8
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_RIP.1: 14
  • FDP_RIP.1.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 8 14
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 17
  • FIA_ATD.1: 10
  • FIA_UAU.2: 13
  • FIA_UAU.7: 10
  • FIA_UID.2: 12
  • FIA_USB.1: 7
  • FIA_UAU.1: 4
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_ATD.1.1: 1
  • FIA_UID.1: 7
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UIA.2: 1
  • FIA_UID: 1
  • FIA_UAU: 1
  • FIA_AFL.1: 15
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UAU.1: 4
  • FIA_UID.2: 16
  • FIA_UID.1: 11
  • FIA_UAU.2: 18
  • FIA_UAU.7: 11
  • FIA_UAU.7.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 17 15
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 13 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 10 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 7 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 12 16
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MOF.1: 9
  • FMT_MSA.1: 9
  • FMT_MSA.3: 11
  • FMT_MTD.1: 10
  • FMT_SMF.1: 14
  • FMT_SMR.1: 14
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 1
  • FMT_MSA.2: 6
  • FMT_MOF.1: 47
  • FMT_MOF.1.1: 3
  • FMT_SMF.1: 22
  • FMT_SMR.1: 18
  • FMT_MTD.1: 39
  • FMT_MTD.1.1: 3
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 9 47
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1.1 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 10 39
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 14 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 14 18
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 10
  • FPT_STM.1.1: 1
  • FPT_RVM.1: 25
  • FPT_RVM.1.1: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 10
pdf_data/st_keywords/side_channel_analysis
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • X509:
    • X.509: 3
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC15408: 2
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2006-09-001: 1
  • CCMB-2007-09-002: 1
  • CCMB-2007-09-003: 1
  • CCMB-2007-09-004: 1
  • CCIMB-99-031: 1
  • CCIMB-99-032: 1
  • CCIMB-99-033: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
    • RC:
      • RC4: 1
      • RC2: 1
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • Triple-DES: 3
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 1
    • Rijndael:
      • Rijndael: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 7
  • RC:
    • RC4: 1
    • RC2: 1
  • AES:
    • AES: 1
  • Rijndael:
    • Rijndael: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 429553
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
  • /ModDate: D:20090312162441+09'00'
  • /CreationDate: D:20090312162441+09'00'
  • /Title: Microsoft Word - 英訳_IT認証8231_Security Target.doc
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Author: kurata-masami
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 227670
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
  • /ModDate: D:20070624153200+09'00'
  • /CreationDate: D:20070624153200+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20090312162441+09'00' D:20070624153200+09'00'
pdf_data/st_metadata//ModDate D:20090312162441+09'00' D:20070624153200+09'00'
pdf_data/st_metadata//Title Microsoft Word - 英訳_IT認証8231_Security Target.doc untitled
pdf_data/st_metadata/pdf_file_size_bytes 429553 227670
pdf_data/st_metadata/pdf_number_of_pages 85 57
dgst 6ac554a72c25dea9 a3f99c28875a7b7d