Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Fuji Xerox ApeosPort-III C4400 DocuCentre-III C4400 Series Controller Software Version: Controller ROM Ver 1.0.8
JISEC-CC-CRP-C0166
Xerox Color C60/C70 Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3
JISEC-CC-CRP-C0462
name Fuji Xerox ApeosPort-III C4400 DocuCentre-III C4400 Series Controller Software Version: Controller ROM Ver 1.0.8 Xerox Color C60/C70 Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3
not_valid_before 2008-05-30 2014-12-25
not_valid_after 2013-01-17 2020-01-06
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/C0166_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0462_est.pdf
security_level EAL3 ALC_FLR.2, EAL3+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/C0166_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0462_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})})
state/report/pdf_hash 93447fa39796b0e009068bf4d9a5f2ea434b62d8ed32d7428b677d32e5eb5e51 c3480070f41b787b13414cf14214d18acbe6130954144205981ab2e62ec3b990
state/report/txt_hash 2c5f8df5d5811b4f27042fe150e85e78326cbeb8c03edc17df6cd71ea52b01df 08e7eb37cc2f73b03fb4040029795e679cd250c24f787f903dec0b2a8d332e26
state/st/pdf_hash 836fdf382a3e5299c703af8136d2f2fdd821c44f9b5d682c124d3f417cf431e5 635cdf346eb4ce86564cc182bcb3dd9b3a8b1e0513827f41d1349a9fe354a6cf
state/st/txt_hash 3ef0bd3f33e18ddb75c5e183b7d56760b23c9e6cd381c48b45211ef35d3c4789 4c28d0a5a844e02bd0ff7550f69d9839ce3d8869ec7d1977bad1dee3ce246740
heuristics/cert_id JISEC-CC-CRP-C0166 JISEC-CC-CRP-C0462
heuristics/extracted_versions 1.0.8 1.200.17, 13.19.3, 67.20.0
heuristics/scheme_data
  • cert_id: C0166
  • supplier: Fuji Xerox Co., Ltd.
  • toe_overseas_name: -----
  • expiration_date: 2013-03
  • claim: EAL3
  • certification_date: 2008-05
  • toe_overseas_link: None
  • toe_japan_name: Fuji Xerox ApeosPort-III C4400 DocuCentre-III C4400 Series Controller Software Controller ROM Ver 1.0.8
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0166_it7185.html
  • enhanced:
    • product: Fuji Xerox ApeosPort-III C4400 DocuCentre-III C4400 Series Controller Software
    • toe_version: Controller ROM Ver 1.0.8
    • product_type: IT product(Control Software for Multi Function Peripheral)
    • certification_date: 2008-05-30
    • cc_version: 2.3
    • assurance_level: EAL3
    • vendor: Fuji Xerox Co., Ltd.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/C0166_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/C0166_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, and fax functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - System Administrator's Security Management - Customer Engineer Operation Restriction - FAX Flow Security
  • cert_id: C0462
  • supplier: Fuji Xerox Co., Ltd.
  • toe_overseas_name: Xerox Color C60/C70 Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3
  • expiration_date: 2020-01
  • claim: EAL3+ ALC_FLR.2 PP
  • certification_date: 2014-12
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0462_it4496.html
  • toe_japan_name: -----
  • enhanced:
    • product: Xerox Color C60/C70
    • toe_version: Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3
    • product_type: Multi Function Device
    • certification_date: 2014-12-25
    • cc_version: 3.1 Release4
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • protection_profile: IEEE Std 2600.1™-2009
    • vendor: Fuji Xerox Co., Ltd.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/c0462_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0462_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0462_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/cert_id C0166 C0462
heuristics/scheme_data/certification_date 2008-05 2014-12
heuristics/scheme_data/claim EAL3 EAL3+ ALC_FLR.2 PP
heuristics/scheme_data/enhanced
  • product: Fuji Xerox ApeosPort-III C4400 DocuCentre-III C4400 Series Controller Software
  • toe_version: Controller ROM Ver 1.0.8
  • product_type: IT product(Control Software for Multi Function Peripheral)
  • certification_date: 2008-05-30
  • cc_version: 2.3
  • assurance_level: EAL3
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/C0166_erpt.pdf
  • target_link: https://www.ipa.go.jp/en/security/C0166_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, and fax functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - System Administrator's Security Management - Customer Engineer Operation Restriction - FAX Flow Security
  • product: Xerox Color C60/C70
  • toe_version: Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3
  • product_type: Multi Function Device
  • certification_date: 2014-12-25
  • cc_version: 3.1 Release4
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1™-2009
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0462_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0462_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0462_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/assurance_level EAL3 EAL3 Augmented with ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 2.3 3.1 Release4
heuristics/scheme_data/enhanced/certification_date 2008-05-30 2014-12-25
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, and fax functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - System Administrator's Security Management - Customer Engineer Operation Restriction - FAX Flow Security PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/product Fuji Xerox ApeosPort-III C4400 DocuCentre-III C4400 Series Controller Software Xerox Color C60/C70
heuristics/scheme_data/enhanced/product_type IT product(Control Software for Multi Function Peripheral) Multi Function Device
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/C0166_erpt.pdf https://www.ipa.go.jp/en/security/c0462_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/C0166_est.pdf https://www.ipa.go.jp/en/security/c0462_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver 1.0.8 Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3
heuristics/scheme_data/expiration_date 2013-03 2020-01
heuristics/scheme_data/supplier Fuji Xerox Co., Ltd. Fuji Xerox Co., Ltd.
heuristics/scheme_data/toe_japan_name Fuji Xerox ApeosPort-III C4400 DocuCentre-III C4400 Series Controller Software Controller ROM Ver 1.0.8 -----
heuristics/scheme_data/toe_overseas_link None https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0462_it4496.html
heuristics/scheme_data/toe_overseas_name ----- Xerox Color C60/C70 Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3
pdf_data/report_filename C0166_erpt.pdf c0462_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • Certification No. C0166: 1
  • CRP-C0462-01: 1
  • Certification No. C0462: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 1
  • A.SECMODE: 1
  • A.NET: 1
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
pdf_data/report_keywords/cc_claims/A/A.ADMIN 1 2
pdf_data/report_keywords/cc_claims/T
  • T.RECOVER: 1
  • T.CONFDATA: 1
  • T.DOC: 4
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 3
  • EAL3: 4
  • EAL3 augmented: 2
pdf_data/report_keywords/cc_security_level/EAL/EAL3 3 4
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • IPsec:
    • IPsec: 7
pdf_data/report_keywords/eval_facility/ITSC/Information Technology Security Center 3 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 5
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2005-08-001: 2
  • CCMB-2005-08-002: 2
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-004: 2
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 15
pdf_data/report_metadata
  • pdf_file_size_bytes: 315530
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /CreationDate: D:20081107173258+09'00'
  • /Author: IPA/JISEC
  • /Creator: Word 用 Acrobat PDFMaker 8.0
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • /ModDate: D:20081107173323+09'00'
  • /Company: IPA
  • /Manager: IPA
  • /SourceModified: D:20081107062522
  • /Title: CRP-e
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 377540
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
  • /CreationDate: D:20150217171824+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150217171848+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20081107173258+09'00' D:20150217171824+09'00'
pdf_data/report_metadata//Creator Word 用 Acrobat PDFMaker 8.0 Microsoft® Word 2010
pdf_data/report_metadata//ModDate D:20081107173323+09'00' D:20150217171848+09'00'
pdf_data/report_metadata//Producer Acrobat Distiller 8.0.0 (Windows) Microsoft® Word 2010
pdf_data/report_metadata/pdf_file_size_bytes 315530 377540
pdf_data/report_metadata/pdf_is_encrypted False True
pdf_data/report_metadata/pdf_number_of_pages 23 37
pdf_data/st_filename C0166_est.pdf c0462_est.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.CIPHER: 8
    • O.FAX_SEC: 6
    • O.MANAGE: 7
    • O.RESIDUAL: 7
  • T:
    • T.RECOVER: 4
    • T.CONFDATA: 3
  • A:
    • A.ADMIN: 4
    • A.SECMODE: 3
    • A.NET: 4
  • OE:
    • OE.ADMIN: 4
    • OE.AUTH: 6
    • OE.FUNCTION: 6
    • OE.NET: 4
  • D:
    • D.FUNC: 53
    • D.DOC: 62
    • D.PROT: 3
    • D.CONF: 13
  • O:
    • O.AUDIT_STORAGE: 10
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 8
    • O.DOC: 16
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 14
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
  • T:
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
    • T.CONF: 6
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 12
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 4
  • A.SECMODE: 3
  • A.NET: 4
  • A.ACCESS: 3
  • A.USER: 3
  • A.ADMIN: 6
pdf_data/st_keywords/cc_claims/A/A.ADMIN 4 6
pdf_data/st_keywords/cc_claims/O
  • O.CIPHER: 8
  • O.FAX_SEC: 6
  • O.MANAGE: 7
  • O.RESIDUAL: 7
  • O.AUDIT_STORAGE: 10
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 8
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 4
  • OE.AUTH: 6
  • OE.FUNCTION: 6
  • OE.NET: 4
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 12
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 4 6
pdf_data/st_keywords/cc_claims/T
  • T.RECOVER: 4
  • T.CONFDATA: 3
  • T.DOC: 6
  • T.FUNC: 3
  • T.PROT: 3
  • T.CONF: 6
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 6
    • ACM_SCP.1: 6
    • ACM_SCM.1: 1
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 8
  • ADV:
    • ADV_FSP.1: 13
    • ADV_RCR.1: 6
    • ADV_HLD.1: 3
    • ADV_HLD.2: 4
  • AGD:
    • AGD_ADM.1: 9
    • AGD_USR.1: 8
  • ALC:
    • ALC_DVS.1: 6
  • ATE:
    • ATE_COV.2: 4
    • ATE_FUN.1: 7
    • ATE_IND.2: 5
    • ATE_DPT.1: 4
    • ATE_COV: 1
  • AVA:
    • AVA_MSU.1: 5
    • AVA_SOF.1: 5
    • AVA_VLA.1: 5
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.2: 5
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.1: 13
  • ADV_RCR.1: 6
  • ADV_HLD.1: 3
  • ADV_HLD.2: 4
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_ADM.1: 9
  • AGD_USR.1: 8
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.1: 6
  • ALC_FLR.2: 5
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 6 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 4
  • ATE_FUN.1: 7
  • ATE_IND.2: 5
  • ATE_DPT.1: 4
  • ATE_COV: 1
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 4 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.1 4 1
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 7 1
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 5 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_MSU.1: 5
  • AVA_SOF.1: 5
  • AVA_VLA.1: 5
  • AVA_VAN.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 9
  • EAL 3: 1
  • EAL3: 2
  • EAL 3: 1
  • EAL3 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL3 9 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 14
    • FCS_CKM.1.1: 1
    • FCS_COP: 1
    • FCS_CKM.4: 4
    • FCS_COP.1: 13
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
  • FDP:
    • FDP_ITC.2: 1
    • FDP_IFC.1: 13
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 11
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 17
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 8
    • FIA_UAU.7: 13
    • FIA_UAU.7.1: 1
    • FIA_UID.2: 14
    • FIA_UID.2.1: 1
    • FIA_UID: 1
    • FIA_UAU: 1
    • FIA_AFL: 1
  • FMT:
    • FMT_MSA.2: 4
    • FMT_MSA.3: 1
    • FMT_MOF.1: 17
    • FMT_MOF.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMR.1: 14
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 3
    • FMT_MTD: 1
    • FMT_SMT.1: 1
  • FPT:
    • FPT_RVM.1: 27
    • FPT_RVM.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 14
    • FAU_GEN.2: 9
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_STG.1: 11
    • FAU_STG.4: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
    • FCS_COP: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 98
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ACF.1: 90
    • FDP_RIP.1: 9
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 8
    • FDP_ACF.1.1: 8
    • FDP_ACF.1.2: 8
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 8
  • FIA:
    • FIA_AFL.1: 35
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.1: 18
    • FIA_UAU.7: 10
    • FIA_UID.1: 22
    • FIA_USB.1: 9
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_SMR.1: 45
    • FMT_MOF.1: 11
    • FMT_MSA.1: 90
    • FMT_MSA.3: 90
    • FMT_MTD.1: 23
    • FMT_SMF.1: 38
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 8
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 16
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 14
  • FCS_CKM.1.1: 1
  • FCS_COP: 1
  • FCS_CKM.4: 4
  • FCS_COP.1: 13
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_CKM.1: 12
  • FCS_COP.1: 11
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 14 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 4 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 13 11
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ITC.2: 1
  • FDP_IFC.1: 13
  • FDP_IFC.1.1: 1
  • FDP_IFF.1: 11
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF.1.6: 1
  • FDP_RIP.1: 12
  • FDP_RIP.1.1: 1
  • FDP_ACC: 4
  • FDP_ACC.1: 98
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACF.1: 90
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 8
  • FDP_ACF.1.1: 8
  • FDP_ACF.1.2: 8
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 13 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 12 9
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UAU.1: 3
  • FIA_UAU.2: 17
  • FIA_UAU.2.1: 1
  • FIA_UID.1: 8
  • FIA_UAU.7: 13
  • FIA_UAU.7.1: 1
  • FIA_UID.2: 14
  • FIA_UID.2.1: 1
  • FIA_UID: 1
  • FIA_UAU: 1
  • FIA_AFL: 1
  • FIA_AFL.1: 35
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 18
  • FIA_UAU.7: 10
  • FIA_UID.1: 22
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID.2: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 13 35
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 1 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 1 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 3 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 13 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 8 22
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 14 1
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.2: 4
  • FMT_MSA.3: 1
  • FMT_MOF.1: 17
  • FMT_MOF.1.1: 1
  • FMT_SMF.1: 12
  • FMT_SMR.1: 14
  • FMT_MTD.1: 10
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 3
  • FMT_MTD: 1
  • FMT_SMT.1: 1
  • FMT_SMR.1: 45
  • FMT_MOF.1: 11
  • FMT_MSA.1: 90
  • FMT_MSA.3: 90
  • FMT_MTD.1: 23
  • FMT_SMF.1: 38
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 8
  • FMT_MSA.3.1: 8
  • FMT_MSA.3.2: 8
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 17 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 3 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 1 90
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 10 23
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 12 38
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 14 45
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_RVM.1: 27
  • FPT_RVM.1.1: 1
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 16
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 11
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 6
      • SHA-1: 4
    • SHA2:
      • SHA256: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408: 4
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • X509:
    • X.509: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2005-08-001: 1
  • CCMB-2005-08-002: 1
  • CCMB-2005-08-003: 1
  • CCMB-2005-08-004: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
    • Rijndael:
      • Rijndael: 1
  • AES_competition:
    • AES:
      • AES: 10
  • DES:
    • 3DES:
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 1
  • Rijndael:
    • Rijndael: 1
  • AES:
    • AES: 10
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 1 10
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_metadata//Author kurata-masami
pdf_data/st_metadata//CreationDate D:20081028145213+09'00' D:20150212093947+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2 PScript5.dll Version 5.2.2
pdf_data/st_metadata//ModDate D:20081105151944+09'00' D:20150212093947+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 6.0 (Windows) Acrobat Distiller 10.1.13 (Windows)
pdf_data/st_metadata//Title Microsoft Word - C0166 ST_英訳.doc
pdf_data/st_metadata/pdf_file_size_bytes 399343 725871
pdf_data/st_metadata/pdf_number_of_pages 57 139
dgst 73f8219a22a1211b d5444c5b63fb1db0