Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Fuji Xerox ApeosPort-IV C5570/C4470/C3370/C2270 DocuCentre-IV C5570/C4470/C3370/C2270 Series Controller Software Version:Controller ROM Ver.1.0.6
JISEC-CC-CRP-C0236
Fuji Xerox ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/C2570/C7070 G/C6570 G/C5570 G/C4570 G/C3570 G/C3070 G models with Copy, Print, Fax, Scan and Overwrite StorageController ROM Ver. 1.5.3, Fax ROM Ver. 2.2.1
JISEC-CC-CRP-C0697-01-2021
name Fuji Xerox ApeosPort-IV C5570/C4470/C3370/C2270 DocuCentre-IV C5570/C4470/C3370/C2270 Series Controller Software Version:Controller ROM Ver.1.0.6 Fuji Xerox ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/C2570/C7070 G/C6570 G/C5570 G/C4570 G/C3570 G/C3070 G models with Copy, Print, Fax, Scan and Overwrite StorageController ROM Ver. 1.5.3, Fax ROM Ver. 2.2.1
category Other Devices and Systems Multi-Function Devices
not_valid_before 2009-10-15 2021-01-12
not_valid_after 2014-10-27 2026-01-12
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0236_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0697_est.pdf
status archived active
manufacturer Fuji Xerox Co., Ltd. FUJIFILM Business Innovation Corp.
manufacturer_web https://www.fujixerox.co.jp/eng/ https://www.fujifilm.com/fb/eng
security_level EAL3
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0236_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0697_erpt.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0697_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Hardcopy Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/c0553_pp.pdf', 'pp_ids': frozenset({'PP_HCD_V1.0'})})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None ce945dae0f6bc6e5b7a8a52fbc5eee1ded8728bf14197763194b9c74beb5e9b1
state/cert/txt_hash None 9e88781b951eeeaef1d41648fa24b582384c319de927241b5f01e314f90a9569
state/report/pdf_hash e432cfefec7463aa99eb9cbcd20bd8fd0b3035c580374372e2dbf337fdecabf6 dacb92070e611bc762a71d53146bc9a6fb38cb3aa2fc8bd8dcaeb8e23cbc3f8c
state/report/txt_hash 49e9c566befaf9f68d97e7a6525551489d0ac554d15f3b1291cd6b49b2ee44a1 4a74e3557c49eb0586562895860c89f17c94404361dc0f2d5b5938d72518a67d
state/st/pdf_hash e2bb7749df30aa94722f8fde6631387e2e6b18707517f5144aee46d1bff75cbe c837daa7e06acabe1a61de495cbefe214ad561b610e0bf963d6c550217f685c9
state/st/txt_hash 255c3313bb7fde5cef2170bd276a3d33424442d5fa8160a0128ea8972f835c18 04d0c986725c6ac6d671d824aea1070c19f3a81799800b84a33dcc7ae1e7344f
heuristics/cert_id JISEC-CC-CRP-C0236 JISEC-CC-CRP-C0697-01-2021
heuristics/cpe_matches cpe:2.3:h:fujixerox:apeosport_c5570:-:*:*:*:*:*:*:* cpe:2.3:h:fujifilm:apeosport_c5570:-:*:*:*:*:*:*:*, cpe:2.3:h:fujifilm:apeosport_c3070_g:-:*:*:*:*:*:*:*, cpe:2.3:h:fujifilm:apeosport_c5570_g:-:*:*:*:*:*:*:*, cpe:2.3:h:fujifilm:apeosport_c7070_g:-:*:*:*:*:*:*:*, cpe:2.3:h:fujifilm:apeosport_c3570:-:*:*:*:*:*:*:*, cpe:2.3:h:fujifilm:apeosport_print_c5570:-:*:*:*:*:*:*:*, cpe:2.3:h:fujifilm:apeosport_c4570:-:*:*:*:*:*:*:*, cpe:2.3:h:fujifilm:apeosport_c3070:-:*:*:*:*:*:*:*, cpe:2.3:h:fujifilm:apeosport_c7070:-:*:*:*:*:*:*:*, cpe:2.3:h:fujifilm:apeosport_c3570_g:-:*:*:*:*:*:*:*, cpe:2.3:h:fujifilm:apeosport_c6570:-:*:*:*:*:*:*:*, cpe:2.3:h:fujifilm:apeosport_c4570_g:-:*:*:*:*:*:*:*, cpe:2.3:h:fujifilm:apeosport_c6570_g:-:*:*:*:*:*:*:*
heuristics/extracted_versions 1.0.6 1.5.3, 2.2.1
heuristics/scheme_data
  • cert_id: C0242
  • supplier: Fuji Xerox Co., Ltd.
  • toe_overseas_name: -----
  • expiration_date: 2014-12
  • claim: EAL3
  • certification_date: 2009-12
  • toe_overseas_link: None
  • toe_japan_name: Fuji Xerox ApeosPort-IV C5570/C4470/C3370/C2270 DocuCentre-IV C5570/C4470/C3370/C2270 Series Controller Software Controller ROM Ver. 1.40.7
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0242_it9258.html
  • enhanced:
    • product: Fuji Xerox ApeosPort-IV C5570/C4470/C3370/C2270 DocuCentre-IV C5570/C4470/C3370/C2270 Series Controller Software
    • toe_version: Controller ROM Ver. 1.40.7
    • product_type: Control Software for Multi Function Peripheral
    • certification_date: 2009-12-16
    • assurance_level: EAL3
    • vendor: Fuji Xerox Co., Ltd.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
  • cert_id: C0697
  • supplier: FUJIFILM Business Innovation Corp.
  • toe_overseas_name: Fuji Xerox ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/C2570/ C7070 G/C6570 G/C5570 G/C4570 G/C3570 G/C3070 G models with Copy, Print, Fax, Scan and Overwrite Storage Controller ROM Ver. 1.5.3, Fax ROM Ver. 2.2.1
  • expiration_date: None
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • certification_date: 2021-01
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0697_it0747.html
  • toe_japan_name: Fuji Xerox ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/C2570/C7070 G/C6570 G/C5570 G/C4570 G/C3570 G/C3070 G models with Copy, Print, Fax, Scan and Overwrite Storage Controller ROM Ver. 1.5.3, Fax ROM Ver. 2.2.1
  • enhanced:
    • product: Fuji Xerox ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/ C2570/C7070 G/C6570 G/C5570 G/C4570 G/C3570 G/C3070 G models with Copy, Print, Fax, Scan and Overwrite Storage
    • toe_version: Controller ROM Ver. 1.5.3, Fax ROM Ver. 2.2.1
    • product_type: Multi-Function Device
    • cert_id: JISEC-C0697
    • certification_date: 2021-01-12
    • cc_version: 3.1 Release5
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • vendor: FUJIFILM Business Innovation Corp.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000155g-att/c0697_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000155g-att/c0697_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000155g-att/c0697_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device that has the functions such as copy, scan, print, fax, document storage and retrieval. The TOE provides the security functionality required by the protection profile for Multifunction Device, “Protection Profile for Hardcopy Devices 1.0”. TOE security functionality The TOE provides the following security functions: Identification and Authentication Access Control Data Encryption Trusted Communications Security Management Security Auditing Trusted Operation PSTN Fax-Network Separation Overwrite Storage
heuristics/scheme_data/cert_id C0242 C0697
heuristics/scheme_data/certification_date 2009-12 2021-01
heuristics/scheme_data/claim EAL3 PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
heuristics/scheme_data/enhanced
  • product: Fuji Xerox ApeosPort-IV C5570/C4470/C3370/C2270 DocuCentre-IV C5570/C4470/C3370/C2270 Series Controller Software
  • toe_version: Controller ROM Ver. 1.40.7
  • product_type: Control Software for Multi Function Peripheral
  • certification_date: 2009-12-16
  • assurance_level: EAL3
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
  • product: Fuji Xerox ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/ C2570/C7070 G/C6570 G/C5570 G/C4570 G/C3570 G/C3070 G models with Copy, Print, Fax, Scan and Overwrite Storage
  • toe_version: Controller ROM Ver. 1.5.3, Fax ROM Ver. 2.2.1
  • product_type: Multi-Function Device
  • cert_id: JISEC-C0697
  • certification_date: 2021-01-12
  • cc_version: 3.1 Release5
  • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
  • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
  • vendor: FUJIFILM Business Innovation Corp.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000155g-att/c0697_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000155g-att/c0697_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000155g-att/c0697_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device that has the functions such as copy, scan, print, fax, document storage and retrieval. The TOE provides the security functionality required by the protection profile for Multifunction Device, “Protection Profile for Hardcopy Devices 1.0”. TOE security functionality The TOE provides the following security functions: Identification and Authentication Access Control Data Encryption Trusted Communications Security Management Security Auditing Trusted Operation PSTN Fax-Network Separation Overwrite Storage
heuristics/scheme_data/enhanced/assurance_level EAL3 ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
heuristics/scheme_data/enhanced/certification_date 2009-12-16 2021-01-12
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device that has the functions such as copy, scan, print, fax, document storage and retrieval. The TOE provides the security functionality required by the protection profile for Multifunction Device, “Protection Profile for Hardcopy Devices 1.0”. TOE security functionality The TOE provides the following security functions: Identification and Authentication Access Control Data Encryption Trusted Communications Security Management Security Auditing Trusted Operation PSTN Fax-Network Separation Overwrite Storage
heuristics/scheme_data/enhanced/product Fuji Xerox ApeosPort-IV C5570/C4470/C3370/C2270 DocuCentre-IV C5570/C4470/C3370/C2270 Series Controller Software Fuji Xerox ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/ C2570/C7070 G/C6570 G/C5570 G/C4570 G/C3570 G/C3070 G models with Copy, Print, Fax, Scan and Overwrite Storage
heuristics/scheme_data/enhanced/product_type Control Software for Multi Function Peripheral Multi-Function Device
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 1.40.7 Controller ROM Ver. 1.5.3, Fax ROM Ver. 2.2.1
heuristics/scheme_data/enhanced/vendor Fuji Xerox Co., Ltd. FUJIFILM Business Innovation Corp.
heuristics/scheme_data/expiration_date 2014-12 None
heuristics/scheme_data/supplier Fuji Xerox Co., Ltd. FUJIFILM Business Innovation Corp.
heuristics/scheme_data/toe_japan_name Fuji Xerox ApeosPort-IV C5570/C4470/C3370/C2270 DocuCentre-IV C5570/C4470/C3370/C2270 Series Controller Software Controller ROM Ver. 1.40.7 Fuji Xerox ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/C2570/C7070 G/C6570 G/C5570 G/C4570 G/C3570 G/C3070 G models with Copy, Print, Fax, Scan and Overwrite Storage Controller ROM Ver. 1.5.3, Fax ROM Ver. 2.2.1
heuristics/scheme_data/toe_overseas_link None https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0697_it0747.html
heuristics/scheme_data/toe_overseas_name ----- Fuji Xerox ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/C2570/ C7070 G/C6570 G/C5570 G/C4570 G/C3570 G/C3070 G models with Copy, Print, Fax, Scan and Overwrite Storage Controller ROM Ver. 1.5.3, Fax ROM Ver. 2.2.1
pdf_data/cert_filename None c0697_eimg.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0697-01-2021: 1
  • cc_protection_profile_id:
  • cc_security_level:
  • cc_sar:
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ITSC:
      • Information Technology Security Center: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 90246
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20210512121425+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210512134817+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_hyperlinks:
pdf_data/report_filename c0236_erpt.pdf c0697_erpt.pdf
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0236-01: 1
  • Certification No. C0236: 1
  • JISEC-CC-CRP-C0697-01-2021: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.RECOVER: 1
    • T.CONFDATA: 1
    • T.DATA_SEC: 1
    • T.COMM_TAP: 1
    • T.CONSUME: 1
  • A:
    • A.ADMIN: 1
    • A.SECMODE: 1
  • D:
    • D.USER: 3
    • D.TSF: 3
  • T:
    • T.UNAUTHORIZED_ACCESS: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.NET_COMPROMISE: 1
  • A:
    • A.PHYSICAL: 1
    • A.NETWORK: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRAINED_USERS: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 1
  • A.SECMODE: 1
  • A.PHYSICAL: 1
  • A.NETWORK: 1
  • A.TRUSTED_ADMIN: 1
  • A.TRAINED_USERS: 1
pdf_data/report_keywords/cc_claims/T
  • T.RECOVER: 1
  • T.CONFDATA: 1
  • T.DATA_SEC: 1
  • T.COMM_TAP: 1
  • T.CONSUME: 1
  • T.UNAUTHORIZED_ACCESS: 1
  • T.TSF_COMPROMISE: 1
  • T.TSF_FAILURE: 1
  • T.UNAUTHORIZED_UPDATE: 1
  • T.NET_COMPROMISE: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_TSS.1: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RBG_EXT.1: 1
    • FCS_TLS_EXT.1.1: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.2: 2
      • TLS: 5
pdf_data/report_keywords/eval_facility/ITSC/Information Technology Security Center 3 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2006-09-001: 2
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2007-09-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 12
pdf_data/report_metadata
  • pdf_file_size_bytes: 192932
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
  • /CreationDate: D:20091120113117+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • /ModDate: D:20091120113220+09'00'
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 251362
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 32
  • /CreationDate: D:20210209120018+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20210209120546+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20091120113117+09'00' D:20210209120018+09'00'
pdf_data/report_metadata//Creator PScript5.dll Version 5.2 Microsoft® Word 2019
pdf_data/report_metadata//ModDate D:20091120113220+09'00' D:20210209120546+09'00'
pdf_data/report_metadata//Producer Acrobat Distiller 8.0.0 (Windows) Microsoft® Word 2019
pdf_data/report_metadata/pdf_file_size_bytes 192932 251362
pdf_data/report_metadata/pdf_is_encrypted False True
pdf_data/report_metadata/pdf_number_of_pages 24 32
pdf_data/st_filename c0236_est.pdf c0697_est.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 2
pdf_data/st_keywords/cc_claims
  • O:
    • O.AUDITS: 8
    • O.CIPHER: 5
    • O.COMM_SEC: 7
    • O.FAX_SEC: 4
    • O.MANAGE: 9
    • O.RESIDUAL: 5
    • O.USER: 7
    • O.RESTRICT: 6
  • T:
    • T.RECOVER: 4
    • T.CONFDATA: 3
    • T.DATA_SEC: 3
    • T.COMM_TAP: 4
    • T.CONSUME: 4
  • A:
    • A.ADMIN: 4
    • A.SECMODE: 3
  • OE:
    • OE.ADMIN: 3
    • OE.AUTH: 4
    • OE.COMMS_SEC: 3
    • OE.FUNCTION: 5
    • OE.COMM_SEC: 1
  • D:
    • D.USER: 7
    • D.TSF: 2
  • O:
    • O.AUDIT: 9
    • O.COMMS_PROTECTION: 11
    • O.STORAGE_ENCRYPTION: 6
    • O.PURGE_DATA: 2
    • O.UPDATE: 1
    • O.ACCESS_CONTROL: 6
    • O.USER_AUTHORIZATION: 7
    • O.FAX_NET_SEPARATION: 1
    • O.IMAGE_OVERWRITE: 1
    • O.ADMIN_ROLES: 4
    • O.ACCESS: 1
    • O.KEY_MATERIAL: 1
    • O.COMMS: 1
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 1
  • T:
    • T.UNAUTHORIZED_A: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_U: 1
    • T.NET_COMPROMISE: 1
  • A:
    • A.PHYSICAL: 1
    • A.NETWORK: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRAINED_USERS: 1
  • OE:
    • OE.PHYSICAL_PROTE: 1
    • OE.NETWORK_PROT: 1
    • OE.ADMIN_TRUST: 1
    • OE.USER_TRAINING: 1
    • OE.ADMIN_TRAININ: 1
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 4
  • A.SECMODE: 3
  • A.PHYSICAL: 1
  • A.NETWORK: 1
  • A.TRUSTED_ADMIN: 1
  • A.TRAINED_USERS: 1
pdf_data/st_keywords/cc_claims/O
  • O.AUDITS: 8
  • O.CIPHER: 5
  • O.COMM_SEC: 7
  • O.FAX_SEC: 4
  • O.MANAGE: 9
  • O.RESIDUAL: 5
  • O.USER: 7
  • O.RESTRICT: 6
  • O.AUDIT: 9
  • O.COMMS_PROTECTION: 11
  • O.STORAGE_ENCRYPTION: 6
  • O.PURGE_DATA: 2
  • O.UPDATE: 1
  • O.ACCESS_CONTROL: 6
  • O.USER_AUTHORIZATION: 7
  • O.FAX_NET_SEPARATION: 1
  • O.IMAGE_OVERWRITE: 1
  • O.ADMIN_ROLES: 4
  • O.ACCESS: 1
  • O.KEY_MATERIAL: 1
  • O.COMMS: 1
  • O.TSF_SELF_TEST: 1
  • O.UPDATE_VERIFICATION: 1
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 3
  • OE.AUTH: 4
  • OE.COMMS_SEC: 3
  • OE.FUNCTION: 5
  • OE.COMM_SEC: 1
  • OE.PHYSICAL_PROTE: 1
  • OE.NETWORK_PROT: 1
  • OE.ADMIN_TRUST: 1
  • OE.USER_TRAINING: 1
  • OE.ADMIN_TRAININ: 1
pdf_data/st_keywords/cc_claims/T
  • T.RECOVER: 4
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 4
  • T.CONSUME: 4
  • T.UNAUTHORIZED_A: 1
  • T.TSF_COMPROMISE: 1
  • T.TSF_FAILURE: 1
  • T.UNAUTHORIZED_U: 1
  • T.NET_COMPROMISE: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 1
  • ADV_FSP.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_CMC.1: 1
  • ALC_CMS.1: 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.1: 1
  • ASE_REQ.1: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_IND.1: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_VAN.1: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 6
    • EAL 3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.2: 8
    • FAU_STG.1: 8
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 8
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACF.1: 8
    • FDP_IFC.1: 11
    • FDP_IFF.1: 8
    • FDP_RIP.1: 8
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
    • FDP_IFC: 1
  • FIA:
    • FIA_AFL.1: 17
    • FIA_ATD.1: 10
    • FIA_UAU.2: 13
    • FIA_UAU.7: 10
    • FIA_UID.2: 11
    • FIA_USB.1: 8
    • FIA_UAU.1: 4
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1.1: 1
    • FIA_UID.1: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UIA.2: 1
    • FIA_UID: 1
    • FIA_UAU: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 9
    • FMT_MSA.3: 11
    • FMT_MTD.1: 10
    • FMT_SMF.1: 14
    • FMT_SMR.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_STG_EXT: 1
    • FAU_STG_EXT.1: 7
    • FAU_GEN: 13
    • FAU_GEN.1: 14
    • FAU_STG_EXT.1.1: 2
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 5
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 22
    • FCS_CKM.1: 29
    • FCS_CKM.4: 7
    • FCS_CKM_EXT.4.1: 2
    • FCS_KYC_EXT: 1
    • FCS_KYC_EXT.1: 9
    • FCS_COP.1: 85
    • FCS_SMC_EXT.1: 5
    • FCS_KDF_EXT.1: 5
    • FCS_KYC_EXT.1.1: 3
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 13
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 16
    • FCS_TLS_EXT.1.1: 2
    • FCS_CKM.1.1: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 8
    • FCS_SNI_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
  • FDP:
    • FDP_DSK_EXT: 1
    • FDP_DSK_EXT.1: 7
    • FDP_DSK_EXT.1.1: 2
    • FDP_DSK_EXT.1.2: 2
    • FDP_FXS_EXT: 1
    • FDP_FXS_EXT.1: 7
    • FDP_FXS_EXT.1.1: 2
    • FDP_ACF.1: 8
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP.1: 4
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_PMG_EXT: 1
    • FIA_PMG: 3
    • FIA_UAU.1: 10
    • FIA_UID.1: 12
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_ATD: 1
    • FIA_USB: 1
  • FMT:
    • FMT_SMF.1: 12
    • FMT_SMR.1: 9
    • FMT_MSA.3: 6
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
    • FMT_SMF: 1
  • FPT:
    • FPT_KYP_EXT: 1
    • FPT_KYP_EXT.1: 7
    • FPT_KYP_EXT.1.1: 2
    • FPT_SKP_EXT: 1
    • FPT_SKP_EXT.1: 7
    • FPT_SKP_EXT.1.1: 2
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_TRP.1: 10
    • FTP_ITC.1.1: 3
    • FTP_TRP.1.1: 4
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 11
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 7
  • FAU_SAR.2: 8
  • FAU_STG.1: 8
  • FAU_STG.4: 8
  • FAU_GEN.1.2: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 2
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
  • FAU_STG_EXT: 1
  • FAU_STG_EXT.1: 7
  • FAU_GEN: 13
  • FAU_GEN.1: 14
  • FAU_STG_EXT.1.1: 2
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 5
  • FAU_GEN.2.1: 1
  • FAU_SAR.1: 6
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2: 4
  • FAU_SAR.2.1: 1
  • FAU_STG.1: 6
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.4: 5
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 11 14
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 7 6
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 2 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 8 4
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 8 6
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 5
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 12
  • FCS_COP.1: 8
  • FCS_CKM.2: 1
  • FCS_CKM.4: 3
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM_EXT: 1
  • FCS_CKM_EXT.4: 22
  • FCS_CKM.1: 29
  • FCS_CKM.4: 7
  • FCS_CKM_EXT.4.1: 2
  • FCS_KYC_EXT: 1
  • FCS_KYC_EXT.1: 9
  • FCS_COP.1: 85
  • FCS_SMC_EXT.1: 5
  • FCS_KDF_EXT.1: 5
  • FCS_KYC_EXT.1.1: 3
  • FCS_RBG_EXT: 1
  • FCS_RBG_EXT.1: 13
  • FCS_RBG_EXT.1.1: 2
  • FCS_RBG_EXT.1.2: 2
  • FCS_TLS_EXT: 1
  • FCS_TLS_EXT.1: 16
  • FCS_TLS_EXT.1.1: 2
  • FCS_CKM.1.1: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 8
  • FCS_SNI_EXT.1.1: 1
  • FCS_SSH_EXT.1: 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 12 29
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 1 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 3 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 8 85
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 1 8
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 12
  • FDP_ACF.1: 8
  • FDP_IFC.1: 11
  • FDP_IFF.1: 8
  • FDP_RIP.1: 8
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_DSK_EXT: 1
  • FDP_DSK_EXT.1: 7
  • FDP_DSK_EXT.1.1: 2
  • FDP_DSK_EXT.1.2: 2
  • FDP_FXS_EXT: 1
  • FDP_FXS_EXT.1: 7
  • FDP_FXS_EXT.1.1: 2
  • FDP_ACF.1: 8
  • FDP_ACC.1: 9
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1: 4
  • FDP_RIP.1.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 12 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 8 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 17
  • FIA_ATD.1: 10
  • FIA_UAU.2: 13
  • FIA_UAU.7: 10
  • FIA_UID.2: 11
  • FIA_USB.1: 8
  • FIA_UAU.1: 4
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_ATD.1.1: 1
  • FIA_UID.1: 7
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UIA.2: 1
  • FIA_UID: 1
  • FIA_UAU: 1
  • FIA_PMG_EXT: 1
  • FIA_PMG: 3
  • FIA_UAU.1: 10
  • FIA_UID.1: 12
  • FIA_AFL.1: 4
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 6
  • FIA_ATD.1.1: 1
  • FIA_PMG_EXT.1: 4
  • FIA_PMG_EXT.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7: 4
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 4
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_ATD: 1
  • FIA_USB: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 17 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 10 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 4 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 10 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 7 12
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 8 4
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MOF.1: 9
  • FMT_MSA.1: 9
  • FMT_MSA.3: 11
  • FMT_MTD.1: 10
  • FMT_SMF.1: 14
  • FMT_SMR.1: 14
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 1
  • FMT_SMF.1: 12
  • FMT_SMR.1: 9
  • FMT_MSA.3: 6
  • FMT_MOF.1: 5
  • FMT_MOF.1.1: 1
  • FMT_MSA.1: 6
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1: 8
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 1
  • FMT_SMF: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 9 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 9 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 10 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 14 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 14 9
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 10
  • FPT_STM.1.1: 1
  • FPT_KYP_EXT: 1
  • FPT_KYP_EXT.1: 7
  • FPT_KYP_EXT.1.1: 2
  • FPT_SKP_EXT: 1
  • FPT_SKP_EXT.1: 7
  • FPT_SKP_EXT.1.1: 2
  • FPT_TST_EXT: 1
  • FPT_TST_EXT.1: 7
  • FPT_TST_EXT.1.1: 2
  • FPT_TUD_EXT: 2
  • FPT_TUD_EXT.1: 7
  • FPT_TUD_EXT.1.1: 2
  • FPT_TUD_EXT.1.2: 2
  • FPT_TUD_EXT.1.3: 3
  • FPT_STM.1: 7
  • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 10 7
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_TRP.1: 8
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 1
  • FTP_TRP.1.3: 1
  • FTP_ITC.1: 10
  • FTP_TRP.1: 10
  • FTP_ITC.1.1: 3
  • FTP_TRP.1.1: 4
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1.2: 2
  • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 8 10
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1.1 1 4
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1.2 1 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1.3 1 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CTR:
    • CTR: 5
  • GCM:
    • GCM: 6
  • XTS:
    • XTS: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 6
  • TLS:
    • TLS:
      • TLS: 58
      • TLS 1.0: 2
      • TLS 1.1: 2
      • TLS 1.2: 3
  • IPsec:
    • IPsec: 6
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-384: 6
    • P-521: 6
    • P-256: 8
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 10
  • SHA1:
    • SHA-1: 4
  • SHA2:
    • SHA256: 6
    • SHA-256: 8
    • SHA-512: 3
    • SHA-224: 1
    • SHA-384: 1
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 10 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 16
  • RNG:
    • RBG: 3
pdf_data/st_keywords/side_channel_analysis
  • other:
    • cold boot: 1
  • FI:
    • malfunction: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • X509:
    • X.509: 3
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS PUB 186-4: 9
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
    • FIPS PUB 180-3: 1
  • NIST:
    • NIST SP 800-90A: 2
    • NIST SP 800-38A: 1
    • NIST SP 800-38B: 1
    • NIST SP 800-38D: 1
  • RFC:
    • RFC 2818: 3
    • RFC 2246: 2
    • RFC 4346: 2
    • RFC 5246: 2
  • ISO:
    • ISO/IEC 10118-: 2
    • ISO/IEC 18033-3: 1
    • ISO/IEC 10116: 4
    • ISO/IEC 19772: 4
    • ISO/IEC 18031:2011: 3
    • ISO/IEC18031:2011: 1
  • X509:
    • X.509: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 197: 1
  • FIPS PUB 186-4: 9
  • FIPS PUB 197: 1
  • FIPS PUB 198-1: 1
  • FIPS PUB 180-3: 1
pdf_data/st_keywords/standard_id/RFC
  • RFC 2104: 1
  • RFC3414: 1
  • RFC 2818: 3
  • RFC 2246: 2
  • RFC 4346: 2
  • RFC 5246: 2
pdf_data/st_keywords/standard_id/X509/X.509 3 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
    • RC:
      • RC4: 1
      • RC2: 1
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • Triple-DES: 3
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 18
      • AES-256: 5
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 7
  • RC:
    • RC4: 1
    • RC2: 1
  • AES:
    • AES: 18
    • AES-256: 5
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES
  • AES: 7
  • AES: 18
  • AES-256: 5
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 18
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC 1 2
pdf_data/st_keywords/tls_cipher_suite/TLS
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA: 3
  • TLS_RSA_WITH_AES_256_CBC_SHA: 2
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 3
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
  • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
pdf_data/st_keywords/tls_cipher_suite/TLS/TLS_RSA_WITH_AES_128_CBC_SHA 1 3
pdf_data/st_keywords/tls_cipher_suite/TLS/TLS_RSA_WITH_AES_256_CBC_SHA 1 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 435784
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 86
  • /CreationDate: D:20091103162355+09'00'
  • /Author: fx11526
  • /Creator: PScript5.dll Version 5.2.2
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /ModDate: D:20091104160603+09'00'
  • /Title: Microsoft Word - 9254_Security Target.doc
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1287573
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 94
  • /Author: Fuji Xerox Co., Ltd.
  • /Comments:
  • /Company: Fuji Xerox Co., Ltd
  • /CreationDate: D:20210122114403+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 19
  • /Keywords:
  • /Manager:
  • /ModDate: D:20210122115013+09'00'
  • /Producer: Adobe PDF Library 19.12.66
  • /SourceModified: D:20210122024321
  • /Subject:
  • /Title: Fuji Xerox ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/C2570 Security Target
  • pdf_hyperlinks: http://www.ipa.go.jp/security/jisec/cc/documents/CCPART3V3.1R2.pdf, http://www.ipa.go.jp/security/jisec/cc/documents/CCPART2V3.1R2.pdf, http://www.ipa.go.jp/security/jisec/cc/documents/CCPART1V3.1R1.pdf
pdf_data/st_metadata//Author fx11526 Fuji Xerox Co., Ltd.
pdf_data/st_metadata//CreationDate D:20091103162355+09'00' D:20210122114403+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 Word 用 Acrobat PDFMaker 19
pdf_data/st_metadata//ModDate D:20091104160603+09'00' D:20210122115013+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 6.0 (Windows) Adobe PDF Library 19.12.66
pdf_data/st_metadata//Title Microsoft Word - 9254_Security Target.doc Fuji Xerox ApeosPort C7070/C6570/C5570/C4570/C3570/C3070/C2570 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 435784 1287573
pdf_data/st_metadata/pdf_hyperlinks http://www.ipa.go.jp/security/jisec/cc/documents/CCPART3V3.1R2.pdf, http://www.ipa.go.jp/security/jisec/cc/documents/CCPART2V3.1R2.pdf, http://www.ipa.go.jp/security/jisec/cc/documents/CCPART1V3.1R1.pdf
pdf_data/st_metadata/pdf_is_encrypted False True
pdf_data/st_metadata/pdf_number_of_pages 86 94
dgst 77adfe8a3931216a e2fc568d4bdea1b1