Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Xerox VersaLink C505 Color Multifunction Printer Diskless model Controller ROM Ver. 1.12.32
JISEC-CC-CRP-C0611-01-2018
Xerox VersaLink C405 Color Multifunction Printer Diskless modelController ROM Ver.1.0.31
JISEC-CC-CRP-C0594
name Xerox VersaLink C505 Color Multifunction Printer Diskless model Controller ROM Ver. 1.12.32 Xerox VersaLink C405 Color Multifunction Printer Diskless modelController ROM Ver.1.0.31
not_valid_after 29.08.2023 16.04.2023
not_valid_before 29.08.2018 16.04.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0611_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0600_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0611_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0594_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0611_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0594_est.pdf
dgst 9ba3cc3c4b5c93fd 6b8532a967ac4820
heuristics/cert_id JISEC-CC-CRP-C0611-01-2018 JISEC-CC-CRP-C0594
heuristics/cpe_matches cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:* cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*
heuristics/extracted_versions 1.12.32 1.0.31
heuristics/scheme_data
  • cert_id: C0611
  • certification_date: 2018-08
  • claim: EAL2+ ALC_FLR.2
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_id: JISEC-C0611
    • cert_link: https://www.ipa.go.jp/en/security/c0611_eimg.pdf
    • certification_date: 2018-08-29
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network and scan. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Flash Memory Data EncryptionA function to encrypt the document data before the data is stored into the internal eMMC memory. - User AuthenticationA function to identify and authenticate users. This function also allows only owners of document data and system administrators to handle document data stored in the TOE. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Xerox VersaLink C505 Color Multifunction Printer Diskless model
    • product_type: Multi-Function Device
    • report_link: https://www.ipa.go.jp/en/security/c0611_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0611_est.pdf
    • toe_version: Controller ROM Ver. 1.12.32
    • vendor: Xerox Corporation
  • expiration_date: 2023-09
  • supplier: Xerox Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0611_it7631.html
  • toe_overseas_name: Xerox VersaLink C505 Color Multifunction Printer Diskless model Controller ROM Ver. 1.12.32
  • cert_id: C0594
  • certification_date: 2018-04
  • claim: EAL2+ ALC_FLR.2
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0594_eimg.pdf
    • certification_date: 2018-04-16
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Flash Memory Data EncryptionA function to encrypt the document data before the data is stored into the internal eMMC memory. - User AuthenticationA function to identify and authenticate users. This function also allows only owners of document data and system administrators to handle document data stored in the TOE. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Fax Flow SecurityA function to restrict the unpermitted communication between public telephone line and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Xerox VersaLink C405 Color Multifunction Printer Diskless model
    • product_type: Multi-Function Device
    • report_link: https://www.ipa.go.jp/en/security/c0594_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0594_est.pdf
    • toe_version: Controller ROM Ver.1.0.31
    • vendor: Xerox Corporation
  • expiration_date: 2023-05
  • supplier: Xerox Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0594_it6608.html
  • toe_overseas_name: Xerox VersaLink C405 Color Multifunction Printer Diskless modelController ROM Ver.1.0.31
pdf_data/cert_filename c0611_eimg.pdf c0600_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0611-01-2018: 1
  • JP:
    • JISEC-CC-CRP-C0600-01-2018: 1
pdf_data/cert_metadata
  • /CreationDate: D:20180910105107+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180910105304+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 85355
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20180608134850+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180608161051+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 145696
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename c0611_erpt.pdf c0594_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0611-01-2018: 1
  • JP:
    • CRP-C0594-01: 1
    • Certification No. C0594: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 15
  • Microsoft:
    • Microsoft: 13
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 4
  • SHA:
    • SHA1:
      • SHA1: 4
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 5
  • TLS:
    • TLS:
      • TLS: 2
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/report_metadata
  • /CreationDate: D:20181005170048+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20181005170114+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 372039
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 34
  • /CreationDate: D:20180723133701+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180723133755+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 370217
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 34
pdf_data/st_filename c0611_est.pdf c0594_est.pdf
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_COP: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_AFL.1: 16
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UIA.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 9
    • FIA_UID.2: 14
    • FIA_UID.2.1: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 11
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_AFL.1: 16
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UIA.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 4
    • A.SECMODE: 4
    • A.USER: 3
  • O:
    • O.AUDITS: 8
    • O.CIPHER: 5
    • O.COMM_SEC: 7
    • O.MANAGE: 7
    • O.RESTRICT: 7
    • O.USER: 7
    • O.VERIFY: 4
  • OE:
    • OE.ADMIN: 3
    • OE.PHYSICAL: 3
    • OE.SEC: 7
    • OE.USER: 3
  • T:
    • T.COMM_TAP: 3
    • T.CONFDATA: 4
    • T.CONSUME: 3
    • T.DATA_SEC: 4
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 4
    • A.SECMODE: 4
    • A.USER: 3
  • O:
    • O.AUDITS: 8
    • O.CIPHER: 5
    • O.COMM_SEC: 7
    • O.FAX_SEC: 6
    • O.MANAGE: 9
    • O.RESTRICT: 5
    • O.USER: 9
    • O.VERIFY: 2
  • OE:
    • OE.ADMIN: 3
    • OE.PHYSICAL: 3
    • OE.SEC: 7
    • OE.USER: 3
  • T:
    • T.COMM_TAP: 3
    • T.CONFDATA: 4
    • T.CONSUME: 3
    • T.DATA_SEC: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-2: 3
      • SHA256: 5
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 3
    • SHA2:
      • SHA-2: 3
      • SHA256: 2
pdf_data/st_metadata
  • /CreationDate: D:20181004130152+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20181004131618+09'00'
  • /Producer: Acrobat Distiller 10.1.16 (Windows)
  • /Subject: Security Target
  • /Title: Xerox VersaLink C505 Color Multifunction Printer
  • pdf_file_size_bytes: 476942
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 78
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different