| name |
Microsoft Windows 10 and Windows Server 2012 R2 |
Fuji Xerox ApeosPort-II C4300/C3300/C2200 Series Data Security Kit Controller ROM Ver1.41.16 |
| category |
Operating Systems |
Multi-Function Devices |
| scheme |
ES |
JP |
| status |
archived |
archived |
| not_valid_after |
05.04.2021 |
27.12.2010 |
| not_valid_before |
05.04.2016 |
15.12.2006 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_windows10.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0071_ecvr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_windows10.pdf |
|
| manufacturer |
Microsoft Corporation |
Fuji Xerox Co., Ltd. |
| manufacturer_web |
https://www.microsoft.com |
https://www.fujixerox.co.jp/eng/ |
| security_level |
{} |
EAL2 |
| dgst |
b737ca21ffacf8a0 |
c0f06d52835f2f49 |
| heuristics/cert_id |
2015-27-INF-1539 |
JISEC-CC-CRP-C0071 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, AVA_VAN.1, ATE_COV.1, ATE_FUN.1, ASE_SPD.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, ALC_TSU_EXT.1, ADV_FSP.1 |
{} |
| heuristics/extracted_versions |
2012, 10 |
1.41.16 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0242
- certification_date: 01.12.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, fax ,etc functions as basic functions. The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Fuji Xerox ApeosPort-IV C5570/C4470/C3370/C2270 DocuCentre-IV C5570/C4470/C3370/C2270 Series Controller Software
- product_type: Control Software for Multi Function Peripheral
- toe_version: Controller ROM Ver. 1.40.7
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.12.2014
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0242_it9258.html
- toe_japan_name: Fuji Xerox ApeosPort-IV C5570/C4470/C3370/C2270 DocuCentre-IV C5570/C4470/C3370/C2270 Series Controller Software Controller ROM Ver. 1.40.7
- toe_overseas_link: None
- toe_overseas_name: -----
|
| heuristics/st_references/directly_referenced_by |
383-4-390 |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
383-4-390 |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
1edd61e3f1f2ce0d |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_os_v4.1.pdf |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
cr_windows10.pdf |
c0071_ecvr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- JP:
- Certification No. C0071: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.1: 1
- AVA:
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM_EXT.3: 1
- FCS_COP.1: 4
- FCS_RBG_EXT.1: 1
- FCS_STO_EXT.1: 1
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 1
- FCS_TLSC_EXT.3: 1
- FCS_TLSC_EXT.4: 1
- FDP:
- FDP_ACF_EXT.1: 1
- FDP_IFC_EXT.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_UAU.5: 1
- FMT:
- FPT:
- FPT_ACF_EXT.1: 1
- FPT_ASLR_EXT.1: 1
- FPT_SBOP_EXT.1: 1
- FPT_SRP_EXT.1: 1
- FPT_TST_EXT.1: 1
- FPT_TUD_EXT.1: 1
- FPT_TUD_EXT.2: 1
- FTA:
- FTP:
- FTP_ITC_EXT.1: 1
- FTP_TRP.1: 1
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.LIMITED_PHYSICAL_ACC: 1
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and MINISTERIO: 1
- out of scope: 1
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20160406120736+02'00'
- /Producer: doPDF Ver 8.4 Build 935
- pdf_file_size_bytes: 658272
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /CreationDate: D:20061215171023+09'00'
- /ModDate: D:20061215171023+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13561
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/st_filename |
st_windows10.pdf |
|
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 8
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 6
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 8
- FCS_CKM.1.1: 4
- FCS_CKM.2: 8
- FCS_CKM.2.1: 3
- FCS_CKM.4: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.3: 7
- FCS_CKM_EXT.3.1: 1
- FCS_COP.1: 43
- FCS_COP.1.1: 5
- FCS_DTLS_EXT: 1
- FCS_DTLS_EXT.1: 1
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_STO_EXT: 1
- FCS_STO_EXT.1: 6
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 7
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.2: 6
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.3: 7
- FCS_TLSC_EXT.3.1: 1
- FCS_TLSC_EXT.4: 6
- FCS_TLSC_EXT.4.1: 1
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 1
- FCS_TLS_EXT.2: 1
- FCS_TLS_EXT.3: 1
- FDP:
- FDP_ACF_EXT: 1
- FDP_ACF_EXT.1: 6
- FDP_ACF_EXT.1.1: 1
- FDP_IFC_EXT: 1
- FDP_IFC_EXT.1: 6
- FDP_IFC_EXT.1.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_UAU: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MOF_EXT: 1
- FMT_MOF_EXT.1: 6
- FMT_MOF_EXT.1.1: 1
- FPT:
- FPT_ACF_EXT: 1
- FPT_ACF_EXT.1: 6
- FPT_ACF_EXT.1.1: 2
- FPT_ACF_EXT.1.2: 2
- FPT_ASLR_EXT: 1
- FPT_ASLR_EXT.1: 6
- FPT_ASLR_EXT.1.1: 1
- FPT_SBOP_EXT: 1
- FPT_SBOP_EXT.1: 6
- FPT_SBOP_EXT.1.1: 1
- FPT_SRP_EXT: 1
- FPT_SRP_EXT.1: 6
- FPT_SRP_EXT.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 2
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXT: 1
- FTP_ITC_EXT.1: 10
- FTP_ITC_EXT.1.1: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- O:
- O.ACCOUNTABILITY: 1
- O.INTEGRITY: 1
- O.MANAGEMENT: 1
- O.PROTECTED_COMMS: 1
- O.PROTECTED_STORAGE: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.LIMITED_PHYSICAL_ACCESS: 1
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
|
|
| pdf_data/st_keywords/vendor |
- Cisco:
- Microsoft:
- Microsoft: 145
- Microsoft Corporation: 5
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 19
- AES-128: 1
- AES-256: 4
- RC:
- DES:
- constructions:
|
|
| pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 3
- DHE: 1
- Diffie-Hellman: 4
- DSA:
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 11
- SHA-384: 3
- SHA-512: 3
- SHA256: 4
- SHA384: 3
- SHA512: 3
|
|
| pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 1
- Key agreement: 1
- KEX:
- MAC:
|
|
| pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- PGP:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 81
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 4
- VPN:
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-192: 2
- P-256: 10
- P-384: 10
- P-521: 10
- secp256r1: 2
- secp384r1: 2
- secp512r1: 1
- secp521r1: 2
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_NULL_WITH_NULL_NULL: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 1
- FIPS 180-4: 2
- FIPS 186-4: 15
- FIPS 197: 3
- FIPS 198-1: 1
- FIPS 198-2: 1
- ISO:
- NIST:
- NIST SP 800-56A: 2
- NIST SP 800-56B: 2
- NIST SP 800-57: 1
- NIST SP 800-90: 2
- NIST SP 800-90A: 1
- NIST SP 800-90B: 1
- SP 800-56A: 1
- SP 800-90: 1
- PKCS:
- RFC:
- RFC 2246: 2
- RFC 2396: 1
- RFC 2560: 1
- RFC 2818: 1
- RFC 3268: 1
- RFC 3546: 2
- RFC 4366: 1
- RFC 4492: 5
- RFC 4681: 1
- RFC 5246: 8
- RFC 5280: 4
- RFC 5289: 8
- RFC 5759: 1
- RFC 6066: 1
- RFC 6125: 1
- X509:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- kernel. Software loaded for execution directly by the platform (e.g. first-stage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will: 1
- out of scope: 2
|
|
| pdf_data/st_metadata |
- /Author: tech@epoche
- /CreationDate: D:20160406100555+02'00'
- /ModDate: D:20160406100555+02'00'
- /Producer: Bullzip PDF Printer / www.bullzip.com / Freeware Edition
- /Title: Microsoft Word - Windows 10 Security Target - Public _March 30 2016_ _FINAL_.docx
- pdf_file_size_bytes: 833656
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 97
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
False |
| state/st/download_ok |
True |
False |
| state/st/extract_ok |
True |
False |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |