name |
Wickr Enterprise Client 6.10 |
Fuji Xerox ApeosPort-IV C7780/C6680/C5580 DocuCentre-IV C7780/C6680/C5580 Series Controller Software for Asia Pacific Controller ROM Ver. 1.101.7 |
category |
Operating Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
07.04.2025 |
04.07.2016 |
not_valid_before |
07.04.2023 |
23.06.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11320-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11320-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0298_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11320-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0298_est.pdf |
manufacturer |
Wickr LLC |
Fuji Xerox Co., Ltd. |
manufacturer_web |
https://wickr.com |
https://www.fujixerox.co.jp/eng/ |
security_level |
{} |
EAL3 |
dgst |
b8021ad7b03c725f |
679c8244226f4342 |
heuristics/cert_id |
CCEVS-VR-VID-11320-2023 |
JISEC-CC-CRP-C0298 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, ATE_FUN.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, ALC_TSU_EXT.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
6.10 |
1.101.7 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Application Software
- certification_date: 07.04.2023
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 07.04.2025
- id: CCEVS-VR-VID11320
- product: Wickr Enterprise Client 6.10
- scheme: US
- url: https://www.niap-ccevs.org/product/11320
- vendor: Wickr LLC
|
- cert_id: JISEC-CC-CRP-C0298
- certification_date: 01.06.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0298_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Device (MFD) that provides copy, print, scan, fax ,etc functions as basic functions. The MFD is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFD via internal network, and general user client which is directly linked to the MFD. TOE security functions To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Fuji Xerox ApeosPort-IV C7780/C6680/C5580 DocuCentre-IV C7780/C6680/C5580 Series Controller Software for Asia Pacific
- product_type: Control Software for Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0298_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0298_est.pdf
- toe_version: Controller ROM Ver. 1.101.7
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.07.2016
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0298_it0321.html
- toe_overseas_name: Fuji Xerox ApeosPort-IV C7780/C6680/C5580 DocuCentre-IV C7780/C6680/C5580 Series Controller Software for Asia Pacific Controller ROM Ver. 1.101.7
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
90c116e62a19bc4d |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_V1.4.pdf |
{} |
pdf_data/cert_filename |
st_vid11320-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11320-2023: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230411095315-04'00'
- /ModDate: D:20230411095315-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 179621
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11320-vr.pdf |
c0298_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11320-2023
- cert_item: for Wickr Enterprise Client 6.10
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11320-2023: 1
|
- JP:
- CRP-C0298-01: 1
- Certification No. C0298: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- T:
- T.COMM_TAP: 2
- T.CONFDATA: 2
- T.CONSUME: 2
- T.DATA_SEC: 2
- T.RECOVER: 2
|
pdf_data/report_keywords/vendor |
- Microsoft:
- Qualcomm:
- Samsung:
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Leidos CCTL
- /CreationDate: D:20230410085107-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230410085107-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 610080
- pdf_hyperlinks: https://nvd.nist.gov/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /CreationDate: D:20111005140004+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20111005140032+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 386008
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
pdf_data/st_filename |
st_vid11320-st.pdf |
c0298_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_TSU_EXT: 2
- ALC_TSU_EXT.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 2
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.1: 4
- FCS_CKM_EXT.1.1: 1
- FCS_COP: 6
- FCS_COP.1: 1
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.2: 5
- FCS_RBG_EXT.2.1: 1
- FCS_RBG_EXT.2.2: 1
- FCS_STO_EXT: 1
- FCS_STO_EXT.1: 10
- FCS_STO_EXT.1.1: 1
- FDP:
- FDP_DAR_EXT: 1
- FDP_DAR_EXT.1: 4
- FDP_DAR_EXT.1.1: 1
- FDP_DEC_EXT: 1
- FDP_DEC_EXT.1: 4
- FDP_DEC_EXT.1.1: 1
- FDP_DEC_EXT.1.2: 1
- FDP_NET_EXT: 1
- FDP_NET_EXT.1: 4
- FDP_NET_EXT.1.1: 1
- FMT:
- FMT_CFG_EXT: 1
- FMT_CFG_EXT.1: 4
- FMT_CFG_EXT.1.1: 1
- FMT_CFG_EXT.1.2: 1
- FMT_MEC_EXT: 1
- FMT_MEC_EXT.1: 4
- FMT_MEC_EXT.1.1: 1
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FPR:
- FPR_ANO_EXT: 1
- FPR_ANO_EXT.1: 4
- FPR_ANO_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT: 1
- FPT_AEX_EXT.1: 4
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 1
- FPT_AEX_EXT.1.4: 1
- FPT_AEX_EXT.1.5: 1
- FPT_API_EXT: 1
- FPT_API_EXT.1: 4
- FPT_API_EXT.1.1: 1
- FPT_IDV_EXT: 2
- FPT_IDV_EXT.1: 3
- FPT_IDV_EXT.1.1: 1
- FPT_LIB_EXT: 1
- FPT_LIB_EXT.1: 4
- FPT_LIB_EXT.1.1: 1
- FPT_TUD_EXT: 10
- FPT_TUD_EXT.1: 10
- FPT_TUD_EXT.2: 5
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 2
- FPT_TUD_EXT.2.3: 1
- FTP:
- FTP_DIT_EXT: 1
- FTP_DIT_EXT.1: 5
- FTP_DIT_EXT.1.1: 1
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 30
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 18
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UIA.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FTP:
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- O.AUDITS: 8
- O.CIPHER: 6
- O.COMM_SEC: 7
- O.FAX_SEC: 5
- O.MANAGE: 9
- O.RESIDUAL: 6
- O.RESTRICT: 7
- O.USER: 7
- OE:
- T:
- T.COMM_TAP: 5
- T.CONFDATA: 3
- T.CONSUME: 5
- T.DATA_SEC: 3
- T.RECOVER: 5
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Qualcomm:
- Samsung:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 5
- HMAC-SHA-384: 5
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 8
- P-521: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 180-4: 8
- FIPS PUB 186-4: 12
- FIPS PUB 198-1: 4
- NIST:
- NIST SP 800-38: 4
- NIST SP 800-38D: 1
- NIST SP 800-56A: 4
- NIST SP 800-57: 1
- NIST SP 800-90A: 4
- RFC:
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.google: 2
- com.google.android: 4
- com.googlecode: 1
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author:
- /CreationDate: D:20110818145833+09'00'
- /Creator: eDocument Library version 2.5.4
- /ModDate: D:20110818145833+09'00'
- /Producer: eDocument Library version 2.5.4 PDF Filter
- /Title:
- pdf_file_size_bytes: 726899
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |