Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and Fax Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
JISEC-CC-CRP-C0505
Xerox WorkCentre 5325/5330/5335 Version: Controller ROM Ver. 1.202.3, IOT ROM Ver. 30.19.0, ADF ROM Ver. 7.8.50
JISEC-CC-CRP-C0331
name Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and Fax Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8 Xerox WorkCentre 5325/5330/5335 Version: Controller ROM Ver. 1.202.3, IOT ROM Ver. 30.19.0, ADF ROM Ver. 7.8.50
not_valid_before 2016-03-31 2011-12-09
not_valid_after 2021-03-31 2017-01-06
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0505_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0331_est.pdf
security_level ALC_FLR.2, EAL2+ EAL3
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0505_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0331_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/report/pdf_hash a36ed9151a1d6174063fa9331bd36cb0515ae47d3aa6eaf93ffe62c9e5e6a74c 65527c4ccb7ea8d2364fb0ecfcb520053bdd20371f1a4322ddc746a6ac7fb8f8
state/report/txt_hash 59e359d64acde7d947cac1a99885f297e58a21792fa25aae816ece6333efdb2c b67ef786ee1e510cc2ee50a252cbd7a88dd3101929e4b22913c7f97a3b83247c
state/st/pdf_hash 37f515528d4e8198aaccf74fa796b2d1daa61be6a008d7f6e2b27d49232819cf 16a0427954a34f88380e7ca40fae8b487688c5c467dff34fc60238005cc820c2
state/st/txt_hash 19ce084a69e780d38c41ca238208fedaca10e4817a105cb0fc5a9ff0a5fa91dc 01305772d8713241c78a8cc8d005d4dfeae9a61af95ffb7524242753c83715c3
heuristics/cert_id JISEC-CC-CRP-C0505 JISEC-CC-CRP-C0331
heuristics/cpe_matches cpe:2.3:h:fujixerox:apeosport_3060:-:*:*:*:*:*:*:*, cpe:2.3:h:fujixerox:docucentre-v_3065:-:*:*:*:*:*:*:* None
heuristics/extracted_versions 2.0.8, 1.0.13 30.19.0, 1.202.3, 7.8.50
heuristics/scheme_data/cert_id C0505 C0331
heuristics/scheme_data/certification_date 2016-03 2011-12
heuristics/scheme_data/claim EAL2+ ALC_FLR.2 PP EAL3
heuristics/scheme_data/enhanced
  • product: Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and Fax
  • toe_version: Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
  • product_type: Multi Function Device
  • certification_date: 2016-03-31
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented with ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0505_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0505_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0505_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
  • product: Xerox WorkCentre 5325/5330/5335
  • toe_version: Controller ROM Ver. 1.202.3 IOT ROM Ver. 30.19.0 ADF ROM Ver. 7.8.50
  • product_type: Multi Function Device
  • certification_date: 2011-12-09
  • cc_version: 3.1
  • assurance_level: EAL3
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0331_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0331_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0331_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The MFD is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security
heuristics/scheme_data/enhanced/assurance_level EAL2 Augmented with ALC_FLR.2 EAL3
heuristics/scheme_data/enhanced/cc_version 3.1 Release4 3.1
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0505_eimg.pdf https://www.ipa.go.jp/en/security/c0331_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2016-03-31 2011-12-09
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data. PRODUCT DESCRIPTION Description of TOE The TOE is Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The MFD is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Evaluation Department Information Technology Security Center Evaluation Department
heuristics/scheme_data/enhanced/product Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and Fax Xerox WorkCentre 5325/5330/5335
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0505_erpt.pdf https://www.ipa.go.jp/en/security/c0331_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0505_est.pdf https://www.ipa.go.jp/en/security/c0331_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8 Controller ROM Ver. 1.202.3 IOT ROM Ver. 30.19.0 ADF ROM Ver. 7.8.50
heuristics/scheme_data/expiration_date 2021-04 2017-01
heuristics/scheme_data/toe_japan_name Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and FaxController ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8 -----
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0505_it5559.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0331_it1348.html
heuristics/scheme_data/toe_overseas_name Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and FaxController ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8 Xerox WorkCentre 5325/5330/5335 Controller ROM Ver. 1.202.3, IOT ROM Ver. 30.19.0, ADF ROM Ver. 7.8.50
pdf_data/report_filename c0505_erpt.pdf c0331_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0505-01: 1
  • Certification No. C0505: 1
  • CRP-C0331-01: 1
  • Certification No. C0331: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.ADMIN: 1
  • A.SECMODE: 1
pdf_data/report_keywords/cc_claims/A/A.ADMIN 2 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 4
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
  • T.CONSUME: 2
  • T.DATA_SEC: 2
  • T.CONFDATA: 2
  • T.RECOVER: 2
  • T.COMM_TAP: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2 augmented: 2
  • EAL3: 4
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
  • IPsec:
    • IPsec: 7
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • TLS:
    • TLS: 3
  • SSL:
    • SSL: 1
pdf_data/report_keywords/eval_facility/ITSC/Information Technology Security Center 4 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 8
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/vendor/Microsoft/Microsoft 14 22
pdf_data/report_metadata
  • pdf_file_size_bytes: 479332
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 40
  • /CreationDate: D:20160519151340+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /ModDate: D:20160519151527+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 394307
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
  • /CreationDate: D:20111226142641+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20111226142732+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20160519151340+09'00' D:20111226142641+09'00'
pdf_data/report_metadata//Creator Word 用 Acrobat PDFMaker 11 Microsoft® Word 2010
pdf_data/report_metadata//ModDate D:20160519151527+09'00' D:20111226142732+09'00'
pdf_data/report_metadata//Producer Adobe PDF Library 11.0 Microsoft® Word 2010
pdf_data/report_metadata/pdf_file_size_bytes 479332 394307
pdf_data/report_metadata/pdf_number_of_pages 40 35
pdf_data/st_filename c0505_est.pdf c0331_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.FUNC: 53
    • D.DOC: 60
    • D.PROT: 4
    • D.CONF: 13
  • O:
    • O.AUDIT_STORAGE: 10
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 8
    • O.DOC: 16
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 14
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
  • T:
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
    • T.CONF: 6
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 12
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
  • O:
    • O.AUDITS: 8
    • O.CIPHER: 6
    • O.COMM_SEC: 7
    • O.FAX_SEC: 5
    • O.MANAGE: 9
    • O.RESIDUAL: 6
    • O.USER: 7
    • O.RESTRICT: 7
  • T:
    • T.RECOVER: 5
    • T.CONFDATA: 3
    • T.DATA_SEC: 3
    • T.COMM_TAP: 5
    • T.CONSUME: 5
  • A:
    • A.ADMIN: 5
    • A.SECMODE: 3
  • OE:
    • OE.ADMIN: 3
    • OE.SEC: 7
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 3
  • A.USER: 3
  • A.ADMIN: 6
  • A.ADMIN: 5
  • A.SECMODE: 3
pdf_data/st_keywords/cc_claims/A/A.ADMIN 6 5
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT_STORAGE: 10
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 8
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDITS: 8
  • O.CIPHER: 6
  • O.COMM_SEC: 7
  • O.FAX_SEC: 5
  • O.MANAGE: 9
  • O.RESIDUAL: 6
  • O.USER: 7
  • O.RESTRICT: 7
pdf_data/st_keywords/cc_claims/O/O.CIPHER 8 6
pdf_data/st_keywords/cc_claims/O/O.USER 14 7
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 12
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
  • OE.ADMIN: 3
  • OE.SEC: 7
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 6 3
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 6
  • T.FUNC: 3
  • T.PROT: 3
  • T.CONF: 6
  • T.RECOVER: 5
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 5
  • T.CONSUME: 5
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 2
  • EAL 2: 1
  • EAL2 augmented: 1
  • EAL3: 6
  • EAL 3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.2: 9
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_STG.1: 11
    • FAU_STG.4: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
    • FCS_COP: 1
  • FDP:
    • FDP_ACC.1: 99
    • FDP_ACF.1: 92
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_RIP.1: 9
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 8
    • FDP_ACF.1.1: 8
    • FDP_ACF.1.2: 8
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 8
    • FDP_ACC: 2
  • FIA:
    • FIA_AFL.1: 19
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.1: 16
    • FIA_UAU.7: 10
    • FIA_UID.1: 22
    • FIA_USB.1: 9
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA.1: 99
    • FMT_SMR.1: 45
    • FMT_MOF.1: 11
    • FMT_MSA.3: 90
    • FMT_MTD.1: 23
    • FMT_SMF.1: 38
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 8
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 16
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.2: 8
    • FAU_STG.1: 10
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACF.1: 10
    • FDP_IFC.1: 11
    • FDP_IFF.1: 10
    • FDP_RIP.1: 8
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
  • FIA:
    • FIA_AFL.1: 29
    • FIA_ATD.1: 9
    • FIA_SOS.1: 6
    • FIA_UAU.1: 19
    • FIA_UAU.7: 9
    • FIA_UID.1: 16
    • FIA_USB.1: 8
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UIA.1: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 11
    • FMT_MSA.3: 11
    • FMT_MTD.1: 11
    • FMT_SMF.1: 17
    • FMT_SMR.1: 15
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 2
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN: 1
  • FAU_GEN.1: 15
  • FAU_GEN.2: 9
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_STG.1: 11
  • FAU_STG.4: 9
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 9
  • FAU_SAR.2: 8
  • FAU_STG.1: 10
  • FAU_STG.4: 8
  • FAU_GEN.1.2: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 2
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 15 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 9 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 11 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 9 8
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 12
  • FCS_COP.1: 11
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
  • FCS_CKM.1: 11
  • FCS_COP.1: 10
  • FCS_CKM.2: 1
  • FCS_CKM.4: 3
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 12 11
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 11 10
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 99
  • FDP_ACF.1: 92
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 8
  • FDP_ACF.1.1: 8
  • FDP_ACF.1.2: 8
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 8
  • FDP_ACC: 2
  • FDP_ACC.1: 12
  • FDP_ACF.1: 10
  • FDP_IFC.1: 11
  • FDP_IFF.1: 10
  • FDP_RIP.1: 8
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 99 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 92 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 8 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 9 8
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 19
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 16
  • FIA_UAU.7: 10
  • FIA_UID.1: 22
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID.2: 1
  • FIA_AFL.1: 29
  • FIA_ATD.1: 9
  • FIA_SOS.1: 6
  • FIA_UAU.1: 19
  • FIA_UAU.7: 9
  • FIA_UID.1: 16
  • FIA_USB.1: 8
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UIA.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 19 29
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 2 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 2 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 11 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 16 19
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 10 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 22 16
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 9 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 11 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 99 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 8 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 90 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 8 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 8 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 23 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 38 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 45 15
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 16
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 11
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1: 10
  • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 11 10
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 8
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 1
  • FTP_TRP.1.3: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA1: 9
    • SHA-1: 2
  • SHA2:
    • SHA256: 3
  • SHA1:
    • SHA-1: 10
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA1: 9
  • SHA-1: 2
  • SHA-1: 10
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 2 10
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • cold boot: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/RFC
  • RFC 2104: 1
  • RFC 2104: 1
  • RFC3414: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 8
  • AES:
    • AES: 7
  • RC:
    • RC4: 1
    • RC2: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 8 7
pdf_data/st_keywords/symmetric_crypto/DES
  • 3DES:
    • Triple-DES: 1
  • DES:
    • DES: 1
  • 3DES:
    • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 3
pdf_data/st_keywords/tls_cipher_suite/TLS
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_metadata//CreationDate D:20160519092202+09'00' D:20111226134935+09'00'
pdf_data/st_metadata//ModDate D:20160519092202+09'00' D:20111226134935+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 10.1.16 (Windows) Acrobat Distiller 10.1.1 (Windows)
pdf_data/st_metadata/pdf_file_size_bytes 849926 461394
pdf_data/st_metadata/pdf_number_of_pages 136 90
dgst d134e9e8b6240ca4 337fc1546fa214ac