Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Xerox Color C60/C70 Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3
JISEC-CC-CRP-C0462
Xerox WorkCentre 7346 Version: Controller+PS ROM Ver. 1.223.4, IOT ROM Ver 3.2.0, IIT ROM Ver 20.4.3, ADF ROM Ver 11.6.5
JISEC-CC-CRP-C0169
name Xerox Color C60/C70 Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3 Xerox WorkCentre 7346 Version: Controller+PS ROM Ver. 1.223.4, IOT ROM Ver 3.2.0, IIT ROM Ver 20.4.3, ADF ROM Ver 11.6.5
not_valid_before 2014-12-25 2008-06-13
not_valid_after 2020-01-06 2013-01-17
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0462_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0169_est.pdf
security_level ALC_FLR.2, EAL3+ EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0462_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0169_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})})
state/report/pdf_hash c3480070f41b787b13414cf14214d18acbe6130954144205981ab2e62ec3b990 5dbbfe7ef009b4b0cf5abccf1f3f97e320d1bc8ee31758c8e37fa043480b9bbc
state/report/txt_hash 08e7eb37cc2f73b03fb4040029795e679cd250c24f787f903dec0b2a8d332e26 40aa509dc26713f9aaa14fdfa61a0fdbb6171873154a3607e43c12a61138cfb3
state/st/pdf_hash 635cdf346eb4ce86564cc182bcb3dd9b3a8b1e0513827f41d1349a9fe354a6cf e51e885c200f2adea0854e07debed52baa19c0c6d32bb84513bd262a1582ed05
state/st/txt_hash 4c28d0a5a844e02bd0ff7550f69d9839ce3d8869ec7d1977bad1dee3ce246740 c8ee9acb433e89c60017bb8795519f5b84d4cdf9b38fa6dbf85f1eb1041abce6
heuristics/cert_id JISEC-CC-CRP-C0462 JISEC-CC-CRP-C0169
heuristics/extracted_versions 1.200.17, 13.19.3, 67.20.0 11.6.5, 1.223.4, 3.2.0, 20.4.3
heuristics/scheme_data/cert_id C0462 C0169
heuristics/scheme_data/certification_date 2014-12 2008-06
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP EAL2
heuristics/scheme_data/enhanced
  • product: Xerox Color C60/C70
  • toe_version: Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3
  • product_type: Multi Function Device
  • certification_date: 2014-12-25
  • cc_version: 3.1 Release4
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1™-2009
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0462_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0462_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0462_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
  • product: Xerox WorkCentre 7346
  • toe_version: Controller+PS ROM Ver.1.223.4 IOT ROM Ver.3.2.0 IIT ROM Ver.20.4.3 ADF ROM Ver.11.6.5
  • product_type: IT product(Multi Function Peripheral)
  • certification_date: 2008-06-13
  • cc_version: 2.3
  • assurance_level: EAL2
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0169_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0169_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0169_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: -Hard Disk Data Overwrite -Hard Disk Data Encryption -User Authentication -System Administrator's Security Management -Customer Engineer Operation Restriction -Security Audit Log -Internal Network Data Protection -FAX Flow Security
heuristics/scheme_data/enhanced/assurance_level EAL3 Augmented with ALC_FLR.2 EAL2
heuristics/scheme_data/enhanced/cc_version 3.1 Release4 2.3
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0462_eimg.pdf https://www.ipa.go.jp/en/security/c0169_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2014-12-25 2008-06-13
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data. PRODUCT DESCRIPTION Description of TOE The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: -Hard Disk Data Overwrite -Hard Disk Data Encryption -User Authentication -System Administrator's Security Management -Customer Engineer Operation Restriction -Security Audit Log -Internal Network Data Protection -FAX Flow Security
heuristics/scheme_data/enhanced/product Xerox Color C60/C70 Xerox WorkCentre 7346
heuristics/scheme_data/enhanced/product_type Multi Function Device IT product(Multi Function Peripheral)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0462_erpt.pdf https://www.ipa.go.jp/en/security/c0169_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0462_est.pdf https://www.ipa.go.jp/en/security/c0169_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3 Controller+PS ROM Ver.1.223.4 IOT ROM Ver.3.2.0 IIT ROM Ver.20.4.3 ADF ROM Ver.11.6.5
heuristics/scheme_data/expiration_date 2020-01 2013-03
heuristics/scheme_data/supplier Fuji Xerox Co., Ltd. Fuji Xerox Co., Ltd.
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0462_it4496.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0169_it8202.html
heuristics/scheme_data/toe_overseas_name Xerox Color C60/C70 Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3 Xerox WorkCentre 7346 / Controller+PS ROM Ver.1.223.4 IOT ROM Ver.3.2.0 IIT ROM Ver.20.4.3 ADF ROM Ver.11.6.5
pdf_data/report_filename c0462_erpt.pdf c0169_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0462-01: 1
  • Certification No. C0462: 1
  • CRP-C0169-01: 1
  • Certification No. C0169: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.ADMIN: 1
  • A.SECMODE: 1
pdf_data/report_keywords/cc_claims/A/A.ADMIN 2 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 4
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
  • T.RECOVER: 1
  • T.CONFDATA: 1
  • T.DATA_SEC: 1
  • T.COMM_TAP: 1
  • T.CONSUME: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 2
  • EAL2: 3
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • IPsec:
    • IPsec: 7
pdf_data/report_keywords/eval_facility/ITSC/Information Technology Security Center 4 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 5
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2005-08-001: 2
  • CCMB-2005-08-002: 2
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 15
pdf_data/report_metadata
  • pdf_file_size_bytes: 377540
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
  • /CreationDate: D:20150217171824+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150217171848+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 201283
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
  • /CreationDate: D:20080704163035+09'00'
  • /Author: s-shiro
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • /ModDate: D:20080704163035+09'00'
  • /Title: Microsoft Word - C0169_Certification Report_en.doc
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20150217171824+09'00' D:20080704163035+09'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 PScript5.dll Version 5.2
pdf_data/report_metadata//ModDate D:20150217171848+09'00' D:20080704163035+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 8.0.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 377540 201283
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 37 25
pdf_data/st_filename c0462_est.pdf c0169_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.FUNC: 53
    • D.DOC: 62
    • D.PROT: 3
    • D.CONF: 13
  • O:
    • O.AUDIT_STORAGE: 10
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 8
    • O.DOC: 16
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 14
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
  • T:
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
    • T.CONF: 6
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 12
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
  • O:
    • O.AUDITS: 10
    • O.CIPHER: 7
    • O.COMM_SEC: 8
    • O.FAX_SEC: 6
    • O.MANAGE: 10
    • O.RESIDUAL: 7
    • O.USER: 8
    • O.RESTRICT: 8
  • T:
    • T.RECOVER: 4
    • T.CONFDATA: 3
    • T.DATA_SEC: 3
    • T.COMM_TAP: 4
    • T.CONSUME: 4
  • A:
    • A.ADMIN: 4
    • A.SECMODE: 3
  • OE:
    • OE.ADMIN: 4
    • OE.AUTH: 8
    • OE.COMMS_SEC: 6
    • OE.FUNCTION: 8
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 3
  • A.USER: 3
  • A.ADMIN: 6
  • A.ADMIN: 4
  • A.SECMODE: 3
pdf_data/st_keywords/cc_claims/A/A.ADMIN 6 4
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT_STORAGE: 10
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 8
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDITS: 10
  • O.CIPHER: 7
  • O.COMM_SEC: 8
  • O.FAX_SEC: 6
  • O.MANAGE: 10
  • O.RESIDUAL: 7
  • O.USER: 8
  • O.RESTRICT: 8
pdf_data/st_keywords/cc_claims/O/O.CIPHER 8 7
pdf_data/st_keywords/cc_claims/O/O.USER 14 8
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 12
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
  • OE.ADMIN: 4
  • OE.AUTH: 8
  • OE.COMMS_SEC: 6
  • OE.FUNCTION: 8
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 6 4
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 6
  • T.FUNC: 3
  • T.PROT: 3
  • T.CONF: 6
  • T.RECOVER: 4
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 4
  • T.CONSUME: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.2: 5
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ACM:
    • ACM_CAP.2: 6
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 7
  • ADV:
    • ADV_FSP.1: 12
    • ADV_RCR.1: 7
    • ADV_HLD.1: 6
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 7
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 6
    • ATE_IND.2: 5
  • AVA:
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 1
  • ADV_FSP.1: 12
  • ADV_RCR.1: 7
  • ADV_HLD.1: 6
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_ADM.1: 8
  • AGD_USR.1: 7
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 5
  • ATE_FUN.1: 6
  • ATE_IND.2: 5
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 6
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 5
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_SOF.1: 3
  • AVA_VLA.1: 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 2
  • EAL 3: 1
  • EAL3 augmented: 1
  • EAL2: 8
  • EAL 2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 14
    • FAU_GEN.2: 9
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_STG.1: 11
    • FAU_STG.4: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
    • FCS_COP: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 98
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ACF.1: 90
    • FDP_RIP.1: 9
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 8
    • FDP_ACF.1.1: 8
    • FDP_ACF.1.2: 8
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 8
  • FIA:
    • FIA_AFL.1: 35
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.1: 18
    • FIA_UAU.7: 10
    • FIA_UID.1: 22
    • FIA_USB.1: 9
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_SMR.1: 45
    • FMT_MOF.1: 11
    • FMT_MSA.1: 90
    • FMT_MSA.3: 90
    • FMT_MTD.1: 23
    • FMT_SMF.1: 38
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 8
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 16
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 17
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 13
    • FAU_SAR.2: 15
    • FAU_STG.1: 14
    • FAU_STG.4: 13
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_COP.1: 16
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACF.1: 13
    • FDP_IFC.1: 14
    • FDP_IFF.1: 12
    • FDP_RIP.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
  • FIA:
    • FIA_AFL.1: 28
    • FIA_UAU.2: 23
    • FIA_UAU.7: 17
    • FIA_UID.2: 21
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU.1: 4
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_UIA.2: 1
    • FIA_UID: 1
    • FIA_UAU: 1
  • FMT:
    • FMT_MOF.1: 27
    • FMT_MSA.1: 13
    • FMT_MSA.3: 13
    • FMT_MTD.1: 12
    • FMT_SMF.1: 17
    • FMT_SMR.1: 24
    • FMT_MSA.2: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
    • FMT_MSA: 2
  • FPT:
    • FPT_STM.1: 15
    • FPT_RVM.1: 48
    • FPT_RVM.1.1: 1
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN: 1
  • FAU_GEN.1: 14
  • FAU_GEN.2: 9
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_STG.1: 11
  • FAU_STG.4: 9
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
  • FAU_GEN.1: 17
  • FAU_GEN.1.2: 1
  • FAU_SAR.1: 13
  • FAU_SAR.2: 15
  • FAU_STG.1: 14
  • FAU_STG.4: 13
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 14 17
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 13
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 9 15
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 11 14
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 9 13
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 12
  • FCS_COP.1: 11
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
  • FCS_CKM.1: 18
  • FCS_COP.1: 16
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 1
  • FCS_CKM.4: 4
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 12 18
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 11 16
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 4
  • FDP_ACC.1: 98
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACF.1: 90
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 8
  • FDP_ACF.1.1: 8
  • FDP_ACF.1.2: 8
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 8
  • FDP_ACC.1: 15
  • FDP_ACF.1: 13
  • FDP_IFC.1: 14
  • FDP_IFF.1: 12
  • FDP_RIP.1: 13
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF.1.6: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 98 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 90 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 8 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 9 13
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 35
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 18
  • FIA_UAU.7: 10
  • FIA_UID.1: 22
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID.2: 1
  • FIA_AFL.1: 28
  • FIA_UAU.2: 23
  • FIA_UAU.7: 17
  • FIA_UID.2: 21
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UAU.1: 4
  • FIA_UAU.2.1: 1
  • FIA_UID.1: 10
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_UIA.2: 1
  • FIA_UID: 1
  • FIA_UAU: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 35 28
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 4 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 4 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 18 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 10 17
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 22 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 1 21
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR.1: 45
  • FMT_MOF.1: 11
  • FMT_MSA.1: 90
  • FMT_MSA.3: 90
  • FMT_MTD.1: 23
  • FMT_SMF.1: 38
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 8
  • FMT_MSA.3.1: 8
  • FMT_MSA.3.2: 8
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 1
  • FMT_MOF.1: 27
  • FMT_MSA.1: 13
  • FMT_MSA.3: 13
  • FMT_MTD.1: 12
  • FMT_SMF.1: 17
  • FMT_SMR.1: 24
  • FMT_MSA.2: 4
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_MSA: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 11 27
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 90 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 8 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 90 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 8 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 8 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 23 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 38 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 45 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 16
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 11
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1: 15
  • FPT_RVM.1: 48
  • FPT_RVM.1.1: 1
  • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 11 15
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 12
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 1
  • FTP_TRP.1.3: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA1: 6
    • SHA-1: 4
  • SHA2:
    • SHA256: 3
  • SHA1:
    • SHA-1: 10
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA1: 6
  • SHA-1: 4
  • SHA-1: 10
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 4 10
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • other:
    • cold boot: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • X509:
    • X.509: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • ISO:
    • ISO/IEC 15408: 4
  • X509:
    • X.509: 2
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2005-08-001: 1
  • CCMB-2005-08-002: 1
  • CCMB-2005-08-003: 1
  • CCMB-2005-08-004: 1
pdf_data/st_keywords/standard_id/X509/X.509 3 2
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 10
  • AES:
    • AES: 4
  • Rijndael:
    • Rijndael: 1
  • RC:
    • RC4: 1
    • RC2: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 10 4
pdf_data/st_keywords/symmetric_crypto/DES
  • 3DES:
    • Triple-DES: 1
  • DES:
    • DES: 1
  • 3DES:
    • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 3
pdf_data/st_keywords/tls_cipher_suite/TLS
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_metadata//Author kurata-masami
pdf_data/st_metadata//CreationDate D:20150212093947+09'00' D:20080627112640+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 PScript5.dll Version 5.2
pdf_data/st_metadata//ModDate D:20150212093947+09'00' D:20080701133515+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 10.1.13 (Windows) Acrobat Distiller 6.0 (Windows)
pdf_data/st_metadata//Title Microsoft Word - C0169英文ST.doc
pdf_data/st_metadata/pdf_file_size_bytes 725871 1751341
pdf_data/st_metadata/pdf_number_of_pages 139 85
dgst d5444c5b63fb1db0 0e04b8dde56678a5