Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Xerox Color C60/C70 Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3
JISEC-CC-CRP-C0462
Xerox Color 550/560 Printer Version:Controller ROM Ver. 1.203.1, IOT ROM Ver. 62.23.0, IIT ROM Ver. 6.13.0, ADF ROM Ver. 12.4.0
JISEC-CC-CRP-C0294
name Xerox Color C60/C70 Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3 Xerox Color 550/560 Printer Version:Controller ROM Ver. 1.203.1, IOT ROM Ver. 62.23.0, IIT ROM Ver. 6.13.0, ADF ROM Ver. 12.4.0
not_valid_before 2014-12-25 2011-06-23
not_valid_after 2020-01-06 2016-07-04
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0462_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0294_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0462_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0294_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None})
state/report/pdf_hash c3480070f41b787b13414cf14214d18acbe6130954144205981ab2e62ec3b990 8ca83f92ba2f79bad373f70552ac4425abbca9d2da8706bbf8107594bfa578a8
state/report/txt_hash 08e7eb37cc2f73b03fb4040029795e679cd250c24f787f903dec0b2a8d332e26 09a2e4c5801394c6efe1b13162ba9dcae984078fe9f6d191d12192ec2031b88c
state/st/pdf_hash 635cdf346eb4ce86564cc182bcb3dd9b3a8b1e0513827f41d1349a9fe354a6cf 92d2f1a77903cdef52f499be8d90d1b37b2515310b60c6fecfbcd3046ba466eb
state/st/txt_hash 4c28d0a5a844e02bd0ff7550f69d9839ce3d8869ec7d1977bad1dee3ce246740 6e8a175b960d79aa20b676b0d1caf968a7fa125f7d57c81711a8d85170dc4573
heuristics/cert_id JISEC-CC-CRP-C0462 JISEC-CC-CRP-C0294
heuristics/extracted_versions 1.200.17, 13.19.3, 67.20.0 1.203.1, 62.23.0, 12.4.0, 6.13.0
heuristics/scheme_data/cert_id C0462 C0294
heuristics/scheme_data/certification_date 2014-12 2011-06
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP EAL3+ ALC_FLR.2 PP
heuristics/scheme_data/enhanced/cc_version 3.1 Release4 3.1
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0462_eimg.pdf https://www.ipa.go.jp/en/security/c0294_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2014-12-25 2011-06-23
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data. PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/product Xerox Color C60/C70 Xerox Color 550/560 Printer
heuristics/scheme_data/enhanced/protection_profile IEEE Std 2600.1™-2009 IEEE Std 2600.1-2009
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0462_erpt.pdf https://www.ipa.go.jp/en/security/c0294_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0462_est.pdf https://www.ipa.go.jp/en/security/c0294_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3 Controller ROM Ver. 1.203.1 IOT ROM Ver. 62.23.0 IIT ROM Ver. 6.13.0 ADF ROM Ver. 12.4.0
heuristics/scheme_data/expiration_date 2020-01 2016-07
heuristics/scheme_data/supplier Fuji Xerox Co., Ltd. Fuji Xerox Co., Ltd.
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0462_it4496.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0294_it0305.html
heuristics/scheme_data/toe_overseas_name Xerox Color C60/C70 Controller ROM Ver. 1.200.17, IOT ROM Ver. 67.20.0, ADF ROM Ver. 13.19.3 Xerox Color 550/560 Printer Controller ROM Ver. 1.203.1, IOT ROM Ver. 62.23.0, IIT ROM Ver. 6.13.0, ADF ROM Ver. 12.4.0
pdf_data/report_filename c0462_erpt.pdf c0294_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0462-01: 1
  • Certification No. C0462: 1
  • CRP-C0294-01: 1
  • Certification No. C0294: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • IPsec:
    • IPsec: 7
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • TLS:
    • TLS: 2
  • SSL:
    • SSL: 1
pdf_data/report_keywords/eval_facility/ITSC/Information Technology Security Center 4 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 5
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 2 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 15
pdf_data/report_metadata
  • pdf_file_size_bytes: 377540
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
  • /CreationDate: D:20150217171824+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150217171848+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 539980
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110725135724+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110725135811+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20150217171824+09'00' D:20110725135724+09'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 Word 用 Acrobat PDFMaker 8.1
pdf_data/report_metadata//ModDate D:20150217171848+09'00' D:20110725135811+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 8.3.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 377540 539980
pdf_data/report_metadata/pdf_number_of_pages 37 36
pdf_data/st_filename c0462_est.pdf c0294_est.pdf
pdf_data/st_keywords/cc_claims/D/D.CONF 13 7
pdf_data/st_keywords/cc_claims/D/D.DOC 62 70
pdf_data/st_keywords/cc_claims/D/D.FUNC 53 64
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT_STORAGE: 10
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 8
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.PROT: 1
  • O.AUDIT_STORAGE: 9
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 9
  • O.DOC: 16
  • O.FUNC: 8
  • O.CONF: 16
  • O.USER: 13
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDIT_STORAG: 1
pdf_data/st_keywords/cc_claims/O/O.AUDIT_STORAGE 10 9
pdf_data/st_keywords/cc_claims/O/O.CIPHER 8 9
pdf_data/st_keywords/cc_claims/O/O.PROT 8 1
pdf_data/st_keywords/cc_claims/O/O.USER 14 13
pdf_data/st_keywords/cc_claims/OE/OE.USER 12 11
pdf_data/st_keywords/cc_claims/T/T.CONF 6 7
pdf_data/st_keywords/cc_claims/T/T.DOC 6 7
pdf_data/st_keywords/cc_claims/T/T.PROT 3 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 14 15
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 9 7
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 9 7
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 9 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 11 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 98 97
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 35
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 18
  • FIA_UAU.7: 10
  • FIA_UID.1: 22
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID.2: 1
  • FIA_AFL.1: 35
  • FIA_ATD.1: 11
  • FIA_SOS.1: 6
  • FIA_UAU.1: 18
  • FIA_UAU.7: 8
  • FIA_UID.1: 23
  • FIA_USB.1: 7
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 10 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 22 23
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 9 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 11 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 90 88
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 23 21
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 38 37
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 45 43
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 16 15
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 11 9
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 13 12
pdf_data/st_keywords/certification_process/ConfidentialDocument
  • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
  • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Job Flow A function to enable efficient standard: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA1: 6
    • SHA-1: 4
  • SHA2:
    • SHA256: 3
  • SHA1:
    • SHA-1: 10
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA1: 6
  • SHA-1: 4
  • SHA-1: 10
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 4 10
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 10
  • AES:
    • AES: 7
  • RC:
    • RC4: 1
    • RC2: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 10 7
pdf_data/st_keywords/symmetric_crypto/DES
  • 3DES:
    • Triple-DES: 1
  • DES:
    • DES: 1
  • 3DES:
    • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 3
pdf_data/st_keywords/tls_cipher_suite/TLS
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
  • TLS_RSA_WITH_AES_128_CBC_SHA: 1
  • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_metadata//CreationDate D:20150212093947+09'00' D:20110715161232+09'00'
pdf_data/st_metadata//ModDate D:20150212093947+09'00' D:20110715161232+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 10.1.13 (Windows) Acrobat Distiller 6.0 (Windows)
pdf_data/st_metadata//Title Microsoft Word - C0294_ST_e.doc
pdf_data/st_metadata/pdf_file_size_bytes 725871 1275224
pdf_data/st_metadata/pdf_number_of_pages 139 138
dgst d5444c5b63fb1db0 b12c1b95b13a9e98