Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Xerox WorkCentre 7232/7242 Version: Controller+PS ROM Ver.1.203.0, IOT ROM Ver.4.7.0, IIT ROM Ver.20.4.1, ADF ROM Ver.20.0.0
JISEC-CC-CRP-C0147
Xerox Color 550/560 Printer Version:Controller ROM Ver. 1.203.1, IOT ROM Ver. 62.23.0, IIT ROM Ver. 6.13.0, ADF ROM Ver. 12.4.0
JISEC-CC-CRP-C0294
name Xerox WorkCentre 7232/7242 Version: Controller+PS ROM Ver.1.203.0, IOT ROM Ver.4.7.0, IIT ROM Ver.20.4.1, ADF ROM Ver.20.0.0 Xerox Color 550/560 Printer Version:Controller ROM Ver. 1.203.1, IOT ROM Ver. 62.23.0, IIT ROM Ver. 6.13.0, ADF ROM Ver. 12.4.0
not_valid_before 2008-02-28 2011-06-23
not_valid_after 2013-01-17 2016-07-04
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080521_c0147_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0294_est.pdf
security_level EAL2 ALC_FLR.2, EAL3+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080521_c0147_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0294_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None})
state/report/pdf_hash 6d144cec3a8508eb0b25bab2932caa3440560e0f8f8788b756c910e13b6865fb 8ca83f92ba2f79bad373f70552ac4425abbca9d2da8706bbf8107594bfa578a8
state/report/txt_hash b2550f54074a16047bd96c0f5c155f26c227862b82f8d041ad5c086db3af284e 09a2e4c5801394c6efe1b13162ba9dcae984078fe9f6d191d12192ec2031b88c
state/st/pdf_hash dedd317bd26800a6ca4a7f8bd363504aa38d5b7754bbed95d49236e8d76127b1 92d2f1a77903cdef52f499be8d90d1b37b2515310b60c6fecfbcd3046ba466eb
state/st/txt_hash 64857c52f4c1346430dd804c0449c44324a3c7a417df1098a01fe430791439b6 6e8a175b960d79aa20b676b0d1caf968a7fa125f7d57c81711a8d85170dc4573
heuristics/cert_id JISEC-CC-CRP-C0147 JISEC-CC-CRP-C0294
heuristics/extracted_versions 4.7.0, 1.203.0, 20.0.0, 20.4.1 1.203.1, 62.23.0, 12.4.0, 6.13.0
heuristics/scheme_data/cert_id C0147 C0294
heuristics/scheme_data/certification_date 2008-02 2011-06
heuristics/scheme_data/claim EAL2 EAL3+ ALC_FLR.2 PP
heuristics/scheme_data/enhanced
  • product: Xerox WorkCentre 7232/7242
  • toe_version: Controller+PS ROM Ver.1.203.0 IOT ROM Ver.4.7.0 IIT ROM Ver.20.4.1 ADF ROM Ver.20.0.0
  • product_type: IT Product (Multi Function Peripheral)
  • certification_date: 2008-02-28
  • cc_version: 2.3
  • assurance_level: EAL2
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center
  • report_link: https://www.ipa.go.jp/en/security/c0147_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0147_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0147_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
  • product: Xerox Color 550/560 Printer
  • toe_version: Controller ROM Ver. 1.203.1 IOT ROM Ver. 62.23.0 IIT ROM Ver. 6.13.0 ADF ROM Ver. 12.4.0
  • product_type: Multi Function Device
  • certification_date: 2011-06-23
  • cc_version: 3.1
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1-2009
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0294_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0294_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0294_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/assurance_level EAL2 EAL3 Augmented with ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 2.3 3.1
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0147_eimg.pdf https://www.ipa.go.jp/en/security/c0294_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2008-02-28 2011-06-23
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Information Technology Security Center Evaluation Department
heuristics/scheme_data/enhanced/product Xerox WorkCentre 7232/7242 Xerox Color 550/560 Printer
heuristics/scheme_data/enhanced/product_type IT Product (Multi Function Peripheral) Multi Function Device
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0147_erpt.pdf https://www.ipa.go.jp/en/security/c0294_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0147_est.pdf https://www.ipa.go.jp/en/security/c0294_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller+PS ROM Ver.1.203.0 IOT ROM Ver.4.7.0 IIT ROM Ver.20.4.1 ADF ROM Ver.20.0.0 Controller ROM Ver. 1.203.1 IOT ROM Ver. 62.23.0 IIT ROM Ver. 6.13.0 ADF ROM Ver. 12.4.0
heuristics/scheme_data/expiration_date 2013-03 2016-07
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0147_it7183.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0294_it0305.html
heuristics/scheme_data/toe_overseas_name Xerox WorkCentre 7232/7242 Controller+PS ROM Ver.1.203.0 IOT ROM Ver.4.7.0 IIT ROM Ver.20.4.1 ADF ROM Ver.20.0.0 Xerox Color 550/560 Printer Controller ROM Ver. 1.203.1, IOT ROM Ver. 62.23.0, IIT ROM Ver. 6.13.0, ADF ROM Ver. 12.4.0
pdf_data/report_filename 20080521_c0147_erpt.pdf c0294_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0147-01: 1
  • Certification No. C0147: 1
  • CRP-C0294-01: 1
  • Certification No. C0294: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 1
  • A.SECMODE: 1
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
pdf_data/report_keywords/cc_claims/A/A.ADMIN 1 2
pdf_data/report_keywords/cc_claims/T
  • T.RECOVER: 1
  • T.CONFDATA: 1
  • T.DATA_SEC: 1
  • T.COMM_TAP: 1
  • T.CONSUME: 1
  • T.DOC: 4
  • T.FUNC: 2
  • T.CONF: 4
  • T.PROT: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL3: 4
  • EAL3 augmented: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2005-08-001: 2
  • CCMB-2005-08-002: 2
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-004: 2
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 165021
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
  • /ModDate: D:20080520174820+09'00'
  • /CreationDate: D:20080520174820+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 539980
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110725135724+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110725135811+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20080520174820+09'00' D:20110725135724+09'00'
pdf_data/report_metadata//ModDate D:20080520174820+09'00' D:20110725135811+09'00'
pdf_data/report_metadata//Producer Acrobat Distiller 6.0 (Windows) Acrobat Distiller 8.3.0 (Windows)
pdf_data/report_metadata//Title untitled CRP-e
pdf_data/report_metadata/pdf_file_size_bytes 165021 539980
pdf_data/report_metadata/pdf_is_encrypted False True
pdf_data/report_metadata/pdf_number_of_pages 26 36
pdf_data/st_filename 20080521_c0147_est.pdf c0294_est.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.AUDITS: 10
    • O.CIPHER: 7
    • O.COMM_SEC: 8
    • O.FAX_SEC: 6
    • O.MANAGE: 10
    • O.RESIDUAL: 7
    • O.USER: 8
    • O.RESTRICT: 8
  • T:
    • T.RECOVER: 4
    • T.CONFDATA: 3
    • T.DATA_SEC: 3
    • T.COMM_TAP: 4
    • T.CONSUME: 4
  • A:
    • A.ADMIN: 4
    • A.SECMODE: 3
  • OE:
    • OE.ADMIN: 4
    • OE.AUTH: 8
    • OE.COMMS_SEC: 6
    • OE.FUNCTION: 8
  • D:
    • D.FUNC: 64
    • D.PROT: 3
    • D.DOC: 70
    • D.CONF: 7
  • O:
    • O.PROT: 1
    • O.AUDIT_STORAGE: 9
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 9
    • O.DOC: 16
    • O.FUNC: 8
    • O.CONF: 16
    • O.USER: 13
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
    • O.AUDIT_STORAG: 1
  • T:
    • T.PROT: 1
    • T.DOC: 7
    • T.CONF: 7
    • T.FUNC: 3
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 11
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 4
  • A.SECMODE: 3
  • A.ACCESS: 3
  • A.USER: 3
  • A.ADMIN: 6
pdf_data/st_keywords/cc_claims/A/A.ADMIN 4 6
pdf_data/st_keywords/cc_claims/O
  • O.AUDITS: 10
  • O.CIPHER: 7
  • O.COMM_SEC: 8
  • O.FAX_SEC: 6
  • O.MANAGE: 10
  • O.RESIDUAL: 7
  • O.USER: 8
  • O.RESTRICT: 8
  • O.PROT: 1
  • O.AUDIT_STORAGE: 9
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 9
  • O.DOC: 16
  • O.FUNC: 8
  • O.CONF: 16
  • O.USER: 13
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDIT_STORAG: 1
pdf_data/st_keywords/cc_claims/O/O.CIPHER 7 9
pdf_data/st_keywords/cc_claims/O/O.USER 8 13
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 4
  • OE.AUTH: 8
  • OE.COMMS_SEC: 6
  • OE.FUNCTION: 8
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 11
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 4 6
pdf_data/st_keywords/cc_claims/T
  • T.RECOVER: 4
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 4
  • T.CONSUME: 4
  • T.PROT: 1
  • T.DOC: 7
  • T.CONF: 7
  • T.FUNC: 3
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 6
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 7
  • ADV:
    • ADV_FSP.1: 12
    • ADV_RCR.1: 7
    • ADV_HLD.1: 6
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 7
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 6
    • ATE_IND.2: 5
  • AVA:
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.2: 5
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.1: 12
  • ADV_RCR.1: 7
  • ADV_HLD.1: 6
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_ADM.1: 8
  • AGD_USR.1: 7
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 5
  • ATE_FUN.1: 6
  • ATE_IND.2: 5
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 6 1
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 5 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_SOF.1: 3
  • AVA_VLA.1: 3
  • AVA_VAN.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 8
  • EAL 2: 2
  • EAL3: 2
  • EAL 3: 1
  • EAL3 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 17
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 13
    • FAU_SAR.2: 14
    • FAU_STG.1: 14
    • FAU_STG.4: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_COP.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACF.1: 12
    • FDP_IFC.1: 14
    • FDP_IFF.1: 12
    • FDP_RIP.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
  • FIA:
    • FIA_AFL.1: 28
    • FIA_UAU.2: 23
    • FIA_UAU.7: 17
    • FIA_UID.2: 21
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU.1: 4
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_UIA.2: 1
    • FIA_UID: 1
    • FIA_UAU: 1
  • FMT:
    • FMT_MOF.1: 27
    • FMT_MSA.1: 13
    • FMT_MSA.3: 13
    • FMT_MTD.1: 12
    • FMT_SMF.1: 17
    • FMT_SMR.1: 24
    • FMT_MSA.2: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
    • FMT_MSA: 2
  • FPT:
    • FPT_STM.1: 15
    • FPT_RVM.1: 48
    • FPT_RVM.1.1: 1
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.2: 7
    • FAU_SAR.1: 10
    • FAU_SAR.2: 7
    • FAU_STG.1: 11
    • FAU_STG.4: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 9
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
    • FCS_COP: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ACC.1: 97
    • FDP_ACF.1: 90
    • FDP_RIP.1: 9
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 8
    • FDP_ACF.1.1: 8
    • FDP_ACF.1.2: 8
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 8
  • FIA:
    • FIA_AFL.1: 35
    • FIA_ATD.1: 11
    • FIA_SOS.1: 6
    • FIA_UAU.1: 18
    • FIA_UAU.7: 8
    • FIA_UID.1: 23
    • FIA_USB.1: 7
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMR.1: 43
    • FMT_MOF.1: 10
    • FMT_MSA.1: 88
    • FMT_MSA.3: 90
    • FMT_MTD.1: 21
    • FMT_SMF.1: 37
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 8
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 15
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 17
  • FAU_GEN.1.2: 1
  • FAU_SAR.1: 13
  • FAU_SAR.2: 14
  • FAU_STG.1: 14
  • FAU_STG.4: 12
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG: 1
  • FAU_GEN: 1
  • FAU_GEN.1: 15
  • FAU_GEN.2: 7
  • FAU_SAR.1: 10
  • FAU_SAR.2: 7
  • FAU_STG.1: 11
  • FAU_STG.4: 7
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 17 15
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 13 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 14 7
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 14 11
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 12 7
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 18
  • FCS_COP.1: 15
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 1
  • FCS_CKM.4: 4
  • FCS_COP.1.1: 1
  • FCS_CKM.1: 12
  • FCS_COP.1: 9
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 18 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 4 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 15 9
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 15
  • FDP_ACF.1: 12
  • FDP_IFC.1: 14
  • FDP_IFF.1: 12
  • FDP_RIP.1: 13
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF.1.6: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
  • FDP_ACC: 4
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACC.1: 97
  • FDP_ACF.1: 90
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 8
  • FDP_ACF.1.1: 8
  • FDP_ACF.1.2: 8
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 15 97
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 1 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 12 90
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 1 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 1 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 1 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 1 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 14 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 13 9
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 28
  • FIA_UAU.2: 23
  • FIA_UAU.7: 17
  • FIA_UID.2: 21
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UAU.1: 4
  • FIA_UAU.2.1: 1
  • FIA_UID.1: 10
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_UIA.2: 1
  • FIA_UID: 1
  • FIA_UAU: 1
  • FIA_AFL.1: 35
  • FIA_ATD.1: 11
  • FIA_SOS.1: 6
  • FIA_UAU.1: 18
  • FIA_UAU.7: 8
  • FIA_UID.1: 23
  • FIA_USB.1: 7
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 28 35
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 2 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 2 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 4 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 17 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 10 23
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MOF.1: 27
  • FMT_MSA.1: 13
  • FMT_MSA.3: 13
  • FMT_MTD.1: 12
  • FMT_SMF.1: 17
  • FMT_SMR.1: 24
  • FMT_MSA.2: 4
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_MSA: 2
  • FMT_SMR.1: 43
  • FMT_MOF.1: 10
  • FMT_MSA.1: 88
  • FMT_MSA.3: 90
  • FMT_MTD.1: 21
  • FMT_SMF.1: 37
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 8
  • FMT_MSA.3.1: 8
  • FMT_MSA.3.2: 8
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 27 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 13 88
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 1 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 13 90
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 1 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 1 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 12 21
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 17 37
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 24 43
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 2 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 15
  • FPT_RVM.1: 48
  • FPT_RVM.1.1: 1
  • FPT_STM.1.1: 1
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 15
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 9
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 15 9
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_TRP.1: 12
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 1
  • FTP_TRP.1.3: 1
  • FTP_ITC.1: 12
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Job Flow A function to enable efficient standard: 1
pdf_data/st_keywords/side_channel_analysis
  • other:
    • cold boot: 1
  • FI:
    • malfunction: 2
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • ISO:
    • ISO/IEC 15408: 4
  • X509:
    • X.509: 2
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • X509:
    • X.509: 3
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2005-08-001: 1
  • CCMB-2005-08-002: 1
  • CCMB-2005-08-003: 1
  • CCMB-2005-08-004: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/X509/X.509 2 3
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 4
  • Rijndael:
    • Rijndael: 1
  • RC:
    • RC4: 1
    • RC2: 1
  • AES:
    • AES: 7
  • RC:
    • RC4: 1
    • RC2: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 4 7
pdf_data/st_metadata
  • pdf_file_size_bytes: 1165089
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 84
  • /ModDate: D:20080313114449+09'00'
  • /CreationDate: D:20080313114449+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1275224
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 138
  • /ModDate: D:20110715161232+09'00'
  • /CreationDate: D:20110715161232+09'00'
  • /Title: Microsoft Word - C0294_ST_e.doc
  • /Creator: PScript5.dll Version 5.2.2
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Author:
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20080313114449+09'00' D:20110715161232+09'00'
pdf_data/st_metadata//ModDate D:20080313114449+09'00' D:20110715161232+09'00'
pdf_data/st_metadata//Title untitled Microsoft Word - C0294_ST_e.doc
pdf_data/st_metadata/pdf_file_size_bytes 1165089 1275224
pdf_data/st_metadata/pdf_number_of_pages 84 138
dgst d57f98afccd658ac b12c1b95b13a9e98