name |
Ruckus Solution |
Xerox D136 Copier/Printer Controller+PS ROM Ver. 1.200.15 |
category |
Network and Network-Related Devices and Systems |
Multi-Function Devices |
scheme |
NO |
JP |
status |
archived |
archived |
not_valid_after |
27.06.2021 |
28.09.2023 |
not_valid_before |
27.06.2016 |
28.09.2018 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0619_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160627_SERTIT-071_Ruckus%20Solution_CR_v.1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0619_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20Ruckus%20Wireless%20-%20Ruckus%20Solution%20final%20v1.8.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0619_est.pdf |
manufacturer |
Ruckus Wireless, Inc. |
Xerox Corporation |
manufacturer_web |
https://www.ruckuswireless.com/ |
https://www.xerox.com |
security_level |
EAL2+, ALC_FLR.1 |
EAL2+, ALC_CMC.2 |
dgst |
d942b6cb00b24266 |
bcacf791c1b68053 |
heuristics/cert_id |
SERTIT-071 |
JISEC-CC-CRP-C0619-01-2018 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ATE_IND.2, AGD_PRE.1, ALC_FLR.1, AGD_OPE.1, ADV_TDS.1, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ATE_FUN.1 |
ADV_ARC.1, ATE_IND.2, AGD_PRE.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ALC_FLR.2 |
heuristics/extracted_versions |
- |
1.200.15 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Network and Network-Related Devices and Systems
- certification_date: 27.06.2016
- developer: Ruckus Wireless, Inc.
- enhanced:
- category: Network and Network-Related Devices and Systems
- cert_id: SERTIT-071
- certification_date: 27.06.2016
- description: The Ruckus Solution (TOE) is a Wireless LAN access system (WLAN). The Wireless LAN access system defined in this ST are multiple products operating together to provide secure wireless access to a wired and wireless network. The TOE provides end-to-end wireless encryption, centralized WLAN management, authentication, authorization, and accounting (AAA) policy enforcement. SZ 100 SmartZoneâ„¢ 100 (SZ 100) is the most Scalable, Resilient, and Highest Performing Wireless LAN controller within Ruckus family of WLAN controllers for Enterprises around the world. It manages up to 1,024 ZoneFlex Smart Wi-Fi access points, 2,000 WLANs, and 25,000 clients per device. Its RuckOS' unique architecture enables SZ 100 to be deployed in 3+1 Active-Active cluster. With Active-Active clustering all members (up to 4) of cluster will actively manage APs in the network and also provides the highest resiliency. With clustering it can manage up to 3,000 APs and 60,000 clients. Its Smart licensing allows customers to manage all the licensing needs online at https://Support.ruckuswireless.com. With Smart licensing, customers will have the ability to buy and assign licenses as granular as 1 (one) AP license. vSCG Ruckus virtual SmartCellâ„¢ Gateway (vSCG), is a Network Functions Virtualization (NFV) based WLAN Controller for service providers and enterprises who desire a carrier-class solution that runs in the cloud. It supports all of the WLAN Controller features of the industry leading SCG-200, while also enabling the rollout of highly scalable and resilient wireless LAN cloud services. SCG-200 The SmartCellâ„¢ Gateway (SCG) 200 represents the first in a new category of scalable and versatile WLAN controllers with support for 3GPP compatible WLAN gateway functionality. It has been designed to eliminate the difficulties service providers and enterprises are experiencing when building and managing large-scale Wi-Fi radio access networks and integrating them into their core networks. R310 ZoneFlex R310 Smart Wi-Fi Indoor delivers high-performance and reliable wireless networking and combines patented adaptive antenna technology and automatic interference mitigation to deliver consistent, predictable performance. R500 The Ruckus ZoneFlex R500 delivers high-performance and reliable 802.11ac wireless networking at a competitive price point. Unlike any other 802.11ac wireless solution in its class, the ZoneFlex R500 combines patented adaptive antenna technology and automatic interference mitigation to deliver consistent, predictable performance at extended ranges with up to an additional 4dB of BeamFlex gain on top of the physical antenna gain and up to 10dB of interference mitigation. A sleek and low-profile design, the ZoneFlex R500 was purpose built for enterprises requiring reliable high speed client connectivity. It is ideal for a variety of medium density enterprise and hotspot environments including SMBs, hotels, retail outlets, and branch offices. R600 The Ruckus ZoneFlex R600 delivers high-performance and reliable 802.11ac wireless networking at a competitive price point for medium density venues such as in K-12 or education. The ZoneFlex R600 combines patented adaptive antenna technology and automatic interference mitigation to deliver consistent, predictable performance at extended ranges with up to an additional 6dB of BeamFlex gain on top of the physical antenna gain and up to 15dB of interference mitigation. The R600 is ideal for wireless networks servicing mobile devices with dual-polarized antennas that adapt in real time to maximize performance for the mobile enterprise. A sleek and low-profile design, the ZoneFlex R600 was purposebuilt for enterprises requiring reliable high speed client connectivity. It is ideal for a variety of medium density enterprise and hotspot environments including SMBs, hotels, and schools. R710 ZoneFlex R710 Smart Wi-Fi Indoor is purpose-built for high-capacity, high performance and interference-laden environments such as airports, public venues, hotels, universities and conference centers. Built for data-intensive streaming multimedia applications, for delivering of picture HD-quality IP video while supporting VoIP and data applications that have stringent quality of service requirements. The ZoneFlex T300 Series, are dual-band 802.11ac outdoor access points (AP) designed explicitly for high density public venues such as airports, conventions centers, plazas & malls, and other dense urban environments. Offered as either with an internal omni directional antennas or with optional external 5GHz antenna support, the T300 Series is designed for easy installation within an ultra-lightweight and low profile enclosure. The T300 is ideal for venue owners and enterprises looking to quickly and economically deploy Wi-Fi in high-capacity environments.
- developer: Ruckus Wireless, Inc.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135025-1607952560/SERTIT/Sertifikater/2016/71/20160627_SERTIT-071_Ruckus%20Solution_C_v.1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135028-1607952564/SERTIT/Sertifikater/2016/71/ST%20Ruckus%20Wireless%20-%20Ruckus%20Solution%20final%20v1.8.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135022-1607952557/SERTIT/Sertifikater/2016/71/20160627_SERTIT-071_Ruckus%20Solution_CR_v.1.0.pdf'})]})
- evaluation_facility: Advanced Data Security
- level: EAL 2, ALC_FLR.2
- mutual_recognition: CCRA
- product: Wireless Controllers: SmartCell Gateway 200 (SCG 200); Virtual SmartCell Gateway (vSCG); Smart Zone 100 (SZ 100); Access Points: ZoneFlex R500 Smart Wi-Fi Indoor (R500); ZoneFlex R600 Smart Wi-Fi Indoor (R600); ZoneFlex T300 Smart Wi-Fi Outdoor (T300); ZoneFlex R710 Smart Wi-Fi Indoor (R710); ZoneFlex R310 Smart Wi-Fi Indoor (R310); Software: RuckOS 3.2.1
- product: Ruckus Solution
- url: https://sertit.no/certified-products/product-archive/ruckus-solution-1
|
- cert_id: JISEC-CC-CRP-C0619
- certification_date: 01.09.2018
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release4
- cert_id: JISEC-CC-CRP-C0619
- cert_link: https://www.ipa.go.jp/en/security/c0619_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, and scan. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE Security functions To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Xerox D136 Copier/Printer
- product_type: Multi-Function Device
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/c0619_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0619_est.pdf
- toe_version: Controller+PS ROM Ver. 1.200.15
- vendor: Xerox Corporation
- expiration_date: 01.10.2023
- supplier: Xerox Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0619_it7651.html
- toe_overseas_name: Xerox D136 Copier/Printer Controller+PS ROM Ver. 1.200.15
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
43ce79b420f23a00 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
pdf_data/cert_filename |
|
c0619_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0619-01-2018: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20181004142528+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20181004142725+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 86194
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
20160627_SERTIT-071_Ruckus Solution_CR_v.1.0.pdf |
c0619_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0619-01-2018: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 21
- EAL 2 augmented: 20
- EAL1: 1
- EAL2: 1
- EAL7: 1
|
- EAL:
- EAL2: 6
- EAL2 augmented: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 1
- FAU_SAR.2: 1
- FAU_SAR.3: 1
- FAU_SEL.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FDP:
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FDP_RIP.1: 1
- FIA:
- FIA_ATD.1: 2
- FIA_UAU.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_ITT.1: 1
- FPT_STM.1: 1
- FPT_TST.1: 1
- FTA:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.AUDIT_GENERATION: 1
- O.CORRECT_TSF_OPERERATION: 1
- O.CRYPTOGRAPHY: 1
- O.INTEGRITY: 1
- O.MANAGE: 1
- O.MEDIATE: 1
- O.RESIDUAL_INFORMATION: 1
- O.SELF_PROTECTION: 1
- O.TOE_ACCESS: 1
- OE:
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
|
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ADS:
- Advanced Data Security: 1
|
- ITSC:
- Information Technology Security Center: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Arne
- /CreationDate: D:20160629100255+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20160629100452+02'00'
- /Producer: Acrobat Distiller 9.5.5 (Windows)
- /Title: Microsoft Word - 20160627 SERTIT-071 Ruckus Solution CR v.1.0
- pdf_file_size_bytes: 487135
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /CreationDate: D:20181220165622+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20181220165715+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 393296
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
pdf_data/st_filename |
ST Ruckus Wireless - Ruckus Solution final v1.8.pdf |
c0619_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 5
- EAL2 augmented: 4
|
- EAL:
- EAL 2: 1
- EAL2: 4
- EAL2 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR: 2
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_SEL: 1
- FAU_SEL.1: 5
- FAU_SEL.1.1: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 10
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 4
- FDP_IFC: 1
- FDP_IFC.1: 13
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_RIP: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD.1: 15
- FIA_ATD.1.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 9
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 3
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.2: 7
- FMT_MSA.2.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTP:
- FTP_TRP: 1
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAR: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 2
- FCS_COP: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 74
- FDP_ACC.1.1: 6
- FDP_ACF.1: 67
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 6
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 6
- FDP_IFC: 1
- FDP_IFC.1: 6
- FDP_IFF: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 21
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU: 3
- FIA_UAU.1: 8
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID: 4
- FIA_UID.1: 13
- FIA_UID.2: 20
- FIA_UID.2.1: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 76
- FMT_MSA.1.1: 6
- FMT_MSA.3: 68
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 6
- FMT_MTD.1: 21
- FMT_MTD.1.1: 2
- FMT_SMF.1: 33
- FMT_SMF.1.1: 1
- FMT_SMR.1: 37
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 16
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL: 3
- A.TRUSTED_ADMIN: 2
- O:
- O.AUDIT_: 1
- O.AUDIT_GENERATI: 1
- O.AUDIT_GENERATION: 7
- O.CORRECT_: 1
- O.CORRECT_TSF_: 3
- O.CORRECT_TSF_OPERERATION: 1
- O.CRYPTO-: 1
- O.CRYPTOGRAPHY: 9
- O.INTEGRITY: 6
- O.MANAGE: 13
- O.MEDIATE: 8
- O.RESIDUAL_: 4
- O.RESIDUAL_INFORMATION: 3
- O.SELF_: 1
- O.SELF_PROTECTION: 9
- O.TOE_: 1
- O.TOE_ACCESS: 10
- OE:
- OE.NO_: 1
- OE.NO_GENERAL_: 1
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 4
- OE.TRUSTED_: 1
- OE.TRUSTED_ADMIN: 9
|
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 13
- D.DOC: 54
- D.FUNC: 17
- D.PROT: 4
- O:
- O.AUDIT: 8
- O.AUDIT_ACCESS: 10
- O.AUDIT_STORAGE: 9
- O.CIPHER: 8
- O.CONF: 16
- O.DOC: 16
- O.FUNC: 8
- O.INTERFACE: 8
- O.PROT: 8
- O.SOFTWARE: 8
- O.USER: 14
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 4
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_STORAGE: 1
- OE.INTERFACE: 3
- OE.PHYISCAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
|
pdf_data/st_metadata |
- /Author: Admin
- /CreationDate: D:20160625221418-07'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20160625221418-07'00'
- /Producer: GPL Ghostscript 8.64
- /Title: Microsoft Word - ST Ruckus Wireless - Ruckus Solution final v1.8.docx
- pdf_file_size_bytes: 1087249
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
- /CreationDate: D:20181220110632+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20181220113201+09'00'
- /Producer: Acrobat Distiller 10.1.16 (Windows)
- /Subject: Security Target
- /Title: Xerox D136 Copier/Printer
- pdf_file_size_bytes: 738511
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 124
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |