Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Xerox D136 Copier/Printer Version:Controller+PS ROM Ver. 1.200.6, IOT ROM Ver. 113.27.0, IIT ROM Ver. 13.1.0, ADF ROM Ver. 13.17.1
JISEC-CC-CRP-C0411
Xerox WorkCentre 7232/7242 Version: Controller+PS ROM Ver.1.203.0, IOT ROM Ver.4.7.0, IIT ROM Ver.20.4.1, ADF ROM Ver.20.0.0
JISEC-CC-CRP-C0147
name Xerox D136 Copier/Printer Version:Controller+PS ROM Ver. 1.200.6, IOT ROM Ver. 113.27.0, IIT ROM Ver. 13.1.0, ADF ROM Ver. 13.17.1 Xerox WorkCentre 7232/7242 Version: Controller+PS ROM Ver.1.203.0, IOT ROM Ver.4.7.0, IIT ROM Ver.20.4.1, ADF ROM Ver.20.0.0
not_valid_before 2013-10-30 2008-02-28
not_valid_after 2018-11-26 2013-01-17
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0411_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080521_c0147_est.pdf
security_level ALC_FLR.2, EAL3+ EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0411_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080521_c0147_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})})
state/report/pdf_hash 9b7e68f4d1611eee21db3ef5c848e2eb6d9c0797042436126869a245408864cf 6d144cec3a8508eb0b25bab2932caa3440560e0f8f8788b756c910e13b6865fb
state/report/txt_hash cb203ef06787f0615cf98c6bd482baa9ea111994c259c9d433bdc8fc6ec58fba b2550f54074a16047bd96c0f5c155f26c227862b82f8d041ad5c086db3af284e
state/st/pdf_hash 08cdb654349f93f61620bb49808263b28992a2841303450b143d63c7bb781f39 dedd317bd26800a6ca4a7f8bd363504aa38d5b7754bbed95d49236e8d76127b1
state/st/txt_hash 583ade20bbb7d7935244dff719280c08f643277a62c49fab050063a4e7cfcbe5 64857c52f4c1346430dd804c0449c44324a3c7a417df1098a01fe430791439b6
heuristics/cert_id JISEC-CC-CRP-C0411 JISEC-CC-CRP-C0147
heuristics/extracted_versions 13.1.0, 13.17.1, 1.200.6, 113.27.0 4.7.0, 1.203.0, 20.0.0, 20.4.1
heuristics/scheme_data/cert_id C0411 C0147
heuristics/scheme_data/certification_date 2013-10 2008-02
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP EAL2
heuristics/scheme_data/enhanced
  • product: Xerox D136 Copier/Printer
  • toe_version: Controller+PS ROM Ver. 1.200.6 IOT ROM Ver. 113.27.0 IIT ROM Ver. 13.1.0 ADF ROM Ver. 13.17.1
  • product_type: Multi Function Device
  • certification_date: 2013-10-30
  • cc_version: 3.1 Release4
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1-2009
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0411_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0411_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0411_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data.
  • product: Xerox WorkCentre 7232/7242
  • toe_version: Controller+PS ROM Ver.1.203.0 IOT ROM Ver.4.7.0 IIT ROM Ver.20.4.1 ADF ROM Ver.20.0.0
  • product_type: IT Product (Multi Function Peripheral)
  • certification_date: 2008-02-28
  • cc_version: 2.3
  • assurance_level: EAL2
  • vendor: Fuji Xerox Co., Ltd.
  • evaluation_facility: Information Technology Security Center
  • report_link: https://www.ipa.go.jp/en/security/c0147_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0147_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0147_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
heuristics/scheme_data/enhanced/assurance_level EAL3 Augmented with ALC_FLR.2 EAL2
heuristics/scheme_data/enhanced/cc_version 3.1 Release4 2.3
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0411_eimg.pdf https://www.ipa.go.jp/en/security/c0147_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2013-10-30 2008-02-28
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data. PRODUCT DESCRIPTION Description of TOE The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Evaluation Department Information Technology Security Center
heuristics/scheme_data/enhanced/product Xerox D136 Copier/Printer Xerox WorkCentre 7232/7242
heuristics/scheme_data/enhanced/product_type Multi Function Device IT Product (Multi Function Peripheral)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0411_erpt.pdf https://www.ipa.go.jp/en/security/c0147_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0411_est.pdf https://www.ipa.go.jp/en/security/c0147_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller+PS ROM Ver. 1.200.6 IOT ROM Ver. 113.27.0 IIT ROM Ver. 13.1.0 ADF ROM Ver. 13.17.1 Controller+PS ROM Ver.1.203.0 IOT ROM Ver.4.7.0 IIT ROM Ver.20.4.1 ADF ROM Ver.20.0.0
heuristics/scheme_data/expiration_date 2018-11 2013-03
heuristics/scheme_data/supplier Fuji Xerox Co., Ltd. Fuji Xerox Co., Ltd.
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0411_it3451.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0147_it7183.html
heuristics/scheme_data/toe_overseas_name Xerox D136 Copier/Printer Controller+PS ROM Ver. 1.200.6, IOT ROM Ver. 113.27.0, IIT ROM Ver. 13.1.0, ADF ROM Ver. 13.17.1 Xerox WorkCentre 7232/7242 Controller+PS ROM Ver.1.203.0 IOT ROM Ver.4.7.0 IIT ROM Ver.20.4.1 ADF ROM Ver.20.0.0
pdf_data/report_filename c0411_erpt.pdf 20080521_c0147_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0411-01: 1
  • Certification No. C0411: 1
  • CRP-C0147-01: 1
  • Certification No. C0147: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.ADMIN: 1
  • A.SECMODE: 1
pdf_data/report_keywords/cc_claims/A/A.ADMIN 2 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 4
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
  • T.RECOVER: 1
  • T.CONFDATA: 1
  • T.DATA_SEC: 1
  • T.COMM_TAP: 1
  • T.CONSUME: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 2
  • EAL2: 3
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
    • print data from the printer driver of user client to the MFD. Therefore, the following function is out of scope of the evaluated security functions. - Printer driver requires a user to enter user ID and password: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL 3.0: 1
      • SSL: 1
    • TLS:
      • TLS 1.0: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2005-08-001: 2
  • CCMB-2005-08-002: 2
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 10
pdf_data/report_metadata
  • pdf_file_size_bytes: 335515
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
  • /CreationDate: D:20131216144108+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20131216144135+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 165021
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
  • /ModDate: D:20080520174820+09'00'
  • /CreationDate: D:20080520174820+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20131216144108+09'00' D:20080520174820+09'00'
pdf_data/report_metadata//ModDate D:20131216144135+09'00' D:20080520174820+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 6.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 335515 165021
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 37 26
pdf_data/st_filename c0411_est.pdf 20080521_c0147_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.FUNC: 59
    • D.DOC: 61
    • D.PROT: 3
    • D.CONF: 13
  • O:
    • O.AUDIT_STORAGE: 9
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 9
    • O.DOC: 16
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 14
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
    • O.AUDIT_STORAG: 1
  • T:
    • T.DOC: 7
    • T.CONF: 7
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 12
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
  • O:
    • O.AUDITS: 10
    • O.CIPHER: 7
    • O.COMM_SEC: 8
    • O.FAX_SEC: 6
    • O.MANAGE: 10
    • O.RESIDUAL: 7
    • O.USER: 8
    • O.RESTRICT: 8
  • T:
    • T.RECOVER: 4
    • T.CONFDATA: 3
    • T.DATA_SEC: 3
    • T.COMM_TAP: 4
    • T.CONSUME: 4
  • A:
    • A.ADMIN: 4
    • A.SECMODE: 3
  • OE:
    • OE.ADMIN: 4
    • OE.AUTH: 8
    • OE.COMMS_SEC: 6
    • OE.FUNCTION: 8
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 3
  • A.USER: 3
  • A.ADMIN: 6
  • A.ADMIN: 4
  • A.SECMODE: 3
pdf_data/st_keywords/cc_claims/A/A.ADMIN 6 4
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT_STORAGE: 9
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 9
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
  • O.AUDIT_STORAG: 1
  • O.AUDITS: 10
  • O.CIPHER: 7
  • O.COMM_SEC: 8
  • O.FAX_SEC: 6
  • O.MANAGE: 10
  • O.RESIDUAL: 7
  • O.USER: 8
  • O.RESTRICT: 8
pdf_data/st_keywords/cc_claims/O/O.CIPHER 9 7
pdf_data/st_keywords/cc_claims/O/O.USER 14 8
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 12
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
  • OE.ADMIN: 4
  • OE.AUTH: 8
  • OE.COMMS_SEC: 6
  • OE.FUNCTION: 8
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 6 4
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 7
  • T.CONF: 7
  • T.FUNC: 3
  • T.PROT: 3
  • T.RECOVER: 4
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 4
  • T.CONSUME: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.2: 5
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ACM:
    • ACM_CAP.2: 6
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 7
  • ADV:
    • ADV_FSP.1: 12
    • ADV_RCR.1: 7
    • ADV_HLD.1: 6
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 7
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 6
    • ATE_IND.2: 5
  • AVA:
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 1
  • ADV_FSP.1: 12
  • ADV_RCR.1: 7
  • ADV_HLD.1: 6
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_ADM.1: 8
  • AGD_USR.1: 7
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 5
  • ATE_FUN.1: 6
  • ATE_IND.2: 5
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 6
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 5
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_SOF.1: 3
  • AVA_VLA.1: 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 2
  • EAL 3: 1
  • EAL3 augmented: 1
  • EAL2: 8
  • EAL 2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.2: 9
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_STG.1: 10
    • FAU_STG.4: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_COP.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
    • FCS_COP: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ACC.1: 86
    • FDP_ACF.1: 80
    • FDP_RIP.1: 9
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 7
    • FDP_ACF.1.1: 7
    • FDP_ACF.1.2: 7
    • FDP_ACF.1.3: 7
    • FDP_ACF.1.4: 7
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 7
  • FIA:
    • FIA_AFL.1: 35
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.1: 18
    • FIA_UAU.7: 10
    • FIA_UID.2: 21
    • FIA_UID.1: 11
    • FIA_USB.1: 9
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UID: 4
  • FMT:
    • FMT_SMR.1: 43
    • FMT_MOF.1: 11
    • FMT_MSA.1: 79
    • FMT_MSA.3: 80
    • FMT_MTD.1: 22
    • FMT_SMF.1: 36
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 7
    • FMT_MSA.3.1: 7
    • FMT_MSA.3.2: 7
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 15
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 17
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 13
    • FAU_SAR.2: 14
    • FAU_STG.1: 14
    • FAU_STG.4: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_COP.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACF.1: 12
    • FDP_IFC.1: 14
    • FDP_IFF.1: 12
    • FDP_RIP.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
  • FIA:
    • FIA_AFL.1: 28
    • FIA_UAU.2: 23
    • FIA_UAU.7: 17
    • FIA_UID.2: 21
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU.1: 4
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_UIA.2: 1
    • FIA_UID: 1
    • FIA_UAU: 1
  • FMT:
    • FMT_MOF.1: 27
    • FMT_MSA.1: 13
    • FMT_MSA.3: 13
    • FMT_MTD.1: 12
    • FMT_SMF.1: 17
    • FMT_SMR.1: 24
    • FMT_MSA.2: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
    • FMT_MSA: 2
  • FPT:
    • FPT_STM.1: 15
    • FPT_RVM.1: 48
    • FPT_RVM.1.1: 1
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN: 1
  • FAU_GEN.1: 15
  • FAU_GEN.2: 9
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_STG.1: 10
  • FAU_STG.4: 9
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
  • FAU_GEN.1: 17
  • FAU_GEN.1.2: 1
  • FAU_SAR.1: 13
  • FAU_SAR.2: 14
  • FAU_STG.1: 14
  • FAU_STG.4: 12
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 15 17
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 13
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 9 14
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 10 14
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 9 12
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 12
  • FCS_COP.1: 11
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
  • FCS_CKM.1: 18
  • FCS_COP.1: 15
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 1
  • FCS_CKM.4: 4
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 12 18
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 11 15
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 4
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACC.1: 86
  • FDP_ACF.1: 80
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 7
  • FDP_ACF.1.1: 7
  • FDP_ACF.1.2: 7
  • FDP_ACF.1.3: 7
  • FDP_ACF.1.4: 7
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 7
  • FDP_ACC.1: 15
  • FDP_ACF.1: 12
  • FDP_IFC.1: 14
  • FDP_IFF.1: 12
  • FDP_RIP.1: 13
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF.1.6: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 86 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 80 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 7 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 9 13
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 35
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 18
  • FIA_UAU.7: 10
  • FIA_UID.2: 21
  • FIA_UID.1: 11
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID: 4
  • FIA_AFL.1: 28
  • FIA_UAU.2: 23
  • FIA_UAU.7: 17
  • FIA_UID.2: 21
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UAU.1: 4
  • FIA_UAU.2.1: 1
  • FIA_UID.1: 10
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_UIA.2: 1
  • FIA_UID: 1
  • FIA_UAU: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 35 28
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 4 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 4 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 18 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 10 17
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 4 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 11 10
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR.1: 43
  • FMT_MOF.1: 11
  • FMT_MSA.1: 79
  • FMT_MSA.3: 80
  • FMT_MTD.1: 22
  • FMT_SMF.1: 36
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 7
  • FMT_MSA.3.1: 7
  • FMT_MSA.3.2: 7
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 1
  • FMT_MOF.1: 27
  • FMT_MSA.1: 13
  • FMT_MSA.3: 13
  • FMT_MTD.1: 12
  • FMT_SMF.1: 17
  • FMT_SMR.1: 24
  • FMT_MSA.2: 4
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_MSA: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 11 27
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 79 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 7 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 80 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 7 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 7 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 22 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 36 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 43 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 15
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 11
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1: 15
  • FPT_RVM.1: 48
  • FPT_RVM.1.1: 1
  • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 11 15
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 12
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 1
  • FTP_TRP.1.3: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Job Flow A function to enable efficient standard: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • other:
    • cold boot: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • X509:
    • X.509: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • ISO:
    • ISO/IEC 15408: 4
  • X509:
    • X.509: 2
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2005-08-001: 1
  • CCMB-2005-08-002: 1
  • CCMB-2005-08-003: 1
  • CCMB-2005-08-004: 1
pdf_data/st_keywords/standard_id/X509/X.509 3 2
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 7
  • RC:
    • RC4: 1
    • RC2: 1
  • AES:
    • AES: 4
  • Rijndael:
    • Rijndael: 1
  • RC:
    • RC4: 1
    • RC2: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 4
pdf_data/st_metadata
  • pdf_file_size_bytes: 621279
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 133
  • /Author:
  • /CreationDate: D:20131216090059+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20131216090059+09'00'
  • /Producer: Acrobat Distiller 10.1.8 (Windows)
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1165089
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 84
  • /ModDate: D:20080313114449+09'00'
  • /CreationDate: D:20080313114449+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20131216090059+09'00' D:20080313114449+09'00'
pdf_data/st_metadata//ModDate D:20131216090059+09'00' D:20080313114449+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 10.1.8 (Windows) Acrobat Distiller 6.0 (Windows)
pdf_data/st_metadata//Title untitled
pdf_data/st_metadata/pdf_file_size_bytes 621279 1165089
pdf_data/st_metadata/pdf_number_of_pages 133 84
dgst de140f8f9bb75b61 d57f98afccd658ac