Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00
JISEC-CC-CRP-C0324
Fuji Xerox DocuCentre-VI C2264 model with Hard Disk, Data Security, Scan, and Fax Controller ROM Ver. 1.1.3, FAX ROM Ver. 2.2.0
JISEC-CC-CRP-C0634-01-2019
name Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 Fuji Xerox DocuCentre-VI C2264 model with Hard Disk, Data Security, Scan, and Fax Controller ROM Ver. 1.1.3, FAX ROM Ver. 2.2.0
not_valid_before 2011-10-14 2019-03-18
not_valid_after 2016-11-02 2024-03-18
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0324_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0634_est.pdf
manufacturer Ricoh Company, Ltd. FUJIFILM Business Innovation Corp.
manufacturer_web https://www.ricoh.com/ https://www.fujifilm.com/fb/eng
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0324_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0634_erpt.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0634_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None 0b54aa75d538ebabc29ba3ed8e355894f2054839fd13f926aed322f799638fc7
state/cert/txt_hash None e3ccb4c575b541d4c49d1b207f31421eaa03514fa56eb991d6640bf335c05153
state/report/pdf_hash c99bfa411153f6739d35e947e6e2fe231f1476de334797c3de52a3fc103f05d7 0b54bed36b05dc5182a6b29597741d31f84f909d2f11f8fd17880e0aa67fa384
state/report/txt_hash 202148d67161552b8976b0766b4ae90eaaea680d8fb8ef44949429e9beee7318 fe0f0e747c58131cdfba5aaef1faff111d7173c1f716cb2090dde5f650b96b80
state/st/pdf_hash a24fecaa0f45dde0413d07abc0decee8428f8483cbbf6797c05e3184561ac05a d5ba946045959011e6c380dcca03a5de4b9146eef891f319b288f441283006c4
state/st/txt_hash eab6084ecbaae846a327faa76daae36bba9fb33108e20ac81256c126a1c525c9 6f14a0388ac6a7abe8206f5d5f40041cb53b39d9c7ff17a9554e5eb2d2a7bef2
heuristics/cert_id JISEC-CC-CRP-C0324 JISEC-CC-CRP-C0634-01-2019
heuristics/extracted_versions 10.54, 01.11.1, 1.01, 02.01.00, 2.02, 1.06, 1.03, 03.00.00, 1.00.4, 3.10.14, 1.00, 01.00.00 2.2.0, 1.1.3
heuristics/scheme_data/cert_id C0324 C0634
heuristics/scheme_data/certification_date 2011-10 2019-03
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
heuristics/scheme_data/enhanced
  • product: Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24
  • toe_version: -Software version: System/Copy 2.02 Network Support 10.54 Scanner 01.11.1 Printer 1.00.4 Fax 02.01.00 RemoteFax 01.00.00 Web Support 1.06 Web Uapl 1.01 NetworkDocBox 1.01 animation 1.00 RPCS 3.10.14 RPCS Font 1.00 Engine 1.03:03 OpePanel 1.06 LANG0 1.06 LANG1 1.06 Data Erase Std 1.01x -Hardware version: Ic Key 01020700 Ic Ctlr 03 -Option version: GWFCU3-21(WW) 03.00.00
  • product_type: Multi Function Product
  • certification_date: 2011-10-14
  • cc_version: 3.1
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1-2009
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0324_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0324_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0324_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: Fuji Xerox DocuCentre-VI C2264 model with Hard Disk, Data Security, Scan, and Fax
  • toe_version: Controller ROM Ver. 1.1.3, FAX ROM Ver. 2.2.0
  • product_type: Multi-Function Device
  • cert_id: JISEC-C0634
  • certification_date: 2019-03-18
  • cc_version: 3.1 Release5
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: FUJIFILM Business Innovation Corp.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0634_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0634_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0634_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, scan, network scan, fax, and mailbox. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/assurance_level EAL3 Augmented with ALC_FLR.2 EAL2 Augmented by ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 3.1 3.1 Release5
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0324_eimg.pdf https://www.ipa.go.jp/en/security/c0634_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2011-10-14 2019-03-18
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, scan, network scan, fax, and mailbox. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
heuristics/scheme_data/enhanced/evaluation_facility Electronic Commerce Security Technology Laboratory Inc. Evaluation Center Information Technology Security Center Evaluation Department
heuristics/scheme_data/enhanced/product Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 Fuji Xerox DocuCentre-VI C2264 model with Hard Disk, Data Security, Scan, and Fax
heuristics/scheme_data/enhanced/product_type Multi Function Product Multi-Function Device
heuristics/scheme_data/enhanced/protection_profile IEEE Std 2600.1-2009 U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0324_erpt.pdf https://www.ipa.go.jp/en/security/c0634_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0324_est.pdf https://www.ipa.go.jp/en/security/c0634_est.pdf
heuristics/scheme_data/enhanced/toe_version -Software version: System/Copy 2.02 Network Support 10.54 Scanner 01.11.1 Printer 1.00.4 Fax 02.01.00 RemoteFax 01.00.00 Web Support 1.06 Web Uapl 1.01 NetworkDocBox 1.01 animation 1.00 RPCS 3.10.14 RPCS Font 1.00 Engine 1.03:03 OpePanel 1.06 LANG0 1.06 LANG1 1.06 Data Erase Std 1.01x -Hardware version: Ic Key 01020700 Ic Ctlr 03 -Option version: GWFCU3-21(WW) 03.00.00 Controller ROM Ver. 1.1.3, FAX ROM Ver. 2.2.0
heuristics/scheme_data/enhanced/vendor RICOH COMPANY, LTD. FUJIFILM Business Innovation Corp.
heuristics/scheme_data/expiration_date 2016-11 2024-04
heuristics/scheme_data/supplier RICOH COMPANY, LTD. FUJIFILM Business Innovation Corp.
heuristics/scheme_data/toe_japan_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0324_it1339.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0634_it8674.html
heuristics/scheme_data/toe_japan_name Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 Fuji Xerox DocuCentre-VI C2264 model with Hard Disk, Data Security, Scan, and Fax Controller ROM Ver. 1.1.3,FAX ROM Ver. 2.2.0
pdf_data/cert_filename None c0634_eimg.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0634-01-2019: 1
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ITSC:
      • Information Technology Security Center: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 167849
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20190822093704+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190822093944+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/report_filename c0324_erpt.pdf c0634_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0324-01: 1
  • Certification No. C0324: 1
  • JISEC-CC-CRP-C0634-01-2019: 1
pdf_data/report_keywords/cc_claims/T/T.CONF 2 4
pdf_data/report_keywords/cc_claims/T/T.DOC 2 4
pdf_data/report_keywords/cc_claims/T/T.FUNC 1 2
pdf_data/report_keywords/cc_claims/T/T.PROT 1 2
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 1
  • EAL2: 4
  • EAL2 augmented: 2
pdf_data/report_keywords/crypto_protocol/IPsec/IPsec 3 6
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 3
  • TLS:
    • TLS: 2
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/standard_id/CC
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 1 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 16
pdf_data/report_metadata//CreationDate D:20111219165814+09'00' D:20190924152938+09'00'
pdf_data/report_metadata//ModDate D:20111219165844+09'00' D:20190924153017+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 347805 579605
pdf_data/report_metadata/pdf_number_of_pages 38 37
pdf_data/st_filename c0324_est.pdf c0634_est.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.STORAGE: 14
    • O.RCGATE: 13
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • D:
    • D.DOC: 57
    • D.FUNC: 28
    • D.PROT: 4
    • D.CONF: 13
  • O:
    • O.AUDIT_STORAGE: 10
    • O.AUDIT_ACCESS: 10
    • O.CIPHER: 8
    • O.DOC: 16
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 14
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 8
  • T:
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
    • T.CONF: 6
  • A:
    • A.ACCESS: 3
    • A.USER: 3
    • A.ADMIN: 6
  • OE:
    • OE.AUDIT_STORAGE: 2
    • OE.AUDIT_ACCESS: 2
    • OE.PHYSICAL: 2
    • OE.USER: 12
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
pdf_data/st_keywords/cc_claims/A/A.ACCESS 5 3
pdf_data/st_keywords/cc_claims/A/A.ADMIN 10 6
pdf_data/st_keywords/cc_claims/A/A.USER 4 3
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.AUDIT_STORAGE: 10
  • O.AUDIT_ACCESS: 10
  • O.CIPHER: 8
  • O.DOC: 16
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 14
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 8
pdf_data/st_keywords/cc_claims/O/O.AUDIT 9 8
pdf_data/st_keywords/cc_claims/O/O.CONF 18 16
pdf_data/st_keywords/cc_claims/O/O.DOC 18 16
pdf_data/st_keywords/cc_claims/O/O.FUNC 9 8
pdf_data/st_keywords/cc_claims/O/O.INTERFACE 9 8
pdf_data/st_keywords/cc_claims/O/O.PROT 9 8
pdf_data/st_keywords/cc_claims/O/O.SOFTWARE 9 8
pdf_data/st_keywords/cc_claims/O/O.USER 21 14
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 3
  • OE.AUDIT_ACCESS: 2
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 4
  • OE.USER: 21
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • OE.AUDIT_STORAGE: 2
  • OE.AUDIT_ACCESS: 2
  • OE.PHYSICAL: 2
  • OE.USER: 12
  • OE.ADMIN: 6
  • OE.AUDIT: 3
  • OE.INTERFACE: 3
  • OE.PHYISCAL: 1
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 8 6
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_STORAGE 3 2
pdf_data/st_keywords/cc_claims/OE/OE.INTERFACE 4 3
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL 4 2
pdf_data/st_keywords/cc_claims/OE/OE.USER 21 12
pdf_data/st_keywords/cc_claims/T/T.CONF 10 6
pdf_data/st_keywords/cc_claims/T/T.DOC 10 6
pdf_data/st_keywords/cc_claims/T/T.FUNC 5 3
pdf_data/st_keywords/cc_claims/T/T.PROT 5 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
  • ALC_FLR.2: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 3 5
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 2 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 1
  • EAL2: 2
  • EAL 2: 1
  • EAL2 augmented: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.1: 9
  • FAU_STG.4: 8
  • FAU_SAR.1: 10
  • FAU_SAR.2: 8
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_GEN: 1
  • FAU_GEN.1: 15
  • FAU_GEN.2: 9
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_STG.1: 11
  • FAU_STG.4: 9
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 12 15
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 6 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 8 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 9 11
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 9
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 11
  • FCS_COP.1: 10
  • FCS_CKM.2: 2
  • FCS_CKM.4: 7
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.1: 12
  • FCS_COP.1: 11
  • FCS_CKM.2: 1
  • FCS_CKM.4: 2
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_COP: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 11 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 7 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 10 11
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF.1: 31
  • FDP_ACF.1.1: 3
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 3
  • FDP_ACC.1: 31
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 2
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACC.1: 89
  • FDP_ACF.1: 78
  • FDP_RIP.1: 9
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 7
  • FDP_ACF.1.1: 7
  • FDP_ACF.1.2: 7
  • FDP_ACF.1.3: 7
  • FDP_ACF.1.4: 7
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 7
  • FDP_ACC: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 31 89
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 2 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 31 78
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 3 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 3 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 8 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 3 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 4 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 8 9
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 8
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 19
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.1: 16
  • FIA_UAU.7: 10
  • FIA_UID.1: 22
  • FIA_USB.1: 9
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UID.2: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 8 19
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 8 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 10 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 31 16
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 8 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 39 22
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 13 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 7 9
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMF.1: 22
  • FMT_SMR.1: 29
  • FMT_MSA.3: 23
  • FMT_MSA.1: 20
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1: 89
  • FMT_SMR.1: 40
  • FMT_MOF.1: 11
  • FMT_MSA.3: 85
  • FMT_MTD.1: 21
  • FMT_SMF.1: 35
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 7
  • FMT_MSA.3.1: 7
  • FMT_MSA.3.2: 7
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 89
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 2 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 23 85
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 2 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 2 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 12 21
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 35
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 29 40
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP 5 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 11 16
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 9 11
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 5 9
pdf_data/st_keywords/cc_sfr/FTA/FTA_SSL.3 9 10
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 21
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TST.1: 1
  • FTP_ITC.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 21 13
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL3.0: 1
  • TLS:
    • TLS1.0: 2
  • TLS:
    • TLS: 14
pdf_data/st_keywords/crypto_protocol/TLS/TLS
  • TLS1.0: 2
  • TLS: 14
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
      • SHA-1: 2
    • SHA2:
      • SHA256: 2
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • malfunction: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
  • X509:
    • X.509: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS197: 2
  • FIPS PUB 197: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3DES: 6
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 5
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3DES: 6
  • Triple-DES: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 700398
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /ModDate: D:20111208125038+09'00'
  • /CreationDate: D:20111208125038+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1251570
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 129
  • /Author: Fuji Xerox Co., Ltd.
  • /Company: Fuji Xerox Co., Ltd
  • /CreationDate: D:20190918165138+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 19
  • /Manager: Propulsion Team of Security Certification
  • /ModDate: D:20190918170008+09'00'
  • /Producer: Adobe PDF Library 19.12.66
  • /SourceModified: D:20190918074942
  • /Subject:
  • /Title: Fuji Xerox DocuCentre-VI C2264 Security Target
  • pdf_hyperlinks: https://www.ipa.go.jp/security/jisec/jisec_e/prdct_in_eval/FujiXeroxDocuCentre-V_C2265.html, javascript:g('attested'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART2V3.1R2.pdf, javascript:g('characters'), javascript:g('From'), javascript:g('in'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART3V3.1R2.pdf, javascript:g('accordance'), javascript:g('with'), javascript:g('is'), javascript:g('when'), javascript:g('TOE.'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART1V3.1R1.pdf
pdf_data/st_metadata//CreationDate D:20111208125038+09'00' D:20190918165138+09'00'
pdf_data/st_metadata//ModDate D:20111208125038+09'00' D:20190918170008+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 6.0.1 (Windows) Adobe PDF Library 19.12.66
pdf_data/st_metadata//Title untitled Fuji Xerox DocuCentre-VI C2264 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 700398 1251570
pdf_data/st_metadata/pdf_hyperlinks https://www.ipa.go.jp/security/jisec/jisec_e/prdct_in_eval/FujiXeroxDocuCentre-V_C2265.html, javascript:g('attested'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART2V3.1R2.pdf, javascript:g('characters'), javascript:g('From'), javascript:g('in'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART3V3.1R2.pdf, javascript:g('accordance'), javascript:g('with'), javascript:g('is'), javascript:g('when'), javascript:g('TOE.'), http://www.ipa.go.jp/security/jisec/cc/documents/CCPART1V3.1R1.pdf
pdf_data/st_metadata/pdf_is_encrypted False True
pdf_data/st_metadata/pdf_number_of_pages 90 129
dgst f5f0393cb96d1978 e5218b96c0250529