Xerox D110/D125 Copier/Printer Version: Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0
CSV information ?
Status | archived |
---|---|
Valid from | 30.07.2012 |
Valid until | 03.08.2017 |
Scheme | 🇯🇵 JP |
Manufacturer | Fuji Xerox Co., Ltd. |
Category | Multi-Function Devices |
Security level | ALC_FLR.2, EAL3+ |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AESProtocols
SSL 3.0, SSL, TLS 1.0Vendor
MicrosoftSecurity level
EAL3, EAL3 augmentedClaims
T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMINSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
CRP-C0362-01, Certification No. C0362Evaluation facilities
Information Technology Security CenterCertification process
out of scope, of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described, print data from the printer driver of user client to the MFD. Therefore, the following function is out of scope of the evaluated security functions. - Printer driver requires a user to enter user ID and passwordStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Creation date | D:20121031165826+09'00' |
---|---|
Modification date | D:20121031165849+09'00' |
Pages | 36 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, RC4, RC2, DES, Triple-DES, HMACHash functions
SHA-1TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHASecurity level
EAL3, EAL 3, EAL3 augmentedClaims
D.FUNC, D.DOC, D.PROT, D.CONF, O.AUDIT_STORAGE, O.AUDIT_ACCESS, O.CIPHER, O.DOC, O.FUNC, O.PROT, O.CONF, O.USER, O.INTERFACE, O.SOFTWARE, O.AUDIT, O.AUDIT_STORAG, T.DOC, T.CONF, T.FUNC, T.PROT, A.ACCESS, A.USER, A.ADMIN, OE.AUDIT_STORAGE, OE.AUDIT_ACCESS, OE.PHYSICAL, OE.USER, OE.ADMIN, OE.AUDIT, OE.INTERFACE, OE.PHYISCALSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.4.1, FAU_STG, FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1.1, FCS_COP.1.1, FCS_CKM, FCS_COP, FDP_ACC, FDP_IFF, FDP_IFC, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.7, FIA_UID.2, FIA_UID.1, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID, FMT_SMR.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA, FPT_FDI_EXP, FPT_FDI_EXP.1, FPT_FDI_EXP.1.1, FPT_STM.1, FPT_TST.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Side-channel analysis
malfunction, cold bootCertification process
When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Job Flow A function to enable efficient standardStandards
FIPS PUB 197, RFC 2104, RFC3414, X.509, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Creation date | D:20121031140314+09'00' |
---|---|
Modification date | D:20121031140314+09'00' |
Pages | 134 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 10.1.4 (Windows) |
Heuristics ?
Extracted SARs
ASE_TSS.1, ASE_INT.1, ALC_CMC.3, ATE_FUN.1, ADV_ARC.1, ATE_COV.2, ASE_ECD.1, AVA_VAN.2, ATE_DPT.1, ATE_IND.2, ASE_OBJ.2, ASE_CCL.1, AGD_PRE.1, ALC_DVS.1, ALC_FLR.2, ADV_TDS.2, ADV_FSP.3, ALC_DEL.1, ALC_CMS.3, ASE_REQ.2, ASE_SPD.1, ALC_LCD.1, AGD_OPE.1Similar certificates
Scheme data ?
Cert Id | C0362 | |
---|---|---|
Supplier | Fuji Xerox Co., Ltd. | |
Toe Overseas Name | Xerox D110/D125 Copier/Printer Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0 | |
Expiration Date | 2017-08 | |
Claim | EAL3+ ALC_FLR.2 PP | |
Certification Date | 2012-07 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0362_it1380.html | |
Toe Japan Name | ----- | |
Enhanced | ||
Product | Xerox D110/D125 Copier/Printer | |
Toe Version | Controller+PS ROM Ver. 1.201.1 IOT ROM Ver. 83.25.0 IIT ROM Ver. 9.8.0 ADF ROM Ver. 13.10.0 | |
Product Type | Multi Function Device | |
Certification Date | 2012-07-30 | |
Cc Version | 3.1 | |
Assurance Level | EAL3 Augmented with ALC_FLR.2 | |
Protection Profile | IEEE Std 2600.1-2009 | |
Vendor | Fuji Xerox Co., Ltd. | |
Evaluation Facility | Information Technology Security Center Evaluation Department | |
Report Link | https://www.ipa.go.jp/en/security/c0362_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0362_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0362_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data Overwrite A function to overwrite and delete the document data in the internal HDD. - Hard Disk Data Encryption A function to encrypt the document data before the data is stored into the internal HDD. - User Authentication A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security Management A function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation Restriction A function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit Log A function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data Protection A function to protect communication data by using encryption communication protocols. - Information Flow Security A function to restrict the unpermitted communication between the TOE interface and internal network. - Self test A function to verify the integrity of TSF executable code and TOE setting data. |
References ?
No references are available for this certificate.
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009']}}]}
.
- The new value is
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0362', 'supplier': 'Fuji Xerox Co., Ltd.', 'toe_overseas_name': 'Xerox D110/D125 Copier/Printer\n Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, \n \n ADF ROM Ver. 13.10.0', 'expiration_date': '2017-08', 'claim': 'EAL3+\n ALC_FLR.2\n PP', 'certification_date': '2012-07', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0362_it1380.html', 'toe_japan_name': '-----', 'enhanced': {'product': 'Xerox D110/D125 Copier/Printer', 'toe_version': 'Controller+PS ROM \n Ver. 1.201.1 \n \n \n \n IOT ROM \n Ver. 83.25.0 \n \n \n \n IIT ROM \n Ver. 9.8.0 \n \n \n \n ADF ROM \n Ver. 13.10.0', 'product_type': 'Multi Function Device', 'certification_date': '2012-07-30', 'cc_version': '3.1', 'assurance_level': 'EAL3 Augmented with ALC_FLR.2', 'protection_profile': 'IEEE Std 2600.1-2009', 'vendor': 'Fuji Xerox Co., Ltd.', 'evaluation_facility': 'Information Technology Security Center Evaluation Department', 'report_link': 'https://www.ipa.go.jp/en/security/c0362_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0362_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0362_est.pdf', 'description': "PRODUCT DESCRIPTION \n Description of TOE \n The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. \n \n \n TOE security functionality \n To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: \n \n \n \n - \n Hard Disk Data Overwrite \n \n \n \n A function to overwrite and delete the document data in the internal HDD. \n \n \n - \n Hard Disk Data Encryption \n \n \n \n A function to encrypt the document data before the data is stored into the internal HDD. \n \n \n - \n User Authentication \n \n \n \n A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. \n \n \n - \n System Administrator's Security Management \n \n \n \n A function to allow only system administrators to configure the settings of security functions. \n \n \n - \n Customer Engineer Operation Restriction \n \n \n \n A function to allow only system administrators to configure the settings for restricting customer engineer operations. \n \n \n - \n Security Audit Log \n \n \n \n A function to generate audit logs of security events and allow only system administrators to refer to them. \n \n \n - \n Internal Network Data Protection \n \n \n \n A function to protect communication data by using encryption communication protocols. \n \n \n - \n Information Flow Security \n \n \n \n A function to restrict the unpermitted communication between the TOE interface and internal network. \n \n \n - \n Self test \n \n \n \n A function to verify the integrity of TSF executable code and TOE setting data."}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8c1690bee923714909fe3f8a02fb805dd61617c93e599d49f0a06a63384d4f1d', 'txt_hash': 'e44c82e54485d5d46fbc33a3e285c1752a2a8157a9422d6657bbc9e8f7d38f0b'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e491400b414b027695edca2961b366e87e08adfa2706dcf5d0195b9276c7cfe3', 'txt_hash': '5360f192da5064d06940846b89e8c2890239d39fcef02965b873bd5e4124d702'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 334585, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 36, '/CreationDate': "D:20121031165826+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20121031165849+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 618720, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 134, '/Author': '', '/CreationDate': "D:20121031140314+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20121031140314+09'00'", '/Producer': 'Acrobat Distiller 10.1.4 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0362-01': 1, 'Certification No. C0362': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4, 'EAL3 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 4}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DOC': 4, 'T.FUNC': 2, 'T.PROT': 2, 'T.CONF': 4}, 'A': {'A.ACCESS': 1, 'A.USER': 1, 'A.ADMIN': 2}}, 'vendor': {'Microsoft': {'Microsoft': 9}}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL 3.0': 1, 'SSL': 1}, 'TLS': {'TLS 1.0': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described': 1, 'print data from the printer driver of user client to the MFD. Therefore, the following function is out of scope of the evaluated security functions. - Printer driver requires a user to enter user ID and password': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 2, 'EAL 3': 1, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 15, 'FAU_GEN.2': 9, 'FAU_SAR.1': 10, 'FAU_SAR.2': 9, 'FAU_STG.1': 10, 'FAU_STG.4': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1, 'FAU_STG': 1}, 'FCS': {'FCS_CKM.1': 12, 'FCS_COP.1': 11, 'FCS_CKM.2': 1, 'FCS_CKM.4': 2, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM': 1, 'FCS_COP': 1}, 'FDP': {'FDP_ACC': 4, 'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_ACC.1': 86, 'FDP_ACF.1': 80, 'FDP_RIP.1': 9, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1, 'FDP_ACC.1.1': 7, 'FDP_ACF.1.1': 7, 'FDP_ACF.1.2': 7, 'FDP_ACF.1.3': 7, 'FDP_ACF.1.4': 7, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 7}, 'FIA': {'FIA_AFL.1': 35, 'FIA_ATD.1': 11, 'FIA_SOS.1': 8, 'FIA_UAU.1': 18, 'FIA_UAU.7': 10, 'FIA_UID.2': 21, 'FIA_UID.1': 11, 'FIA_USB.1': 9, 'FIA_AFL.1.1': 4, 'FIA_AFL.1.2': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID': 4}, 'FMT': {'FMT_SMR.1': 43, 'FMT_MOF.1': 11, 'FMT_MSA.1': 79, 'FMT_MSA.3': 80, 'FMT_MTD.1': 22, 'FMT_SMF.1': 36, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 7, 'FMT_MSA.3.1': 7, 'FMT_MSA.3.2': 7, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA': 1}, 'FPT': {'FPT_FDI_EXP': 3, 'FPT_FDI_EXP.1': 15, 'FPT_FDI_EXP.1.1': 2, 'FPT_STM.1': 11, 'FPT_TST.1': 9, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3': 10, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.FUNC': 59, 'D.DOC': 61, 'D.PROT': 3, 'D.CONF': 13}, 'O': {'O.AUDIT_STORAGE': 9, 'O.AUDIT_ACCESS': 10, 'O.CIPHER': 9, 'O.DOC': 16, 'O.FUNC': 8, 'O.PROT': 8, 'O.CONF': 16, 'O.USER': 14, 'O.INTERFACE': 8, 'O.SOFTWARE': 8, 'O.AUDIT': 8, 'O.AUDIT_STORAG': 1}, 'T': {'T.DOC': 7, 'T.CONF': 7, 'T.FUNC': 3, 'T.PROT': 3}, 'A': {'A.ACCESS': 3, 'A.USER': 3, 'A.ADMIN': 6}, 'OE': {'OE.AUDIT_STORAGE': 2, 'OE.AUDIT_ACCESS': 2, 'OE.PHYSICAL': 2, 'OE.USER': 12, 'OE.ADMIN': 6, 'OE.AUDIT': 3, 'OE.INTERFACE': 3, 'OE.PHYISCAL': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}, 'RC': {'RC4': 1, 'RC2': 1}}, 'DES': {'DES': {'DES': 1}, '3DES': {'Triple-DES': 3}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 10}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}, 'other': {'cold boot': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}, 'RFC': {'RFC 2104': 1, 'RFC3414': 1}, 'X509': {'X.509': 3}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Job Flow A function to enable efficient standard': 1}}}
. - The report_filename property was set to
c0362_erpt.pdf
. - The st_filename property was set to
c0362_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0362
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0362_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0362_est.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Xerox D110/D125 Copier/Printer Version: Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Multi-Function Devices",
"cert_link": null,
"dgst": "1a13d276f611f29e",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0362",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"83.25.0",
"13.10.0",
"9.8.0",
"1.201.1"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "C0362",
"certification_date": "2012-07",
"claim": "EAL3+\n ALC_FLR.2\n PP",
"enhanced": {
"assurance_level": "EAL3 Augmented with ALC_FLR.2",
"cc_version": "3.1",
"cert_link": "https://www.ipa.go.jp/en/security/c0362_eimg.pdf",
"certification_date": "2012-07-30",
"description": "PRODUCT DESCRIPTION \n Description of TOE \n The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, and scan. The TOE does not provide fax function. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. \n \n \n TOE security functionality \n To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: \n \n \n \n - \n Hard Disk Data Overwrite \n \n \n \n A function to overwrite and delete the document data in the internal HDD. \n \n \n - \n Hard Disk Data Encryption \n \n \n \n A function to encrypt the document data before the data is stored into the internal HDD. \n \n \n - \n User Authentication \n \n \n \n A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. \n \n \n - \n System Administrator\u0027s Security Management \n \n \n \n A function to allow only system administrators to configure the settings of security functions. \n \n \n - \n Customer Engineer Operation Restriction \n \n \n \n A function to allow only system administrators to configure the settings for restricting customer engineer operations. \n \n \n - \n Security Audit Log \n \n \n \n A function to generate audit logs of security events and allow only system administrators to refer to them. \n \n \n - \n Internal Network Data Protection \n \n \n \n A function to protect communication data by using encryption communication protocols. \n \n \n - \n Information Flow Security \n \n \n \n A function to restrict the unpermitted communication between the TOE interface and internal network. \n \n \n - \n Self test \n \n \n \n A function to verify the integrity of TSF executable code and TOE setting data.",
"evaluation_facility": "Information Technology Security Center Evaluation Department",
"product": "Xerox D110/D125 Copier/Printer",
"product_type": "Multi Function Device",
"protection_profile": "IEEE Std 2600.1-2009",
"report_link": "https://www.ipa.go.jp/en/security/c0362_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0362_est.pdf",
"toe_version": "Controller+PS ROM \n Ver. 1.201.1 \n \n \n \n IOT ROM \n Ver. 83.25.0 \n \n \n \n IIT ROM \n Ver. 9.8.0 \n \n \n \n ADF ROM \n Ver. 13.10.0",
"vendor": "Fuji Xerox Co., Ltd."
},
"expiration_date": "2017-08",
"supplier": "Fuji Xerox Co., Ltd.",
"toe_japan_name": "-----",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0362_it1380.html",
"toe_overseas_name": "Xerox D110/D125 Copier/Printer\n Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, \n \n ADF ROM Ver. 13.10.0"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Fuji Xerox Co., Ltd.",
"manufacturer_web": "https://www.fujixerox.co.jp/eng/",
"name": "Xerox D110/D125 Copier/Printer Version: Controller+PS ROM Ver. 1.201.1, IOT ROM Ver. 83.25.0, IIT ROM Ver. 9.8.0, ADF ROM Ver. 13.10.0",
"not_valid_after": "2017-08-03",
"not_valid_before": "2012-07-30",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0362_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0362-01": 1,
"Certification No. C0362": 1
}
},
"cc_claims": {
"A": {
"A.ACCESS": 1,
"A.ADMIN": 2,
"A.USER": 1
},
"T": {
"T.CONF": 4,
"T.DOC": 4,
"T.FUNC": 2,
"T.PROT": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 4
}
},
"cc_security_level": {
"EAL": {
"EAL3": 4,
"EAL3 augmented": 2
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described": 1,
"out of scope": 2,
"print data from the printer driver of user client to the MFD. Therefore, the following function is out of scope of the evaluated security functions. - Printer driver requires a user to enter user ID and password": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1,
"SSL 3.0": 1
},
"TLS": {
"TLS 1.0": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ITSC": {
"Information Technology Security Center": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 9
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20121031165826+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20121031165849+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 334585,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 36
},
"st_filename": "c0362_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 3,
"A.ADMIN": 6,
"A.USER": 3
},
"D": {
"D.CONF": 13,
"D.DOC": 61,
"D.FUNC": 59,
"D.PROT": 3
},
"O": {
"O.AUDIT": 8,
"O.AUDIT_ACCESS": 10,
"O.AUDIT_STORAG": 1,
"O.AUDIT_STORAGE": 9,
"O.CIPHER": 9,
"O.CONF": 16,
"O.DOC": 16,
"O.FUNC": 8,
"O.INTERFACE": 8,
"O.PROT": 8,
"O.SOFTWARE": 8,
"O.USER": 14
},
"OE": {
"OE.ADMIN": 6,
"OE.AUDIT": 3,
"OE.AUDIT_ACCESS": 2,
"OE.AUDIT_STORAGE": 2,
"OE.INTERFACE": 3,
"OE.PHYISCAL": 1,
"OE.PHYSICAL": 2,
"OE.USER": 12
},
"T": {
"T.CONF": 7,
"T.DOC": 7,
"T.FUNC": 3,
"T.PROT": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.2": 5,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 1,
"EAL3": 2,
"EAL3 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 15,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 9,
"FAU_GEN.2.1": 1,
"FAU_SAR": 1,
"FAU_SAR.1": 10,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 9,
"FAU_SAR.2.1": 1,
"FAU_STG": 1,
"FAU_STG.1": 10,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 9,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 12,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 2,
"FCS_COP": 1,
"FCS_COP.1": 11,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 4,
"FDP_ACC.1": 86,
"FDP_ACC.1.1": 7,
"FDP_ACF.1": 80,
"FDP_ACF.1.1": 7,
"FDP_ACF.1.2": 7,
"FDP_ACF.1.3": 7,
"FDP_ACF.1.4": 7,
"FDP_IFC": 1,
"FDP_IFC.1": 7,
"FDP_IFF": 1,
"FDP_ITC.1": 1,
"FDP_ITC.2": 1,
"FDP_RIP.1": 9,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 35,
"FIA_AFL.1.1": 4,
"FIA_AFL.1.2": 4,
"FIA_ATD.1": 11,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 8,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 18,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.7": 10,
"FIA_UAU.7.1": 1,
"FIA_UID": 4,
"FIA_UID.1": 11,
"FIA_UID.2": 21,
"FIA_UID.2.1": 1,
"FIA_USB.1": 9,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 11,
"FMT_MOF.1.1": 1,
"FMT_MSA": 1,
"FMT_MSA.1": 79,
"FMT_MSA.1.1": 7,
"FMT_MSA.3": 80,
"FMT_MSA.3.1": 7,
"FMT_MSA.3.2": 7,
"FMT_MTD.1": 22,
"FMT_MTD.1.1": 2,
"FMT_SMF.1": 36,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 43,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FDI_EXP": 3,
"FPT_FDI_EXP.1": 15,
"FPT_FDI_EXP.1.1": 2,
"FPT_STM.1": 11,
"FPT_STM.1.1": 1,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL.3": 10,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 13,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Job Flow A function to enable efficient standard": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 10
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
},
"other": {
"cold boot": 1
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
},
"FIPS": {
"FIPS PUB 197": 1
},
"RFC": {
"RFC 2104": 1,
"RFC3414": 1
},
"X509": {
"X.509": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
},
"RC": {
"RC2": 1,
"RC4": 1
}
},
"DES": {
"3DES": {
"Triple-DES": 3
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA": 1
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20121031140314+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20121031140314+09\u002700\u0027",
"/Producer": "Acrobat Distiller 10.1.4 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 618720,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 134
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL3+",
"pp_ids": {
"_type": "Set",
"elements": [
"IEEE 2600.1\u0026trade;-2009",
"IEEE 2600.1\u00e2\u201e\u00a2-2009"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf",
"pp_name": "IEEE Standard for a Protection Profile in Operational Environment A"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0362_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0362_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8c1690bee923714909fe3f8a02fb805dd61617c93e599d49f0a06a63384d4f1d",
"txt_hash": "e44c82e54485d5d46fbc33a3e285c1752a2a8157a9422d6657bbc9e8f7d38f0b"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e491400b414b027695edca2961b366e87e08adfa2706dcf5d0195b9276c7cfe3",
"txt_hash": "5360f192da5064d06940846b89e8c2890239d39fcef02965b873bd5e4124d702"
}
},
"status": "archived"
}