Xerox D136 Copier/Printer Controller+PS ROM Ver. 1.200.15

CSV information ?

Status archived
Valid from 28.09.2018
Valid until 28.09.2023
Scheme 🇯🇵 JP
Manufacturer Xerox Corporation
Category Multi-Function Devices
Security level EAL2+, ALC_CMC.2

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0619-01-2018

Certificate ?

Extracted keywords

Security level
EAL2
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
JISEC-CC-CRP-C0619-01-2018
Evaluation facilities
Information Technology Security Center

File metadata

Creation date: D:20181004142528+09'00'
Modification date: D:20181004142725+09'00'
Pages: 2
Creator: Microsoft® Word 2010
Producer: Microsoft® Word 2010

Certification report ?

Extracted keywords

Symmetric Algorithms
AES
Hash functions
SHA256
Protocols
TLS, IPsec

Vendor
Microsoft

Security level
EAL2, EAL2 augmented
Claims
T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMIN
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
JISEC-CC-CRP-C0619-01-2018
Evaluation facilities
Information Technology Security Center

Standards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Creation date: D:20181220165622+09'00'
Modification date: D:20181220165715+09'00'
Pages: 37
Creator: Microsoft® Word 2010
Producer: Microsoft® Word 2010

References

No references.

Security target ?

Extracted keywords

Symmetric Algorithms
AES, Triple-DES, HMAC
Hash functions
SHA-1, SHA1, SHA256
Protocols
TLS
TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256

Vendor
Microsoft

Security level
EAL2, EAL 2, EAL2 augmented
Claims
D.DOC, D.FUNC, D.PROT, D.CONF, O.AUDIT_ACCESS, O.AUDIT_STORAGE, O.CIPHER, O.DOC, O.FUNC, O.PROT, O.CONF, O.USER, O.INTERFACE, O.SOFTWARE, O.AUDIT, T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMIN, OE.AUDIT, OE.AUDIT_ACCESS, OE.AUDIT_STORAGE, OE.PHYSICAL, OE.USER, OE.ADMIN, OE.INTERFACE, OE.PHYISCAL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.4.1, FAU_STG, FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1.1, FCS_COP.1.1, FCS_CKM, FCS_COP, FDP_ACC, FDP_ACC.1, FDP_IFF, FDP_IFC, FDP_ACF.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.1, FIA_UID.2, FIA_UAU.7, FIA_USB.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UAU, FIA_UID, FMT_MSA.1, FMT_SMR.1, FMT_MOF.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA, FPT_FDI_EXP, FPT_FDI_EXP.1, FPT_FDI_EXP.1.1, FPT_STM.1, FPT_TST.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Certification process
When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a

Side-channel analysis
malfunction, cold boot
Certification process
When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a

Standards
FIPS PUB 197, RFC 2104, X.509, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003

File metadata

Title: Xerox D136 Copier/Printer
Subject: Security Target
Creation date: D:20181220110632+09'00'
Modification date: D:20181220113201+09'00'
Pages: 124
Creator: PScript5.dll Version 5.2.2
Producer: Acrobat Distiller 10.1.16 (Windows)

References

No references.

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0619-01-2018

Extracted SARs

ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ASE_CCL.1, ALC_FLR.2, ASE_TSS.1, ASE_ECD.1, ASE_REQ.2, AGD_PRE.1, ATE_FUN.1, ASE_INT.1, ALC_CMC.2, ASE_OBJ.2, ASE_SPD.1, AVA_VAN.2, ATE_IND.2, ATE_COV.1, ALC_DEL.1, ALC_CMS.2, AGD_OPE.1

Scheme data ?

Cert Id C0619
Supplier Xerox Corporation
Toe Overseas Name Xerox D136 Copier/Printer Controller+PS ROM Ver. 1.200.15
Claim PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
Certification Date 2018-09
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0619_it7651.html
Toe Japan Name -----
Enhanced
Product Xerox D136 Copier/Printer
Toe Version Controller+PS ROM Ver. 1.200.15
Product Type Multi-Function Device
Cert Id JISEC-C0619
Certification Date 2018-09-28
Cc Version 3.1 Release4
Assurance Level EAL2 Augmented by ALC_FLR.2
Protection Profile U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
Vendor Xerox Corporation
Evaluation Facility Information Technology Security Center Evaluation Department
Report Link https://www.ipa.go.jp/en/security/c0619_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/c0619_eimg.pdf
Target Link https://www.ipa.go.jp/en/security/c0619_est.pdf
Description PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, and scan. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE Security functions To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '094b4cdbdf06f8de78eb915aa18e1f8c77db95094570e2da040bae37f1fa1c41', 'txt_hash': '734febdfa76e6e63c9867321f99a62d1bd964e5c369b534d3f1f0bb2f698af55'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bc7dda3d8ffc069cb5d79bb20d347298bdea3f724a6a3d369b5d4eb7e1c97fe2', 'txt_hash': 'abb5942d67ec7422d6a98c57e9491245560f146466f4e203ba4e1e7617197803'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4d99c784fb6da3c4b2460bdc963316ed5eb5afb1911bbf0698188687621832ba', 'txt_hash': '6b06a72ff43cbfa85925208b0fc7834016faae3c5facf30a3d7677582d7541ef'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 86194, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 2, '/CreationDate': "D:20181004142528+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20181004142725+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'JP': {'JISEC-CC-CRP-C0619-01-2018': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'c0619_eimg.pdf'}.
    • The report_frontpage property was set to {}.
    • The st_frontpage property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0619-01-2018.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cert_id property was set to C0619.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0619-01-2018.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 19.10.2023 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'C0619', 'supplier': 'Xerox Corporation', 'toe_overseas_name': 'Xerox D136 Copier/Printer\n Controller+PS ROM Ver. 1.200.15', 'claim': 'PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)', 'certification_date': '2018-09', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0619_it7651.html', 'toe_japan_name': '-----', 'enhanced': {'product': 'Xerox D136 Copier/Printer', 'toe_version': 'Controller+PS ROM Ver. 1.200.15', 'product_type': 'Multi-Function Device', 'cert_id': 'JISEC-C0619', 'certification_date': '2018-09-28', 'cc_version': '3.1 Release4', 'assurance_level': 'EAL2 Augmented by ALC_FLR.2', 'protection_profile': 'U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)', 'vendor': 'Xerox Corporation', 'evaluation_facility': 'Information Technology Security Center Evaluation Department', 'report_link': 'https://www.ipa.go.jp/en/security/c0619_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0619_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0619_est.pdf', 'description': "PRODUCT DESCRIPTION \n Description of TOE \n The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, and scan. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. \n \n TOE Security functions \n To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: \n \n \n \n - \n Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. \n \n \n - \n Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. \n \n \n - \n User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. \n \n \n - \n System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. \n \n \n - \n Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. \n \n \n - \n Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. \n \n \n - \n Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. \n \n \n - \n Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. \n \n \n - \n Self testA function to verify the integrity of TSF executable code and TOE setting data."}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0619_erpt.pdf, code: 408'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/c0619_eimg.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.xerox.com.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_HCD_EAL2_V1.0', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to bc7dda3d8ffc069cb5d79bb20d347298bdea3f724a6a3d369b5d4eb7e1c97fe2.
    • The st_txt_hash property was set to abb5942d67ec7422d6a98c57e9491245560f146466f4e203ba4e1e7617197803.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 738511, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 124, '/CreationDate': "D:20181220110632+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20181220113201+09'00'", '/Producer': 'Acrobat Distiller 10.1.16 (Windows)', '/Subject': 'Security Target', '/Title': 'Xerox D136 Copier/Printer', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL 2': 1, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 15, 'FAU_GEN.2': 9, 'FAU_SAR.1': 10, 'FAU_SAR.2': 9, 'FAU_STG.1': 11, 'FAU_STG.4': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1, 'FAU_STG': 1}, 'FCS': {'FCS_CKM.1': 12, 'FCS_COP.1': 11, 'FCS_CKM.2': 1, 'FCS_CKM.4': 2, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM': 1, 'FCS_COP': 1}, 'FDP': {'FDP_ACC': 3, 'FDP_ACC.1': 74, 'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_ACF.1': 67, 'FDP_RIP.1': 9, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1, 'FDP_ACC.1.1': 6, 'FDP_ACF.1.1': 6, 'FDP_ACF.1.2': 6, 'FDP_ACF.1.3': 6, 'FDP_ACF.1.4': 6, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 6}, 'FIA': {'FIA_AFL.1': 21, 'FIA_ATD.1': 11, 'FIA_SOS.1': 8, 'FIA_UAU.2': 12, 'FIA_UID.1': 13, 'FIA_UID.2': 20, 'FIA_UAU.7': 10, 'FIA_USB.1': 9, 'FIA_UAU.1': 8, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UAU': 3, 'FIA_UID': 4}, 'FMT': {'FMT_MSA.1': 76, 'FMT_SMR.1': 37, 'FMT_MOF.1': 11, 'FMT_MSA.3': 68, 'FMT_MTD.1': 21, 'FMT_SMF.1': 33, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 6, 'FMT_MSA.3.1': 6, 'FMT_MSA.3.2': 6, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA': 1}, 'FPT': {'FPT_FDI_EXP': 3, 'FPT_FDI_EXP.1': 16, 'FPT_FDI_EXP.1.1': 2, 'FPT_STM.1': 11, 'FPT_TST.1': 9, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3': 10, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.DOC': 54, 'D.FUNC': 17, 'D.PROT': 4, 'D.CONF': 13}, 'O': {'O.AUDIT_ACCESS': 10, 'O.AUDIT_STORAGE': 9, 'O.CIPHER': 8, 'O.DOC': 16, 'O.FUNC': 8, 'O.PROT': 8, 'O.CONF': 16, 'O.USER': 14, 'O.INTERFACE': 8, 'O.SOFTWARE': 8, 'O.AUDIT': 8}, 'T': {'T.DOC': 6, 'T.FUNC': 3, 'T.PROT': 3, 'T.CONF': 6}, 'A': {'A.ACCESS': 3, 'A.USER': 3, 'A.ADMIN': 6}, 'OE': {'OE.AUDIT': 4, 'OE.AUDIT_ACCESS': 2, 'OE.AUDIT_STORAGE': 1, 'OE.PHYSICAL': 2, 'OE.USER': 12, 'OE.ADMIN': 6, 'OE.INTERFACE': 3, 'OE.PHYISCAL': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 18}}, 'DES': {'3DES': {'Triple-DES': 4}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4, 'SHA1': 1}, 'SHA2': {'SHA256': 6}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 19}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}, 'other': {'cold boot': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}, 'RFC': {'RFC 2104': 1}, 'X509': {'X.509': 3}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a': 1}}}.
    • The st_filename property was set to c0619_est.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0619_est.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'c0619_erpt.pdf', 'st_filename': 'c0619_est.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'JP': {'__update__': {'JISEC-CC-CRP-C0619-01-2018': 1}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 4}}}}, 'cc_claims': {'__update__': {'T': {'T.DOC': 4, 'T.FUNC': 2, 'T.PROT': 2, 'T.CONF': 4}, 'A': {'A.ACCESS': 1, 'A.USER': 1, 'A.ADMIN': 2}}, '__delete__': ['R', 'OT']}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 2}}}}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 4}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 5}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_SAR': 1, 'FAU_STG': 1}}, 'FCS': {'__insert__': {'FCS_CKM': 1, 'FCS_COP': 1}}, 'FDP': {'__insert__': {'FDP_ACC': 3}, '__update__': {'FDP_ACF.1': 67}}, 'FIA': {'__insert__': {'FIA_UAU': 3, 'FIA_UID': 4}, '__update__': {'FIA_UID.1': 13, 'FIA_UID.2': 20, 'FIA_UAU.1': 8}}, 'FMT': {'__insert__': {'FMT_MSA': 1}, '__update__': {'FMT_MSA.1': 76, 'FMT_SMR.1': 37}}}}, 'cc_claims': {'__update__': {'O': {'__insert__': {'O.AUDIT_ACCESS': 10, 'O.DOC': 16, 'O.FUNC': 8, 'O.PROT': 8, 'O.CONF': 16, 'O.USER': 14, 'O.INTERFACE': 8, 'O.SOFTWARE': 8}, '__update__': {'O.AUDIT': 8, 'O.AUDIT_STORAGE': 9}, '__delete__': ['O.AUDIT_ACCESS.AUTHORIZED', 'O.AUDIT_STORAGE.PROTECTED', 'O.DOC.NO_DIS', 'O.DOC.NO_ALT', 'O.FUNC.NO_ALT', 'O.PROT.NO_ALT', 'O.CONF.NO_DIS', 'O.CONF.NO_ALT', 'O.USER.AUTHORIZED', 'O.INTERFACE.MANAGED', 'O.SOFTWARE.VERIFIED', 'O.AUDIT.LOGGED', 'O.AUDIT_STORAGE.PROTEC', 'O.AUDIT_ACCESS.AUTHORI', 'O.SOFTWARE.VERIFI', 'O.INTERFACE.MANA', 'O.USER.AUTHORIZE', 'O.AUDIT_ACCESS.A']}, 'T': {'T.DOC': 6, 'T.FUNC': 3, 'T.PROT': 3, 'T.CONF': 6}, 'A': {'A.ACCESS': 3, 'A.USER': 3, 'A.ADMIN': 6}, 'OE': {'__insert__': {'OE.AUDIT_ACCESS': 2, 'OE.AUDIT_STORAGE': 1, 'OE.PHYSICAL': 2, 'OE.USER': 12, 'OE.ADMIN': 6, 'OE.INTERFACE': 3, 'OE.PHYISCAL': 1}, '__update__': {'OE.AUDIT': 4}, '__delete__': ['OE', 'OE.AUDIT_ACCESS.AUTHORIZED', 'OE.AUDIT_STORAGE.PROTECTED', 'OE.PHYSICAL.MANAGED', 'OE.USER.AUTHORIZED', 'OE.USER.TRAINED', 'OE.ADMIN.TRAINED', 'OE.ADMIN.TRUSTED', 'OE.AUDIT.REVIEWED', 'OE.INTERFACE.MANAGED', 'OE.PHYISCAL.MANAGED', 'OE.ADMIN.TRUST']}}, '__delete__': ['R', 'OT']}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'DES': {'__delete__': ['DES']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA256': 6}}}}}}, 'crypto_scheme': {}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 19}, '__delete__': ['TLSv1.2']}}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a': 1}}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to C0619.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'JISEC-CC-CRP-C0619-01-2018': 37}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 6, 'EAL2 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 3}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DOC.DIS': 2, 'T.DOC.ALT': 1, 'T.FUNC.ALT': 1, 'T.PROT.ALT': 2, 'T.CONF.DIS': 2, 'T.CONF.ALT': 1, 'T.LOGGING': 1}, 'A': {'A.ACCESS.MANAGED': 1, 'A.USER.TRAINING': 1, 'A.ADMIN.TRAINING': 1, 'A.ADMIN.TRUST': 1}, 'R': {'R.AUTHORIZATION': 1, 'R.TRAINING': 1}, 'OT': {'OT.ALT': 2}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 3}}, 'IPsec': {'IPsec': 5}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL 2': 1, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1, 'ALC_FLR.2': 3}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 15, 'FAU_GEN.2': 9, 'FAU_SAR.1': 10, 'FAU_SAR.2': 9, 'FAU_STG.1': 11, 'FAU_STG.4': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_CKM.1': 12, 'FCS_COP.1': 11, 'FCS_CKM.2': 1, 'FCS_CKM.4': 2, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACF.1': 68, 'FDP_ACC.1': 74, 'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_RIP.1': 9, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1, 'FDP_ACC.1.1': 6, 'FDP_ACF.1.1': 6, 'FDP_ACF.1.2': 6, 'FDP_ACF.1.3': 6, 'FDP_ACF.1.4': 6, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 6}, 'FIA': {'FIA_AFL.1': 21, 'FIA_ATD.1': 11, 'FIA_SOS.1': 8, 'FIA_UAU.2': 12, 'FIA_UID.1': 10, 'FIA_UID.2': 17, 'FIA_UAU.7': 10, 'FIA_USB.1': 9, 'FIA_UAU.1': 6, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA.1': 81, 'FMT_SMR.1': 46, 'FMT_MOF.1': 11, 'FMT_MSA.3': 68, 'FMT_MTD.1': 21, 'FMT_SMF.1': 33, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 6, 'FMT_MSA.3.1': 6, 'FMT_MSA.3.2': 6, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FDI_EXP': 3, 'FPT_FDI_EXP.1': 16, 'FPT_FDI_EXP.1.1': 2, 'FPT_STM.1': 11, 'FPT_TST.1': 9, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3': 10, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.DOC': 54, 'D.FUNC': 17, 'D.PROT': 4, 'D.CONF': 13}, 'O': {'O.AUDIT': 1, 'O.AUDIT_ACCESS.AUTHORIZED': 8, 'O.AUDIT_STORAGE.PROTECTED': 7, 'O.CIPHER': 8, 'O.DOC.NO_DIS': 8, 'O.DOC.NO_ALT': 8, 'O.FUNC.NO_ALT': 8, 'O.PROT.NO_ALT': 8, 'O.CONF.NO_DIS': 8, 'O.CONF.NO_ALT': 8, 'O.USER.AUTHORIZED': 13, 'O.INTERFACE.MANAGED': 7, 'O.SOFTWARE.VERIFIED': 7, 'O.AUDIT.LOGGED': 8, 'O.AUDIT_STORAGE.PROTEC': 1, 'O.AUDIT_ACCESS.AUTHORI': 1, 'O.SOFTWARE.VERIFI': 1, 'O.INTERFACE.MANA': 1, 'O.USER.AUTHORIZE': 1, 'O.AUDIT_STORAGE': 1, 'O.AUDIT_ACCESS.A': 1}, 'T': {'T.LOGGING': 4, 'T.DOC.DIS': 3, 'T.DOC.ALT': 3, 'T.FUNC.ALT': 3, 'T.PROT.ALT': 3, 'T.CONF.DIS': 3, 'T.CONF.ALT': 3, 'T.NO_ALT': 8, 'T.LOGGED': 8, 'T.REVIEWED': 3}, 'A': {'A.ACCESS.MANAGED': 3, 'A.USER.TRAINING': 3, 'A.ADMIN.TRAINING': 3, 'A.ADMIN.TRUST': 3}, 'R': {'R.AUTHORIZATION': 2, 'R.TRAINING': 3, 'R.AUTHORIZED': 22, 'R.TRAINED': 3, 'R.AUTHORIZATIO': 1, 'R.AUTHORIZE': 1}, 'OT': {'OT.ALT': 3, 'OT.NO_ALT': 8}, 'OE': {'OE': 1, 'OE.AUDIT': 1, 'OE.AUDIT_ACCESS.AUTHORIZED': 2, 'OE.AUDIT_STORAGE.PROTECTED': 1, 'OE.PHYSICAL.MANAGED': 2, 'OE.USER.AUTHORIZED': 9, 'OE.USER.TRAINED': 3, 'OE.ADMIN.TRAINED': 3, 'OE.ADMIN.TRUSTED': 2, 'OE.AUDIT.REVIEWED': 3, 'OE.INTERFACE.MANAGED': 3, 'OE.PHYISCAL.MANAGED': 1, 'OE.ADMIN.TRUST': 1}}, 'vendor': {'STMicroelectronics': {'STM': 12}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 18}}, 'DES': {'DES': {'DES': 4}, '3DES': {'Triple-DES': 4}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4, 'SHA1': 1}, 'SHA2': {'SHA256': 8}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 20, 'TLSv1.2': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}, 'other': {'cold boot': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}, 'RFC': {'RFC 2104': 1}, 'X509': {'X.509': 3}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'ntication. When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '094b4cdbdf06f8de78eb915aa18e1f8c77db95094570e2da040bae37f1fa1c41', 'st_pdf_hash': 'bc7dda3d8ffc069cb5d79bb20d347298bdea3f724a6a3d369b5d4eb7e1c97fe2', 'report_txt_hash': '734febdfa76e6e63c9867321f99a62d1bd964e5c369b534d3f1f0bb2f698af55', 'st_txt_hash': 'abb5942d67ec7422d6a98c57e9491245560f146466f4e203ba4e1e7617197803'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA256': 4}, 'rules_crypto_schemes': {'TLS': 3}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 18, 'DES': 4, 'HMAC': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 4, 'SHA1': 1, 'SHA256': 8}, 'rules_crypto_schemes': {'MAC': 1, 'TLS': 20}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'malfunction': 1, 'cold boot': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 393296, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 37, '/CreationDate': "D:20181220165622+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20181220165715+09'00'", '/Producer': 'Microsoft® Word 2010'}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 738511, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 124, '/CreationDate': "D:20181220110632+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20181220113201+09'00'", '/Producer': 'Acrobat Distiller 10.1.16 (Windows)', '/Subject': 'Security Target', '/Title': 'Xerox D136 Copier/Printer'}.
    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The report_keywords property was updated, with the {'rules_cert_id': {'JISEC-CC-CRP-C0619-01-2018': 37}} data.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.200.15']}.
    • The cert_id property was set to JISEC-CC-CRP-C0619-01-2018.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Xerox D136 Copier/Printer Controller+PS ROM Ver. 1.200.15 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Multi-Function Devices",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/c0619_eimg.pdf",
  "dgst": "fea35e3fc292cd64",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0619-01-2018",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.200.15"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "C0619",
      "certification_date": "2018-09",
      "claim": "PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2\u2122-2009)",
      "enhanced": {
        "assurance_level": "EAL2 Augmented by ALC_FLR.2",
        "cc_version": "3.1 Release4",
        "cert_id": "JISEC-C0619",
        "cert_link": "https://www.ipa.go.jp/en/security/c0619_eimg.pdf",
        "certification_date": "2018-09-28",
        "description": "PRODUCT DESCRIPTION \n   Description of TOE \n   The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, and scan. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE.  \n    \n   TOE Security functions \n   To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: \n    \n    \n      \n      - \n      Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. \n      \n      \n      - \n      Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. \n      \n      \n      - \n      User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. \n      \n      \n      - \n      System Administrator\u0027s Security ManagementA function to allow only system administrators to configure the settings of security functions. \n      \n      \n      - \n      Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. \n      \n      \n      - \n      Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. \n      \n      \n      - \n      Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. \n      \n      \n      - \n       Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. \n      \n      \n      - \n      Self testA function to verify the integrity of TSF executable code and TOE setting data.",
        "evaluation_facility": "Information Technology Security Center Evaluation Department",
        "product": "Xerox D136 Copier/Printer",
        "product_type": "Multi-Function Device",
        "protection_profile": "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2\u2122-2009)",
        "report_link": "https://www.ipa.go.jp/en/security/c0619_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0619_est.pdf",
        "toe_version": "Controller+PS ROM Ver. 1.200.15",
        "vendor": "Xerox Corporation"
      },
      "supplier": "Xerox Corporation",
      "toe_japan_name": "-----",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0619_it7651.html",
      "toe_overseas_name": "Xerox D136 Copier/Printer\n          Controller+PS ROM Ver. 1.200.15"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Xerox Corporation",
  "manufacturer_web": "https://www.xerox.com",
  "name": "Xerox D136 Copier/Printer Controller+PS ROM Ver. 1.200.15",
  "not_valid_after": "2023-09-28",
  "not_valid_before": "2018-09-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "c0619_eimg.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "JISEC-CC-CRP-C0619-01-2018": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "ITSC": {
          "Information Technology Security Center": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20181004142528+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20181004142725+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "pdf_file_size_bytes": 86194,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 2
    },
    "report_filename": "c0619_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "JISEC-CC-CRP-C0619-01-2018": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ACCESS": 1,
          "A.ADMIN": 2,
          "A.USER": 1
        },
        "T": {
          "T.CONF": 4,
          "T.DOC": 4,
          "T.FUNC": 2,
          "T.PROT": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 6,
          "EAL2 augmented": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 5
        },
        "TLS": {
          "TLS": {
            "TLS": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "ITSC": {
          "Information Technology Security Center": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA256": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 16
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20181220165622+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20181220165715+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "pdf_file_size_bytes": 393296,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 37
    },
    "st_filename": "c0619_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS": 3,
          "A.ADMIN": 6,
          "A.USER": 3
        },
        "D": {
          "D.CONF": 13,
          "D.DOC": 54,
          "D.FUNC": 17,
          "D.PROT": 4
        },
        "O": {
          "O.AUDIT": 8,
          "O.AUDIT_ACCESS": 10,
          "O.AUDIT_STORAGE": 9,
          "O.CIPHER": 8,
          "O.CONF": 16,
          "O.DOC": 16,
          "O.FUNC": 8,
          "O.INTERFACE": 8,
          "O.PROT": 8,
          "O.SOFTWARE": 8,
          "O.USER": 14
        },
        "OE": {
          "OE.ADMIN": 6,
          "OE.AUDIT": 4,
          "OE.AUDIT_ACCESS": 2,
          "OE.AUDIT_STORAGE": 1,
          "OE.INTERFACE": 3,
          "OE.PHYISCAL": 1,
          "OE.PHYSICAL": 2,
          "OE.USER": 12
        },
        "T": {
          "T.CONF": 6,
          "T.DOC": 6,
          "T.FUNC": 3,
          "T.PROT": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 5
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL2": 4,
          "EAL2 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 15,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 9,
          "FAU_GEN.2.1": 1,
          "FAU_SAR": 1,
          "FAU_SAR.1": 10,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 9,
          "FAU_SAR.2.1": 1,
          "FAU_STG": 1,
          "FAU_STG.1": 11,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 1,
          "FAU_STG.4": 9,
          "FAU_STG.4.1": 1
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 12,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 2,
          "FCS_COP": 1,
          "FCS_COP.1": 11,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 3,
          "FDP_ACC.1": 74,
          "FDP_ACC.1.1": 6,
          "FDP_ACF.1": 67,
          "FDP_ACF.1.1": 6,
          "FDP_ACF.1.2": 6,
          "FDP_ACF.1.3": 6,
          "FDP_ACF.1.4": 6,
          "FDP_IFC": 1,
          "FDP_IFC.1": 6,
          "FDP_IFF": 1,
          "FDP_ITC.1": 1,
          "FDP_ITC.2": 1,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 21,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_ATD.1": 11,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 8,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 3,
          "FIA_UAU.1": 8,
          "FIA_UAU.2": 12,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.7": 10,
          "FIA_UAU.7.1": 1,
          "FIA_UID": 4,
          "FIA_UID.1": 13,
          "FIA_UID.2": 20,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 9,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 11,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 1,
          "FMT_MSA.1": 76,
          "FMT_MSA.1.1": 6,
          "FMT_MSA.3": 68,
          "FMT_MSA.3.1": 6,
          "FMT_MSA.3.2": 6,
          "FMT_MTD.1": 21,
          "FMT_MTD.1.1": 2,
          "FMT_SMF.1": 33,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 37,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FDI_EXP": 3,
          "FPT_FDI_EXP.1": 16,
          "FPT_FDI_EXP.1.1": 2,
          "FPT_STM.1": 11,
          "FPT_STM.1.1": 1,
          "FPT_TST.1": 9,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_SSL.3": 10,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 13,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 19
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4,
            "SHA1": 1
          },
          "SHA2": {
            "SHA256": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        },
        "other": {
          "cold boot": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1
        },
        "FIPS": {
          "FIPS PUB 197": 1
        },
        "RFC": {
          "RFC 2104": 1
        },
        "X509": {
          "X.509": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 18
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA256": 1
        }
      },
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20181220110632+09\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20181220113201+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 10.1.16 (Windows)",
      "/Subject": "Security Target",
      "/Title": "Xerox D136 Copier/Printer",
      "pdf_file_size_bytes": 738511,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 124
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf",
        "pp_name": "U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2\u2122-200..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0619_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_CMC.2",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0619_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4d99c784fb6da3c4b2460bdc963316ed5eb5afb1911bbf0698188687621832ba",
      "txt_hash": "6b06a72ff43cbfa85925208b0fc7834016faae3c5facf30a3d7677582d7541ef"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "094b4cdbdf06f8de78eb915aa18e1f8c77db95094570e2da040bae37f1fa1c41",
      "txt_hash": "734febdfa76e6e63c9867321f99a62d1bd964e5c369b534d3f1f0bb2f698af55"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bc7dda3d8ffc069cb5d79bb20d347298bdea3f724a6a3d369b5d4eb7e1c97fe2",
      "txt_hash": "abb5942d67ec7422d6a98c57e9491245560f146466f4e203ba4e1e7617197803"
    }
  },
  "status": "archived"
}