March 2016
Fuji Xerox
DocuCentre-V C2265/C2263
models
with Hard Disk, Data Security, Scan,
and Fax
Security Target
Version 1.1.7
This document is a translation of the evaluated
and certified security target written in Japanese.
Page 1: ...uji Xerox DocuCentre V C2265 C2263 models with Hard Disk Data Security Scan and Fax Security Target Version 1 1 7 This document is a translation of the evaluated and certified security target written...
Page 2: ...ackage Claim 20 2 2 1 PP Claim 20 2 2 2 Package Claim 20 2 2 3 Conformance Rationale 21 3 SECURITY PROBLEM DEFINITION 23 3 1 Threats 23 3 1 1 Assets Protected by TOE 23 3 1 2 Threats agents 26 3 1 3 T...
Page 3: ...ctional Requirements 102 6 3 3 Security Assurance Requirements Rationale 107 7 TOE SUMMARY SPECIFICATION 108 7 1 Security Functions 108 7 1 1 Hard Disk Data Overwrite TSF_IOW 110 7 1 2 Hard Disk Data...
Page 4: ...curity Objectives 30 Table 13 Security Objectives Rationale for Security Problem 30 Table 14 Security functional Requirements 40 Table 15 Auditable Events of TOE and Individually Defined Auditable Eve...
Page 5: ...nts 93 Table 40 Security Functional Requirements and the Corresponding Security Objectives 94 Table 41 Security Objectives to SFR Rationale 96 Table 42 Dependencies of Functional Security Requirements...
Page 6: ...cuCentre V C2263 The TOE name is integrated as below TOE Identification Fuji Xerox DocuCentre V C2265 C2263 models with Hard Disk Data Security Scan and Fax Version Controller ROM Ver 1 0 13 FAX ROM V...
Page 7: ...data Mailbox the security audit log data and the document data on the internal network between the TOE and the remote The TOE also prevents the document data and the used document data in the internal...
Page 8: ...the behavior of the TOE is the same for both authentication types There are two types of remote authentication LDAP authentication and Kerberos authentication To set SA system administrator privilege...
Page 9: ...ox The Internet Fax Send function and Control Panel function are to send and receive fax data via the Internet not public telephone line The TOE provides the following security features 1 Hard Disk Da...
Page 10: ...ication protocols are supported SSL TLS IPSec and S MIME 8 Information Flow Security This function restricts the unpermitted communication between external interfaces and internal network 9 Self Test...
Page 11: ...n request the MFD to print and retrieve the document data The user can also request the MFD to retrieve the scanned document data via Web browser by using scan function of the MFD Additionally the gen...
Page 12: ...a mail protocol 4 FTP server The hardware OS is a general purpose PC or server The MFD sends document data to FTP server via FTP 5 LDAP server The hardware OS is a general purpose PC or server The MFD...
Page 13: ...licy TSP Administrators may possess special privileges that provide capabilities to override portions of the TSP System administrator key operator and SA A user who is authorized to manage the device...
Page 14: ...y Print Scan Network Scan Fax Internet Fax Send Hard Disk Data Overwrite Hard Disk Data Encryption User Authentication System Administrator s Security Management Customer Engineer Operation Restrictio...
Page 15: ...e print data are sent by either being decomposed to the data in PDL via printer driver or the document file being designated directly from web browser of CWIS The print function is of two types the no...
Page 16: ...nal HDD the data are overwritten with new data after each job copy print scan network scan fax or internet fax send is completed Without this function the used document data remain and only the manage...
Page 17: ...t as security functions The following are the security functions which prevent the unauthorized reading of document data in the internal HDD by an attacker who is impersonating an authorized user The...
Page 18: ...control panel and needs to be authenticated to use scan function When the user is authenticated the document data can be scanned from IIT and stored into the internal HDD according to the user s inst...
Page 19: ...CWIS Set the ID and the password of key operator only a key operator is privileged Refer to and set the ID of SA general user and set the password with local authentication only Refer to and set the a...
Page 20: ...n external interfaces and internal network Fax board of TOE device option is connected to a controller board via USB interface but the unauthorized access from a public telephone line to the inside TO...
Page 21: ...to Enabled User Authentication Set to Login to Local Authentication or Remote Authentication Store Print Set to Save as Private Charge Print Auto Clear Set to Enabled Security Audit Log Set to Enable...
Page 22: ...lient Mail Server FTP Server LDAP Server Kerberos Server Fax Board SEEPROM DRAM Controller ROM Copy Hard Disk Data Overwrite Hard Disk Data Encryptio n Security Audit Log Print Control decompos e Fax...
Page 23: ...ut Terminal is a device to scan an original and send its data to the controller board for copy scan and Fax functions The ADF Auto Document Feeder is a device to automatically transfer original docume...
Page 24: ...ministrator Guide ME7480E2 1 SHA1 hash value 4616727b449dc0072caf1744e70338c635172870 DocuCentre V C2265 C2263 User Guide ME7479E2 1 SHA1 hash value fb0c53b456e425c76f6926fd41f26e6c69fdc6b7 DocuCentre...
Page 25: ...t Approved Protection Profile U S Government Protection Profile for Hardcopy Devices Version 1 0 IEEE Std 2600 2 TM 2009 This PP conforms to IEEE Standard Protection Profile for Hardcopy Devices in IE...
Page 26: ...written covering the PP P CIPHER is added for OSP for the TOE in addition to Threats OSP Assumptions required in PP P CIPHER is the data encryption of the internal HDD and is independent from other P...
Page 27: ...ive than that of PP In this ST the content quoted from the SFR of PP is written in italics describing the content required by PP Also the assigned part is similarly written in italics including the pa...
Page 28: ...copy output Document data stored for job processing When a user uses MFD functions of copy print fax and scan the document data are temporarily stored in the internal HDD for image processing transmis...
Page 29: ...onal security of the TOE Data on General user Password Data on Security Audit Log Table 15 Data on Hard Disk Data Encryption Data on Internal Network Data Protection The system administrator can set s...
Page 30: ...emory and SEEPROM Those setting data however are not assumed as assets to be protected because they do not engage in TOE security functions Security Audit Log data are temporarily stored in NVRAM but...
Page 31: ...ns who unintentionally cause a software malfunction that may expose the TOE to unanticipated threats 3 1 3 Threats Table 7 identifies the threats addressed by the TOE Unauthorized persons are assumed...
Page 32: ...interfaces of the TOE operation of the interfaces will be controlled by the TOE and its IT environment P CIPHER To prevent unauthorized reading out the document data and used document data in the int...
Page 33: ...unauthorized disclosure O CONF NO_ALT The TOE shall protect TSF Confidential Data from unauthorized alteration O USER AUTHORIZED The TOE shall require identification and authentication of Users and s...
Page 34: ...RAINED The TOE Owner shall ensure that TOE Administrators are aware of the security policies and procedures of their organization have the training competence and time to follow the manufacturer s gui...
Page 35: ...ANAGED O INTERFACE MANAGED OE PHYISCAL MANAGED OE ADMIN TRAINED OE ADMIN TRUSTED OE USER TRAINED O CIPHER T DOC DIS T DOC ALT T FUNC ALT T PROT ALT T CONF DIS T CONF ALT P USER AUTHORIZATIO N P SOFTWA...
Page 36: ...thentication as the basis for authorization OE USER AUTHORIZED establishes responsibility of the TOE Owner to appropriately grant authorization T PROT ALT TSF Protected Data may be altered by unauthor...
Page 37: ...tains a log of TOE use and security relevant events and prevents unauthorized disclosure or alteration OE AUDIT REVIEWED establishes responsibility of the TOE Owner to ensure that audit logs are appro...
Page 38: ...IN TRAINED establishes responsibility of the TOE Owner to provide appropriate Administrator training A ADMIN TRUST Administrators do not use their privileged access rights for malicious purposes OE AD...
Page 39: ...herefore direct forwarding of unprocessed data between different external interfaces is forbidden unless explicitly allowed by an authorized administrative role The family FPT_FDI_EXP has been defined...
Page 40: ...Protection Profile the authors needed to express the control of both user data and TSF data flow using administrative control instead of attribute based control It was found that using FDP_IFF and FD...
Page 41: ...eded Object Term phrase Definition Mailbox This term covers Personal Mailbox and Shared Mailbox Personal Mailbox Mailbox to be used individually by general user U NORMAL or SA Shared Mailbox Mailbox t...
Page 42: ...ty attributes Term phrase Definition General User role Indicates the authority required for general user to use the TOE SA role Indicates the authority required for SA to use the TOE Key Operator role...
Page 43: ...l panel does not accept any operation except power on and power off and the web browser does not accept authentication operation until the MFD main unit is powered off on Data on use of password enter...
Page 44: ...luded in the TOE setting data Data on Internal Network Data Protection The data on whether to enable disable the general encryption communication protocols to protect the communication data on the int...
Page 45: ...es Auditable Event is described and added in detail for each TOE FAU_GEN 2 User identity association Yes No change from PP FAU_SAR 1 Audit review No The function of retrieving audit log data are provi...
Page 46: ...rations and Access Control rule and also the operations of Delete and Modify are detailed and added for each TOE FDP_ACF 1 b FDP_ACF 1 c PRT SFR Package FDP_ACF 1 d SCN SFR Package FDP_ACF 1 e CPY SFR...
Page 47: ...icted to system administrator only by the addition of this SFR FMT_MSA 1 a FMT_MSA 1 b Management of security attributes Yes Management role of security attributes is described in accordance with TOE...
Page 48: ...enerate an audit record of the following auditable events Start up and shutdown of the audit functions All auditable events for the selection choose one of minimum basic detailed not specified level o...
Page 49: ...the type of cryptographic operation b Basic Any applicable cryptographic mode s of operation subject attributes and object attributes FDP_ACC 1 There are no auditable events foreseen FDP_ACF 1 a dele...
Page 50: ...and the actions e g disabling of a terminal taken and the subsequent if appropriate restoration to the normal state e g re enabling of a terminal FIA_ATD 1 There are no auditable events foreseen FIA_...
Page 51: ...reation of a subject b Basic Success and failure of binding of user security attributes to a subject e g success or failure to create a subject FMT_MOF 1 Changes in security function configuration Bas...
Page 52: ...of system administrator Minimal None required a Minimal modifications to the group of users that are part of a role b Detailed every use of the rights of a role FPT_STM 1 Changes in time setting Mini...
Page 53: ...ents included in the PP ST assignment other audit relevant information assignment other audit relevant information for each Relevant SFR listed in Table15 1 information as defined by its Audit Level i...
Page 54: ...stored audit records in the audit trail from unauthorized deletion FAU_STG 1 2 The TSF shall be able to selection choose one of prevent detect unauthorized modifications to the stored audit records i...
Page 55: ...yptographic key sizes that meet the following assignment list of standards assignment list of standards none assignment cryptographic key generation algorithm the Fuji Xerox s standard method FXOSENC...
Page 56: ...nied except for his her own documents R1 R2 Delete Delete the document data except for Mailbox and Private Print U USER Denied Register the document data to the Mailbox U USER R3 D FUNC attributes fro...
Page 57: ...cates data that is associated with an outbound sent fax job User identifier Owner identifier of D DOC Owner identifier of D FUNC DSR Indicates data that are associated with a document storage and retr...
Page 58: ...to use the functions as operations in Table 18 Table 18 Function Access Control SFP Object Attribute s Operation Subject Access control rule Copy F CPY F SCN F DSR User identifier User identifier for...
Page 59: ...ccess Control SFP in Table19 Table 19 PRT Access Control SFP Object Attribute s Operation Subject Access control rule D DOC PRT Read Print the document data in Private Print U USER Denied except for h...
Page 60: ...objects covered by the SFP the list of subjects objects and operations among subjects and objects covered by the CPY Access Control SFP in Table 21 Table 21 CPY Access Control SFP Object Attribute s...
Page 61: ...l enforce the assignment access control SFP on assignment list of subjects objects and operations among subjects and objects covered by the SFP assignment access control SFP DSR Access Control SFP in...
Page 62: ...lbox U USER When the owner identifier of D FUNC matches the user identifier operation to register the Mailbox is permitted FDP_ACF 1 a Security attribute based access control Hierarchical to No other...
Page 63: ...orize access of subjects to objects assignment rules based on security attributes that explicitly authorise access of subjects to objects In the U ADMINISTRATOR process operation to delete the documen...
Page 64: ...d objects selection the user is explicitly authorized by U ADMINISTRATOR to use a function a user that is authorized to use the TOE is automatically authorized to use the functions assignment list of...
Page 65: ...s of SFP relevant security attributes the list of subjects and objects controlled under the PRT Access Control SFP in Table 19 and for each the indicated security attributes in Table 19 FDP_ACF 1 2 c...
Page 66: ...ty attributes or named groups of SFP relevant security attributes assignment access control SFP SCN Access Control SFP in Table 20 assignment list of subjects and objects controlled under the indicate...
Page 67: ...DP_ACC 1 Subset access control FMT_MSA 3 Static attribute initialization FDP_ACF 1 1 e The TSF shall enforce the assignment access control SFP to objects based on the following assignment list of subj...
Page 68: ...based on security attributes that explicitly deny access of subjects to objects assignment rules based on security attributes that explicitly deny access of subjects to objects none FDP_ACF 1 f Secur...
Page 69: ...tributes that explicitly authorize access of subjects to objects assignment rules based on security attributes that explicitly authorise access of subjects to objects none FDP_ACF 1 4 f The TSF shall...
Page 70: ...e 23 governing access among Users and controlled objects using controlled operations on controlled objects FDP_ACF 1 3 g The TSF shall explicitly authorize access of subjects to objects based on the f...
Page 71: ...trolled operations on controlled objects assignment rules governing access among controlled subjects and controlled objects using controlled operations on controlled objects rules specified in the D F...
Page 72: ...detect when selection assignment positive integer number an administrator configurable positive integer within assignment range of acceptable values unsuccessful authentication attempts occur related...
Page 73: ...positive integer within assignment range of acceptable values assignment positive integer number 5 FIA_AFL 1 2 b When the defined number of unsuccessful authentication attempts has been selection met...
Page 74: ...icated assignment list of TSF mediated actions storing the fax data received from public telephone line FIA_UAU 1 2 The TSF shall require each user to be successfully authenticated before allowing any...
Page 75: ...owing rules on the initial association of user security attributes with the subjects acting on behalf of users assignment rules for the initial association of attributes assignment rules for the initi...
Page 76: ...e disable modify the behavior U ADMINISTRATOR Security Audit Log enable disable U ADMINISTRATOR Store Print enable disable modify the behavior U ADMINISTRATOR Internal Network Data Protection enable d...
Page 77: ...authorized identified roles the roles listed in Table 26 Table 26 Security Attributes and Authorized Roles Security attributes Operation Roles Key operator identifier modify Key Operator SA identifier...
Page 78: ...nt access control SFP s information flow control SFP s TOE Function Access Control SFP in Table 18 selection change default query modify delete assignment other operations query modify delete assignme...
Page 79: ...on assignment list of security attributes the security attributes listed in Table 17 assignment the authorized identified roles the roles listed in Table 28 Table 28 Security Attributes and Authorized...
Page 80: ...ted in Table 29 Table 29 Security Attributes and Authorized Roles SCN Security Attributes Operation Roles Key operator identifier modify Key Operator SA identifier query modify delete creation U ADMIN...
Page 81: ...of security attributes Hierarchical to No other components Dependencies FDP_ACC 1 Subset access control or FDP_IFC 1 Subset information flow control FMT_SMR 1 Security roles FMT_SMF 1 Specification of...
Page 82: ...UNC Shared Mailbox query delete creation Key Operator FMT_MSA 1 g Management of security attributes Hierarchical to No other components Dependencies FDP_ACC 1 Subset access control or FDP_IFC 1 Subset...
Page 83: ...agement of security attributes Hierarchical to No other components Dependencies FDP_ACC 1 Subset access control or FDP_IFC 1 Subset information flow control FMT_SMR 1 Security roles FMT_SMF 1 Specific...
Page 84: ...T_MSA 1 Management of security attributes FMT_SMR 1 Security roles FMT_MSA 3 1 a The TSF shall enforce the assignment access control SFP information flow control SFP to provide selection choose one of...
Page 85: ...ive assignment other property assignment other property permissive initialization property for basic functions such as copy print scan and fax as the default of security attribute FMT_MSA 3 2 b The TS...
Page 86: ...No other components Dependencies FMT_MSA 1 Management of security attributes FMT_SMR 1 Security roles FMT_MSA 3 1 d The TSF shall enforce the assignment access control SFP information flow control SFP...
Page 87: ...ride the default values when an object or information is created assignment the authorized identified roles none FMT_MSA 3 f Static attribute initialization Hierarchical to No other components Depende...
Page 88: ...ve permissive assignment other property assignment other property Initialization property in Table 34 FMT_MSA 3 2 g The TSF shall allow the assignment the authorized identified roles to specify altern...
Page 89: ...No other components Dependencies FMT_SMR 1 Security roles FMT_SMF 1 Specification of Management Functions FMT_MTD 1 1 a The TSF shall restrict the ability to selection change default query modify del...
Page 90: ...delete U ADMINISTRATOR Data on Customer Engineer Operation Restriction query modify U ADMINISTRATOR Data on Hard Disk Data Encryption query modify U ADMINISTRATOR Data on Hard Disk Data Overwrite que...
Page 91: ...cal to No other components Dependencies No dependencies FMT_SMF 1 1 The TSF shall be capable of performing the following management functions assignment list of management functions to be provided by...
Page 92: ...oreseen FDP_ACF 1 a Management of user identifier Management of owner identifier of D DOC Management of owner identifier of D FUNC Management of function and data on Store Print a Managing the attribu...
Page 93: ...r users FIA_SOS 1 none Reason The metric is fixed and is not managed a the management of the metric used to verify the secrets FIA_UAU 1 Management of data on use of password entered from MFD control...
Page 94: ...s that can specify initial values b managing the permissive or restrictive setting of default values for a given access control SFP c management of rules by which security attributes inherit specified...
Page 95: ...Revocation of such an allowance FMT_SMR 1 Security roles Hierarchical to No other components Dependencies FIA_UID 1 Timing of identification FMT_SMR 1 1 The TSF shall maintain the roles assignment the...
Page 96: ...ection assignment parts of TSF the TSF selection during initial start up periodically during normal operation at the request of the authorised user at the conditions assignment conditions under which...
Page 97: ...hical to No other components Dependencies No dependencies FTP_ITC 1 1 The TSF shall provide a communication channel between itself and another trusted IT product that is logically distinct from other...
Page 98: ...design AGD Guidance documents AGD_OPE 1 Operational user guidance AGD_PRE 1 Preparative procedures ALC Life cycle support ALC_CMC 2 Use of a CM system ALC_CMS 2 Parts of the TOE CM coverage ALC_DEL 1...
Page 99: ...t each security objective is assured by TOE security functional requirements Table 40 Security Functional Requirements and the Corresponding Security Objectives Objectives SFRs O DOC NO_DIS O DOC NO_A...
Page 100: ...SOFTWARE VERIFIED O AUDIT LOGGED O AUDIT_STORAGE PROTECTED O AUDIT_ACCESS AUTHORIZED O CIPHER FDP_ACF 1 e FDP_ACF 1 f FDP_ACF 1 g FDP_ACF 1 h FDP_RIP 1 FIA_AFL 1 a FIA_AFL 1 b FIA_ATD 1 FIA_SOS 1 FIA...
Page 101: ...the objective to prevent unauthorized disclosure and alteration by creating and maintaining the event logs related to the TOE usage and security This security objective can be realized by satisfying t...
Page 102: ...can be realized by satisfying the following security functional requirement In order to prevent attackers from using privileges given to system administrators and accessing protected assets the power...
Page 103: ...nd FIA_UID 1 user identification and authentication is conducted upon access from CWIS and control panel to identify authorized user and system administrator The user identification authentication is...
Page 104: ...user By FMT_SMF 1 TOE security management functions are provided for system administrator By FTP_ITC 1 communication data encryption protocol is supported to protect User Document Data on the interna...
Page 105: ...ated with the key operator SA system administrator and general user By FMT_SMF 1 TOE security management functions are provided for system administrator By FTP_ITC 1 communication data encryption prot...
Page 106: ...le D CONF by conducting the user identification By FMT_MOF 1 the user who enables disables TOE security functions and makes functional settings is limited to system administrator By FMT_MTD 1 a the pe...
Page 107: ...administrator can access the audit log Thus the functional requirements related to this objective are surely fulfilled O CIPHER O CIPHER is the objective that encrypts the document data and used docum...
Page 108: ...FAU_STG 1 FCS_CKM 1 Cryptographic key generation FCS_COP 1 FCS_CKM 4 A cryptographic key is generated when MFD is booted and stored on DRAM volatile memory A cryptographic key does not need to be dest...
Page 109: ...1 a FMT_MSA 3 a FDP_ACF 1 b Security attribute based access control FDP_ACC 1 b FMT_MSA 3 b FDP_ACF 1 c Security attribute based access control FDP_ACC 1 c FMT_MSA 3 c FDP_ACF 1 d Security attribute b...
Page 110: ...USB 1 User subject binding FIA_ATD 1 FMT_MOF 1 Management of security functions behavior FMT_SMF 1 FMT_SMR 1 FMT_MSA 1 a Management of security attributes FDP_ACC 1 a FMT_SMF 1 FMT_SMR 1 FMT_MSA 1 b M...
Page 111: ...MT_MSA 1 b FMT_SMR 1 FMT_MSA 3 c Static attribute initialization FMT_MSA 1 c FMT_SMR 1 FMT_MSA 3 d Static attribute initialization FMT_MSA 1 d FMT_SMR 1 FMT_MSA 3 e Static attribute initialization FMT...
Page 112: ...ument security operational accountability and information assurance The TOE environment will be exposed to only a low level of risk because it is assumed that the TOE will be located in a restricted o...
Page 113: ...fy the TOE security functional requirements that are specified in section 6 1 of this ST Table 43 Security Functional Requirements and the Corresponding TOE Security Functions Security Functions Secur...
Page 114: ...NET_PROT TSF_INF_FLOW TSF_S_TEST FDP_ACF 1 g FDP_ACF 1 h FDP_RIP 1 FIA_AFL 1 a FIA_AFL 1 b FIA_ATD 1 FIA_SOS 1 FIA_UAU 1 FIA_UAU 7 FIA_UID 1 FIA_USB 1 FMT_MOF 1 FMT_MSA 1 a FMT_MSA 1 b FMT_MSA 1 c FMT...
Page 115: ...k scan fax or internet fax send is completed This is because whether to prioritize efficiency or security depends on the usage environment of the MFD When efficiency is prioritized one pass overwrite...
Page 116: ...S algorithm based on FIPS PUBS 197 When reading out the stored document data the TOE decrypts the data also using the 256 bit cryptographic key generated at the time of booting and the AES algorithm 7...
Page 117: ...ed before accessing the system administrator mode When the number of unsuccessful authentication attempts with key operator ID reaches 5 times the control panel does not accept any operation except po...
Page 118: ...f user authentication 7 FIA_USB 1 User subject binding With the authenticated ID TOE associates the roles of key operator SA and general user with the subjects 8 FMT_MSA 1 a FMT_MSA 1 b FMT_MSA 1 c FM...
Page 119: ...general user when it is his her own 10 FMT_SMR 1 Security roles The TOE maintains the roles of key operator SA system administrator and general user and associates these roles to the authorized users...
Page 120: ...l to remote fax is permitted Storage of the print data from user client to Private Print printing of the document data in the print data and retrieval of the document data in Mailbox As shown in Table...
Page 121: ...d General user SA Document Data in Private Print When the owner identifier of D DOC all document data in Private Print and the entered user identifier are matched printing and deletion of all document...
Page 122: ...esponding Mailbox Also all the received fax data can be distributed and stored in Mailbox according to over which line the data are transmitted To refer to retrieve print or delete the stored data in...
Page 123: ...Data Protection enable disable it and configure the details Refer to the setting of User Authentication and select disable Local Authentication Remote Authentication and configure the details Refer to...
Page 124: ...DOC and D FUNC Also the TOE sets the owner identifier of Mailbox that receives the fax data public telephone line data as the default of security attribute for D DOC fax receive 3 FMT_SMR 1 Security r...
Page 125: ...r operation Local Start End Self Test Successful Failed User Authentication Login Logout Login Successful Failed Invalid UserID Failed Invalid Password Failed Logout Locked System Administrator Authen...
Page 126: ...ommunication Failed Protocol and communication destination stored 2 FAU_GEN 2 User identity association TOE records the defined auditable event in the audit log file by associating it with the identit...
Page 127: ...rovided by the following four protocols which are configured by a system administrator using the system administrator mode 1 FTP_ITC 1 Inter TSF trusted channel The document data and Mailbox user func...
Page 128: ...y a system administrator b IPSec According to the IPSec communication which is configured by a system administrator using the system administrator mode IPSec ensuring secure data transmission is suppo...
Page 129: ...tocol for mail encryption Cryptographic Method and Size of Secret Key 3Key Triple DES 168 bits AES 128 bits AES 192 bits AES 256 bits Hash method generated as S MIME protocol for digital signature has...
Page 130: ...n and authentication are required to use functions from the control panel In addition there is no function to transfer the data input from the control panel to other interfaces without any instruction...
Page 131: ...PUB Federal Information Processing Standard publication IIT Image Input Terminal IOT Image Output Terminal IT Information Technology IP Internet Protocol MFD Multi Function Device NVRAM Non Volatile...
Page 132: ...ents toward the TOE via the Web browser of the user client CWIS can be used with the Windows standard Web browser User Authentication A function to limit the accessible TOE functions by identifying th...
Page 133: ...to be converted into bitmap data by the TOE decompose function Control Data The data that are transmitted by command and response interactions This is one type of the data transmitted between MFD hard...
Page 134: ...ons of Hard Disk Data Overwrite Hard Disk Data Encryption System Administrator s Security Management Customer Engineer Operation Restriction Use of password entered from MFD control panel in user auth...
Page 135: ...ji Xerox Co Ltd Term Definition Line Data Fax data Certificate Defined in the X 509 which is recommended by ITU T The data for user authentication name identification name organization where he she be...
Page 136: ...n Version 3 1 Part 2 Security functional components dated September 2012 CCMB 2012 09 002 Japanese version 1 0 dated November 2012 translated by Information Technology Promotion Agency Japan CC Part 3...