Last Updated 2014-09-30
- Product Name :
- Japanese : Fuji Xerox ApeosPort-V C7780/C6680/C5580
DocuCentre-V C7780/C6680/C5580 Series Controller Software
English : Fuji Xerox ApeosPort-V C7780/C6680/C5580 DocuCentre-V C7780/C6680/C5580 Series Controller Software
- Version of TOE :
- Controller ROM Ver. 1.0.13
- Product Type :
- Control Software for Multi Function Device
- Certification No. :
- C0434
- Date :
- 2014-07-11
- Version of Common Criteria:
- 3.1 Release4
- Conformance Claim :
- EAL3
- PP Identifier :
- None
- Vendor :
- Fuji Xerox Co., Ltd.
-
- POC :
- Masami Kurata
- Division :
- System Platform Strategy & Planning,
Products Development Group
- Phone :
- +81-45-755-5111
- E-mail :
- Evaluation Facility :
- Information Technology Security Center Evaluation Department
- Certification/Validation
Report :
(365 KB)(2014-09-30) - CC
Certificate Image :
(406 KB)(2014-07-22) - Security Target :
(598 KB)(2014-09-30)
PRODUCT DESCRIPTION
Description of TOE
The TOE is the software to control Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax.
The MFD is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD.
TOE security functionality
To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions:
- | Hard Disk Data Overwrite |
- | Hard Disk Data Encryption |
- | User Authentication |
- | System Administrator's Security Management |
- | Customer Engineer Operation Restriction |
- | Security Audit Log |
- | Internal Network Data Protection |
- | Fax Flow Security |
- | Self Test |
Security functional requirements
This TOE implements the following security functional requirements.
Security audit | Non-repudiation of origin/receipt | Cryptographic functionality | Access control |
Data authentication | Export data protection | Information flow control | Import data protection |
Internal transfer data protection | Residual information protection | Rollback | Stored data integrity |
Transfer data confidentiality | Transfer data integrity | Identification and authentication | Security management |
Privacy Control | Security functionality protection | Resource utilisation management | TOE access control |
Trusted path/channels |