Certified/Validated Products List

Japanese : Fuji Xerox
ApeosPort-V 7080/6080/5080
DocuCentre-V 7080/6080/5080
Series Controller Software
English : Fuji Xerox
ApeosPort-V 7080/6080
DocuCentre-V 7080/6080
Series Controller Software
Controller ROM Ver. 1.0.7

Fuji Xerox Co., Ltd.
Last Updated 2015-11-02
Product Name :
Japanese : Fuji Xerox ApeosPort-V 7080/6080/5080 DocuCentre-V 7080/6080/5080 Series Controller Software
English : Fuji Xerox ApeosPort-V 7080/6080 DocuCentre-V 7080/6080 Series Controller Software
Version of TOE :
Controller ROM Ver. 1.0.7
Product Type :
Control Software for Multi Function Device
Certification No. :
C0481
Date :
2015-08-26
Version of Common Criteria:
3.1 Release4
Conformance Claim :
EAL3 Augmented with ALC_FLR.2
PP Identifier :
None

PRODUCT DESCRIPTION

Description of TOE

The TOE is the software to control Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax.
The MFD is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD.

 

TOE security functionality

To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions:

- Hard Disk Data Overwrite
- Hard Disk Data Encryption
- User Authentication
- System Administrator's Security Management
- Customer Engineer Operation Restriction
- Security Audit Log
- Internal Network Data Protection
- Fax Flow Security
- Self Test

 

Security functional requirements

The TOE implements the following security functional requirements.

Security audit Non-repudiation of origin/receipt Cryptographic functionality Access control
Data authentication Export data protection Information flow control Import data protection
Internal transfer data protection Residual information protection Rollback Stored data integrity
Transfer data confidentiality Transfer data integrity Identification and authentication Security management
Privacy Control Security functionality protection Resource utilisation management TOE access control
Trusted path/channels