Certified/Validated Products List

Fuji Xerox ApeosPort-VII
C7773/C6673/C5573/C4473/C3373/C3372/C2273
DocuCentre-VII
C7773/C6673/C5573/C4473/C3373/C3372/C2273 models
with Overwrite Hard Disk, Copy, Print, Fax and Scan
Controller ROM Ver. 1.3.8, Fax ROM Ver. 2.2.1

FUJIFILM Business Innovation Corp.
Last Updated 2021-04-20
Product Name :
Fuji Xerox ApeosPort-VII
C7773/C6673/C5573/C4473/C3373/C3372/
C2273
DocuCentre-VII
C7773/C6673/C5573/C4473/C3373/C3372/
C2273 models
with Overwrite Hard Disk, Copy, Print, Fax and Scan
Version of TOE :
Controller ROM Ver. 1.3.8, Fax ROM Ver. 2.2.1
Product Type :
Multi-Function Device
Certification No. :
C0682
Date :
2020-09-15
Version of Common Criteria:
3.1 Release5
Conformance Claim :
ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
PP Identifier :
Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)

PRODUCT DESCRIPTION

Description of TOE

The TOE is a Multifunction Device that has the functions such as copy, scan, print, fax, document storage and retrieval.
The TOE provides the security functionality required by the protection profile for Multifunction Device, “Protection Profile for Hardcopy Devices 1.0”.

 

TOE security functionality

The TOE provides the following security functions:

- Identification and Authentication
- Access Control
- Data Encryption
- Trusted Communications
- Security Management
- Security Auditing
- Trusted Operation
- PSTN Fax-Network Separation
- Overwrite Hard Disk

 

Security functional requirements

This TOE implements the following security functional requirements.

Security audit Non-repudiation of origin/receipt Cryptographic functionality Access control
Data authentication Export data protection Information flow control Import data protection
Internal transfer data protection Residual information protection Rollback Stored data integrity
Transfer data confidentiality Transfer data integrity Identification and authentication Security management
Privacy Control Security functionality protection Resource utilisation management TOE access control
Trusted path/channels Random number generation