Certified/Validated Products List

Fuji Xerox ApeosPort
C3060/C2560/C2360/C2060/
C3060 G/C2560 G/C2060 G models
with Copy, Print, Fax, Scan and Overwrite Storage
Controller ROM Ver. 1.5.3, Fax ROM Ver. 2.2.1

FUJIFILM Business Innovation Corp.
Last Updated 2021-04-20
Product Name :
Fuji Xerox ApeosPort
C3060/C2560/C2360/C2060/
C3060 G/C2560 G/C2060 G models
with Copy, Print, Fax, Scan and Overwrite Storage
Version of TOE :
Controller ROM Ver. 1.5.3, Fax ROM Ver. 2.2.1
Product Type :
Multi-Function Device
Certification No. :
C0704
Date :
2021-02-08
Version of Common Criteria:
3.1 Release5
Conformance Claim :
ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
PP Identifier :
Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)

PRODUCT DESCRIPTION

Description of TOE

The TOE is a Multifunction Device that has the functions such as copy, scan, print, fax, document storage and retrieval.
The TOE provides the security functionality required by the protection profile for Multifunction Device, “Protection Profile for Hardcopy Devices 1.0”.

 

TOE security functionality

The TOE provides the following security functions:

- Identification and Authentication
- Access Control
- Data Encryption
- Trusted Communications
- Security Management
- Security Auditing
- Trusted Operation
- PSTN Fax-Network Separation
- Overwrite Storage

 

Security functional requirements

This TOE implements the following security functional requirements.

Security audit Non-repudiation of origin/receipt Cryptographic functionality Access control
Data authentication Export data protection Information flow control Import data protection
Internal transfer data protection Residual information protection Rollback Stored data integrity
Transfer data confidentiality Transfer data integrity Identification and authentication Security management
Privacy Control Security functionality protection Resource utilisation management TOE access control
Trusted path/channels Random number generation