
Fuji Xerox ApeosPort-II C4300(AP)Series Security Kit for Asia Pacific Security Target V1.01
- 32 -
This function is configured to certainly operate because it is realized by unique software that does
not have bypass measures.
Table 12: Control of Overwriting
Number of
overwritings
Data to overwrite with
One time 0
Three times First time: random number
Second time: random number
Third time: 0
6.1.2. HDD Data Encryption Function (SF.ENCRYPTION)
According to the “setting for HDD data encryption function” that is set by key operator, this function
encrypts document data stored on the hard disk drive. At the time of booting, TOE generates 128-bit
cryptographic key using the Fuji Xerox’s unique FXOSENC method algorithm and “cryptographic
seed key for data stored on the hard disk drive” that is set by key operator. (When “cryptographic
seed key for data stored on the hard disk drive” is the same, the same cryptographic key is
generated.)
When storing document data on the hard disk drive, TOE stores the document data after performing
encryption using the cryptographic key generated at the time of booting. When reading the stored
document data, TOE also performs decryption using the cryptographic key generated at the time of
booting. The cryptographic key generated at the time of booting is stored on DRAM (volatile
memory) on the controller board in MFP. Cryptographic key is lost when the power of the mainframe
of MFP is shut down.
This function is configured to certainly operate because it is realized by unique software that does
not have bypass measures.
This function also uses the encryption mechanism (encryption with Rijndael Algorithm) as a security
mechanism.
6.1.3. Key-operator Authentication Function(SF.MANAGE)
This function controls the operation of TOE setting data so that the operation can be performed by
the authenticated key-operator. Before allowing the operation of TOE setting data, this function
identifies and authenticates key operator with “key-operator’s user ID” and “key-operator’s
password” entered at the control panel or through the Web browser of key-operator’s client.
While “key-operator’s password” is being entered at the control panel or through the Web browser of
key-operator’s client, asterisks (“*”) of the same number as the characters of the entered password
are displayed in the “password” input field of the control panel or the Web browser of key-operator’s
client.
When the “key-operator’s user ID” and ”key-operator’s password” entered at the control panel or
through the Web browser of key-operator’s client are correct and the identification/authentication of
Comentários a estes Manuais