This page was not yet optimized for use on mobile
devices.
DataOverwriteSecurity Unit Type H Software Version: 1.01x
CSV information
| Status | archived |
|---|---|
| Valid from | 28.02.2008 |
| Valid until | 07.10.2013 |
| Scheme | 🇯🇵 JP |
| Manufacturer | Ricoh Company, Ltd. |
| Category | Other Devices and Systems |
| Security level | EAL3 |
Heuristics summary
Certificate ID: JISEC-CC-CRP-C0145
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Security level
EAL3Claims
A.MODECertificates
CRP-C0145-01, Certification No. C0145Standards
ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
| Title | untitled |
|---|---|
| Creation date | D:20080911170342+09'00' |
| Modification date | D:20080911170342+09'00' |
| Pages | 18 |
| Producer | Acrobat Distiller 6.0 (Windows) |
Security target
Extracted keywords
Security level
EAL3Claims
O.OVERWRITE, A, A.MODE, OE.MODESecurity Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FDP_SIP.1, FDP_SIP.1.1, FDP_RIP.1, FPT_RVM.1, FPT_RVM.1.1Certification process
out of scope, attack capability is needed for attacks such as bypassing or tampering TSF, but those are out of scope of this evaluation. That is to say, an analysis of apparent vulnerability (AVA_VLA.1) is sufficientStandards
ISO/IEC 15408:2005File metadata
| Creation date | D:20080820185804+09'00' |
|---|---|
| Modification date | D:20080820185804+09'00' |
| Pages | 30 |
| Producer | Acrobat Distiller 5.0 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
JISEC-CC-CRP-C0145Extracted SARs
ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1Similar certificates
Scheme data
| Cert Id | JISEC-CC-CRP-C0145 | |
|---|---|---|
| Supplier | RICOH COMPANY, LTD. | |
| Toe Overseas Name | DataOverwriteSecurity Unit Type H Software 1.01x | |
| Expiration Date | 01.10.2013 | |
| Claim | EAL3 | |
| Revalidations | [frozendict({'date': '2009-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0145_it7169_02.html'})] | |
| Certification Date | 01.02.2008 | |
| Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0145_it7169.html | |
| Toe Japan Name | imagio Security Card Type 7 Software 1.01x | |
| Enhanced | ||
| Product | imagio Security Card Type 7 Software (Japanese name) DataOverwriteSecurity Unit Type H Software (English name) | |
| Toe Version | 1.01x | |
| Product Type | IT Product (software to overwrite data) | |
| Cc Version | 2.3 | |
| Assurance Level | EAL3 | |
| Vendor | RICOH COMPANY, LTD. | |
| Evaluation Facility | Electronic Commerce Security Technology Laboratory Inc. Evaluation Center | |
| Report Link | https://www.ipa.go.jp/en/security/c0145_erpt.pdf | |
| Cert Link | https://www.ipa.go.jp/en/security/c0145_eimg.pdf | |
| Target Link | https://www.ipa.go.jp/en/security/c0145_est.pdf | |
| Description | PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; Ricoh imagio MP C6000 series Ricoh imagio MP C7500 series Ricoh Aficio MP C6000 series Ricoh Aficio MP C7500 series Savin C6055/C7570 series Lanier LD260c/275c series Lanier MP C6000/C7500 series Gestetner MP C6000/C7500 series Infotec MP C6000/C7500 series NRG MP C6000/C7500 series TOE security functions Same as above. | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "663b9c1bde7447b3",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0145",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.01"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0145",
"certification_date": "2008-02-01",
"claim": "EAL3",
"enhanced": {
"assurance_level": "EAL3",
"cc_version": "2.3",
"cert_link": "https://www.ipa.go.jp/en/security/c0145_eimg.pdf",
"description": "PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; Ricoh imagio MP C6000 series Ricoh imagio MP C7500 series Ricoh Aficio MP C6000 series Ricoh Aficio MP C7500 series Savin C6055/C7570 series Lanier LD260c/275c series Lanier MP C6000/C7500 series Gestetner MP C6000/C7500 series Infotec MP C6000/C7500 series NRG MP C6000/C7500 series TOE security functions Same as above.",
"evaluation_facility": "Electronic Commerce Security Technology Laboratory Inc. Evaluation Center",
"product": "imagio Security Card Type 7 Software (Japanese name) DataOverwriteSecurity Unit Type H Software (English name)",
"product_type": "IT Product (software to overwrite data)",
"report_link": "https://www.ipa.go.jp/en/security/c0145_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0145_est.pdf",
"toe_version": "1.01x",
"vendor": "RICOH COMPANY, LTD."
},
"expiration_date": "2013-10-01",
"revalidations": [
{
"date": "2009-06",
"link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0145_it7169_02.html"
}
],
"supplier": "RICOH COMPANY, LTD.",
"toe_japan_name": "imagio Security Card Type 7 Software 1.01x",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0145_it7169.html",
"toe_overseas_name": "DataOverwriteSecurity Unit Type H Software 1.01x"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Ricoh Company, Ltd.",
"manufacturer_web": "https://www.ricoh.com/",
"name": "DataOverwriteSecurity Unit Type H Software Version: 1.01x",
"not_valid_after": "2013-10-07",
"not_valid_before": "2008-02-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0145_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0145-01": 1,
"Certification No. C0145": 1
}
},
"cc_claims": {
"A": {
"A.MODE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2005-08-001": 2,
"CCMB-2005-08-002": 2,
"CCMB-2005-08-003": 2,
"CCMB-2005-08-004": 2
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20080911170342+09\u002700\u0027",
"/ModDate": "D:20080911170342+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "untitled",
"pdf_file_size_bytes": 98465,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "c0145_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A": 1,
"A.MODE": 6
},
"O": {
"O.OVERWRITE": 6
},
"OE": {
"OE.MODE": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.3": 2,
"ACM_SCP.1": 2
},
"ADO": {
"ADO_DEL.1": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP.1": 2,
"ADV_HLD.2": 2,
"ADV_RCR.1": 2
},
"AGD": {
"AGD_ADM.1": 2,
"AGD_USR.1": 2
},
"ALC": {
"ALC_DVS.1": 3
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.1": 1,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_MSU.1": 2,
"AVA_SOF.1": 1,
"AVA_VLA.1": 3
}
},
"cc_security_level": {
"EAL": {
"EAL3": 9
}
},
"cc_sfr": {
"FDP": {
"FDP_RIP.1": 5,
"FDP_SIP.1": 13,
"FDP_SIP.1.1": 1
},
"FPT": {
"FPT_RVM.1": 8,
"FPT_RVM.1.1": 1
}
},
"certification_process": {
"OutOfScope": {
"attack capability is needed for attacks such as bypassing or tampering TSF, but those are out of scope of this evaluation. That is to say, an analysis of apparent vulnerability (AVA_VLA.1) is sufficient": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408:2005": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20080820185804+09\u002700\u0027",
"/ModDate": "D:20080820185804+09\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0 (Windows)",
"pdf_file_size_bytes": 406573,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 30
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0145_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0145_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "512f1da62ce4f5835e8b31e36524bd134f7742b0faac623e92c9665a584a6ed2",
"txt_hash": "aa1315d75f2a52c82a16f6f5a20bd964cee5c4b2fcb48be2dc395da6bc196365"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a60c776ddd9b8ec08bb3c118665dabf5b1cd5d51d00a7fa4fec7920f56859557",
"txt_hash": "96f8d2f32e1f56eb718a302367ae57ac65331a0c15b64e859cbdf8fc40fc4976"
}
},
"status": "archived"
}