Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Japan: Ricoh imagio MP 4000/5000 series, Overseas: Ricoh Aficio MP 4000/5000 series, Savin 9040/9050 series, Lanier MP 4000/5000 series, Gestetner MP 4000/5000 series, Nashuatec MP 4000/5000 series, Rex-Rotary MP 4000/5000 series, Infotec MP 4000/5000 series Version: System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01
JISEC-CC-CRP-C0239
RICOH IM C300/C400/C400SR, SAVIN IM C300/C400/C400SR, LANIER IM C300/C400/C400SR, nashuatec IM C300/C400/C400SR, Rex Rotary IM C300/C400/C400SR, Gestetner IM C300/C400/C400SR E-1.00
JISEC-CC-CRP-C0688-01-2020
name Japan: Ricoh imagio MP 4000/5000 series, Overseas: Ricoh Aficio MP 4000/5000 series, Savin 9040/9050 series, Lanier MP 4000/5000 series, Gestetner MP 4000/5000 series, Nashuatec MP 4000/5000 series, Rex-Rotary MP 4000/5000 series, Infotec MP 4000/5000 series Version: System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01 RICOH IM C300/C400/C400SR, SAVIN IM C300/C400/C400SR, LANIER IM C300/C400/C400SR, nashuatec IM C300/C400/C400SR, Rex Rotary IM C300/C400/C400SR, Gestetner IM C300/C400/C400SR E-1.00
not_valid_before 2009-11-13 2020-10-16
not_valid_after 2014-11-14 2025-10-16
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0239_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0688_est.pdf
status archived active
security_level EAL3 ALC_FLR.2, EAL2+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0239_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0688_erpt.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0688_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None 638d3437ae7ff30a3a126570e54b06cdc78bcdc234ba11a89a6bd3343480f08a
state/cert/txt_hash None 11af603b8aece58c614ef033eea905d6c101eb0e841c155f151e608f27305833
state/report/pdf_hash 7f2e5573ec37e5276c5e63d3242e9424c67a3f78fe6b2bdd2e9f218478d74e1a 12111e6907550b9e1ff9f932884a83e225b0df3b7653f8d605e551b39db6dfd0
state/report/txt_hash 8aa0c26e8eba84da96a673e01c1ba3b7b0b87682a5c0f2e8250fc80c722eb076 10355f95b8d19f4cfd1ff280f43acfb18967efc6ca351c0a28379351a6267ccb
state/st/pdf_hash 910da3f406e6c5a37a66aae707a1cb9f4fd9b268c9405165d487b2ee08d28ed6 65e8796df581d2537ee6727b4c68bcd1273108207aca23a38538f4529d77fd6f
state/st/txt_hash 9eb18d0b7bea25d461a6295e9caef9be5110ddb5ada33057eff416697bb774a0 e3374a685e3cc1f8ed3987701e94d84ff42585d1687826d45f587f3367d0e122
heuristics/cert_id JISEC-CC-CRP-C0239 JISEC-CC-CRP-C0688-01-2020
heuristics/extracted_versions 1.57, 1.09.3, 7.23, 1.09, 1.13.1, 03.00.00, 01.23 1.00
heuristics/scheme_data/cert_id C0239 C0688
heuristics/scheme_data/certification_date 2009-11 2020-10
heuristics/scheme_data/claim EAL3 PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
heuristics/scheme_data/enhanced
  • product: Japan: Ricoh imagio MP 4000/5000 series Overseas: Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series
  • toe_version: System/Copy: 1.09 Network Support: 7.23 Scanner: 01.23 Printer: 1.09 Fax: 03.00.00 Web Support: 1.57 Web Uapl: 1.13.1 Network Doc Box: 1.09.3C Ic Key: 1100 Ic Hdd: 01
  • product_type: IT Product (Multi Function Product)
  • certification_date: 2009-11-13
  • cc_version: 2.3
  • assurance_level: EAL3
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0239_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0239_img.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0239_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP, made by RICOH COMPANY, LTD., that provides the functions of copier, scanner, printer and fax (optional). Those are for digitizing the paper document files, managing the document files and printing the document files. The TOE is an image I/O device that incorporates the functionality of copier, scanner, fax and printer. In general, the TOE is connected to an office LAN and is used to input, store and output the document data. TOE security functions The major security functions of the TOE are as follows: - Identification and Authentication Function and Document Data Access Control Function to protect the stored document data from the unauthorized access - Encryption Function to protect the stored document data from the leakage - Network Communication Data Protection Function to protect the communication data from the leakage or tampering - Telephone Line Intrusion Protection Function to prevent the unauthorized intrusion from a telephone line - MFP Control Software Verification Function to check the integrity of the control software
  • product: RICOH IM C300/C400/C400SR, SAVIN IM C300/C400/C400SR, LANIER IM C300/C400/C400SR, nashuatec IM C300/C400/C400SR, Rex Rotary IM C300/C400/C400SR, Gestetner IM C300/C400/C400SR
  • toe_version: E-1.00
  • product_type: Multi Function Product
  • cert_id: JISEC-C0688
  • certification_date: 2020-10-16
  • cc_version: 3.1 Release5
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000013qy-att/c0688_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000013qy-att/c0688_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000013qy-att/c0688_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/assurance_level EAL3 EAL2 Augmented by ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 2.3 3.1 Release5
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0239_img.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000013qy-att/c0688_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2009-11-13 2020-10-16
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP, made by RICOH COMPANY, LTD., that provides the functions of copier, scanner, printer and fax (optional). Those are for digitizing the paper document files, managing the document files and printing the document files. The TOE is an image I/O device that incorporates the functionality of copier, scanner, fax and printer. In general, the TOE is connected to an office LAN and is used to input, store and output the document data. TOE security functions The major security functions of the TOE are as follows: - Identification and Authentication Function and Document Data Access Control Function to protect the stored document data from the unauthorized access - Encryption Function to protect the stored document data from the leakage - Network Communication Data Protection Function to protect the communication data from the leakage or tampering - Telephone Line Intrusion Protection Function to prevent the unauthorized intrusion from a telephone line - MFP Control Software Verification Function to check the integrity of the control software PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Evaluation Department ECSEC Laboratory Inc. Evaluation Center
heuristics/scheme_data/enhanced/product Japan: Ricoh imagio MP 4000/5000 series Overseas: Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series RICOH IM C300/C400/C400SR, SAVIN IM C300/C400/C400SR, LANIER IM C300/C400/C400SR, nashuatec IM C300/C400/C400SR, Rex Rotary IM C300/C400/C400SR, Gestetner IM C300/C400/C400SR
heuristics/scheme_data/enhanced/product_type IT Product (Multi Function Product) Multi Function Product
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0239_erpt.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000013qy-att/c0688_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0239_est.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000013qy-att/c0688_est.pdf
heuristics/scheme_data/enhanced/toe_version System/Copy: 1.09 Network Support: 7.23 Scanner: 01.23 Printer: 1.09 Fax: 03.00.00 Web Support: 1.57 Web Uapl: 1.13.1 Network Doc Box: 1.09.3C Ic Key: 1100 Ic Hdd: 01 E-1.00
heuristics/scheme_data/expiration_date 2014-11 None
heuristics/scheme_data/supplier RICOH COMPANY, LTD. RICOH COMPANY, LTD.
heuristics/scheme_data/toe_japan_name Ricoh imagio MP 4000/5000 series System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01 -----
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0239_it8206.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0688_it9724.html
heuristics/scheme_data/toe_overseas_name Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01 RICOH IM C300/C400/C400SR, SAVIN IM C300/C400/C400SR, LANIER IM C300/C400/C400SR, nashuatec IM C300/C400/C400SR, Rex Rotary IM C300/C400/C400SR, Gestetner IM C300/C400/C400SRE-1.00
pdf_data/cert_filename None c0688_eimg.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0688-01-2020: 1
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ECSEC:
      • ECSEC Laboratory: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 131949
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20201207122825+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20201207123046+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_hyperlinks:
pdf_data/report_filename c0239_erpt.pdf c0688_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0239-01: 1
  • Certification No. C0239: 1
  • JISEC-CC-CRP-C0688-01-2020: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 2
  • A.SUPERVISOR: 1
  • A.NETWORK: 1
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
pdf_data/report_keywords/cc_claims/T
  • T.ILLEGAL_USE: 3
  • T.UNAUTH_ACCESS: 3
  • T.ABUSE_SEC_MNG: 3
  • T.SALVAGE: 3
  • T.TRANSIT: 3
  • T.FAX_LINE: 4
  • T.DOC: 2
  • T.FUNC: 1
  • T.PROT: 1
  • T.CONF: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 3
  • EAL2: 4
  • EAL2 augmented: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 7
  • TLS:
    • TLS:
      • TLS: 2
  • IPsec:
    • IPsec: 4
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 7
  • TLS:
    • TLS: 2
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2005-08-001: 2
  • CCMB-2005-08-002: 2
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 282719
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /ModDate: D:20100112162204+09'00'
  • /CreationDate: D:20100112162204+09'00'
  • /Title: Microsoft Word - C0239_Certification Report.doc
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Author: s-hara
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 496401
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
  • /CreationDate: D:20210120165018+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20210120165055+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20100112162204+09'00' D:20210120165018+09'00'
pdf_data/report_metadata//Creator PScript5.dll Version 5.2 Microsoft® Word 2019
pdf_data/report_metadata//ModDate D:20100112162204+09'00' D:20210120165055+09'00'
pdf_data/report_metadata//Producer Acrobat Distiller 6.0 (Windows) Microsoft® Word 2019
pdf_data/report_metadata/pdf_file_size_bytes 282719 496401
pdf_data/report_metadata/pdf_is_encrypted False True
pdf_data/report_metadata/pdf_number_of_pages 33 38
pdf_data/st_filename c0239_est.pdf c0688_est.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.AUDIT: 15
    • O.DOC_ACC: 8
    • O.MANAGE: 12
    • O.MEM: 11
    • O.NET: 10
    • O.GENUINE: 9
    • O.LINE_PROTECT: 10
  • T:
    • T.ILLEGAL_USE: 4
    • T.UNAUTH_ACCESS: 3
    • T.ABUSE_SEC_MNG: 4
    • T.SALVAGE: 3
    • T.TRANSIT: 4
    • T.FAX_LINE: 3
  • A:
    • A.ADMIN: 5
    • A.SUPERVISOR: 4
    • A.NETWORK: 5
  • OE:
    • OE.ADMIN: 3
    • OE.SUPERVISOR: 3
    • OE.NETWORK: 3
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.STORAGE: 14
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 5
  • A.SUPERVISOR: 4
  • A.NETWORK: 5
  • A.ACCESS: 5
  • A.USER: 4
  • A.ADMIN: 10
pdf_data/st_keywords/cc_claims/A/A.ADMIN 5 10
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT: 15
  • O.DOC_ACC: 8
  • O.MANAGE: 12
  • O.MEM: 11
  • O.NET: 10
  • O.GENUINE: 9
  • O.LINE_PROTECT: 10
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_claims/O/O.AUDIT 15 9
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 3
  • OE.SUPERVISOR: 3
  • OE.NETWORK: 3
  • OE.AUDIT_STORAGE: 3
  • OE.AUDIT_ACCESS: 2
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 4
  • OE.USER: 21
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 3 8
pdf_data/st_keywords/cc_claims/T
  • T.ILLEGAL_USE: 4
  • T.UNAUTH_ACCESS: 3
  • T.ABUSE_SEC_MNG: 4
  • T.SALVAGE: 3
  • T.TRANSIT: 4
  • T.FAX_LINE: 3
  • T.DOC: 14
  • T.FUNC: 7
  • T.PROT: 5
  • T.CONF: 10
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 3
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 1
    • AVA_VLA.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.2: 3
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.1: 2
  • ADV_HLD.2: 3
  • ADV_RCR.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_ADM.1: 2
  • AGD_USR.1: 2
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.1: 3
  • ALC_FLR.2: 3
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 2
  • ATE_DPT.1: 1
  • ATE_FUN.1: 2
  • ATE_IND.2: 2
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 2 1
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 2 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_MSU.1: 2
  • AVA_SOF.1: 1
  • AVA_VLA.1: 2
  • AVA_VAN.2: 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 9
  • EAL2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 36
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 15
    • FAU_SAR.2: 12
    • FAU_STG.1: 14
    • FAU_STG.4: 14
    • FAU_GEN.1.2: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_COP.1: 18
    • FCS_CKM.2: 2
    • FCS_CKM.4: 5
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 20
    • FDP_ACF.1: 17
    • FDP_IFC.1: 18
    • FDP_IFF.1: 14
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_AFL.1: 16
    • FIA_ATD.1: 15
    • FIA_SOS.1: 16
    • FIA_UAU.2: 18
    • FIA_UAU.7: 14
    • FIA_UID.2: 16
    • FIA_USB.1: 12
    • FIA_UAU.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UID.1: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 2
  • FMT:
    • FMT_MSA.1: 14
    • FMT_MSA.3: 19
    • FMT_MTD.1: 14
    • FMT_SMF.1: 17
    • FMT_SMR.1: 20
    • FMT_MSA.2: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 15
    • FPT_RVM.1: 43
    • FPT_SEP.1: 48
    • FPT_TST.1: 13
    • FPT_RVM.1.1: 1
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1.1: 1
    • FPT_AMT.1: 4
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_TRP.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
    • FTP_TST.1: 1
  • FAU:
    • FAU_STG.1: 9
    • FAU_STG.4: 8
    • FAU_SAR.1: 10
    • FAU_SAR.2: 8
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_ACC.1: 31
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 9
    • FIA_UAU.7: 8
    • FIA_SOS.1: 8
    • FIA_UID.1: 18
    • FIA_UAU.1: 14
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMF.1: 23
    • FMT_SMR.1: 29
    • FMT_MSA.3: 22
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1.3: 4
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 36
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 15
  • FAU_SAR.2: 12
  • FAU_STG.1: 14
  • FAU_STG.4: 14
  • FAU_GEN.1.2: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG.1: 9
  • FAU_STG.4: 8
  • FAU_SAR.1: 10
  • FAU_SAR.2: 8
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 36 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 15 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 12 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 14 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 14 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 18 11
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 5 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 18 10
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 20
  • FDP_ACF.1: 17
  • FDP_IFC.1: 18
  • FDP_IFF.1: 14
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF.1.6: 1
  • FDP_ACF.1: 31
  • FDP_ACF.1.1: 3
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 3
  • FDP_ACC.1: 31
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 2
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 20 31
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 17 31
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 1 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 1 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 1 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 1 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 18 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 16
  • FIA_ATD.1: 15
  • FIA_SOS.1: 16
  • FIA_UAU.2: 18
  • FIA_UAU.7: 14
  • FIA_UID.2: 16
  • FIA_USB.1: 12
  • FIA_UAU.1: 5
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UID.1: 9
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 2
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 16 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 15 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 16 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 5 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 14 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 9 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 12 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.3 2 1
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 14
  • FMT_MSA.3: 19
  • FMT_MTD.1: 14
  • FMT_SMF.1: 17
  • FMT_SMR.1: 20
  • FMT_MSA.2: 7
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 23
  • FMT_SMR.1: 29
  • FMT_MSA.3: 22
  • FMT_MSA.1: 20
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 14 20
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 19 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 14 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 17 23
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 20 29
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 15
  • FPT_RVM.1: 43
  • FPT_SEP.1: 48
  • FPT_TST.1: 13
  • FPT_RVM.1.1: 1
  • FPT_SEP.1.1: 1
  • FPT_SEP.1.2: 1
  • FPT_STM.1.1: 1
  • FPT_AMT.1: 4
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_FDI_EXP: 5
  • FPT_FDI_EXP.1: 11
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1: 6
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 15 9
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 13 6
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 13
  • FTP_TRP.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 2
  • FTP_TRP.1.3: 2
  • FTP_TST.1: 1
  • FTP_ITC.1.3: 4
  • FTP_ITC.1: 17
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 13 17
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 1 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 10
  • TLS:
    • TLS:
      • TLS1.2: 1
  • IPsec:
    • IPsec: 10
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 10
  • TLS:
    • TLS1.2: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 3
    • FIPS 197: 1
  • BSI:
    • BSI-AIS31: 3
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS197: 3
  • FIPS 197: 1
  • FIPS197: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS197 3 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 4 6
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata//Author itoh masahiro RICOH
pdf_data/st_metadata//CreationDate D:20100112151008+09'00' D:20210119105540+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2 Microsoft® Word for Microsoft 365
pdf_data/st_metadata//ModDate D:20100112151008+09'00' D:20210119105540+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 7.0.5 (Windows) Microsoft® Word for Microsoft 365
pdf_data/st_metadata//Title Microsoft Word - 100111_MP_4000_ST_1.13_eng.doc RICOH IM C300/C400/C400SR, SAVIN IM C300/C400/C400SR, LANIER IM C300/C400/C400SR, nashuatec IM C300/C400/C400SR, Rex Rotary IM C300/C400/C400SR, Gestetner IM C300/C400/C400SR Security Target
pdf_data/st_metadata/pdf_file_size_bytes 641281 1177346
pdf_data/st_metadata/pdf_number_of_pages 100 91
dgst 011a212ee8367e21 734bc0fe08e10f3e