Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Japan: Ricoh imagio MP 4000/5000 series, Overseas: Ricoh Aficio MP 4000/5000 series, Savin 9040/9050 series, Lanier MP 4000/5000 series, Gestetner MP 4000/5000 series, Nashuatec MP 4000/5000 series, Rex-Rotary MP 4000/5000 series, Infotec MP 4000/5000 series Version: System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01
JISEC-CC-CRP-C0239
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m
JISEC-CC-CRP-C0246
name Japan: Ricoh imagio MP 4000/5000 series, Overseas: Ricoh Aficio MP 4000/5000 series, Savin 9040/9050 series, Lanier MP 4000/5000 series, Gestetner MP 4000/5000 series, Nashuatec MP 4000/5000 series, Rex-Rotary MP 4000/5000 series, Infotec MP 4000/5000 series Version: System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01 Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m
not_valid_before 2009-11-13 2010-02-25
not_valid_after 2014-11-14 2015-03-01
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0239_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_est.pdf
security_level EAL3 ALC_FLR.2, EAL3+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0239_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None})
state/report/pdf_hash 7f2e5573ec37e5276c5e63d3242e9424c67a3f78fe6b2bdd2e9f218478d74e1a 7fa424b1dd452cb2c7793a3a8bece7e5e5410ba457ff44bb46ecb91b0d9d645f
state/report/txt_hash 8aa0c26e8eba84da96a673e01c1ba3b7b0b87682a5c0f2e8250fc80c722eb076 5710d2d89500845be1fd471294a614fc1a27e0cf8b667c6d9e0c0dd45701409c
state/st/pdf_hash 910da3f406e6c5a37a66aae707a1cb9f4fd9b268c9405165d487b2ee08d28ed6 4b88251809d96351ffcb5e2065b5c303a9dc0305316eec39aeae2ab7bd136885
state/st/txt_hash 9eb18d0b7bea25d461a6295e9caef9be5110ddb5ada33057eff416697bb774a0 e3085316072214aba0f74dd921d8747846705a1f62f96a828b9949928b327ab0
heuristics/cert_id JISEC-CC-CRP-C0239 JISEC-CC-CRP-C0246
heuristics/extracted_versions 1.57, 1.09.3, 7.23, 1.09, 1.13.1, 03.00.00, 01.23 1.01, 1.11, 01.24, 7.26, 1.3, 15.000, 1.04, 7.33, 1.59, 1.11.1, 1.15, 1.10, 2.16, 7.15.02
heuristics/scheme_data
  • cert_id: C0239
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01
  • expiration_date: 2014-11
  • claim: EAL3
  • certification_date: 2009-11
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0239_it8206.html
  • toe_japan_name: Ricoh imagio MP 4000/5000 series System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01
  • enhanced:
    • product: Japan: Ricoh imagio MP 4000/5000 series Overseas: Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series
    • toe_version: System/Copy: 1.09 Network Support: 7.23 Scanner: 01.23 Printer: 1.09 Fax: 03.00.00 Web Support: 1.57 Web Uapl: 1.13.1 Network Doc Box: 1.09.3C Ic Key: 1100 Ic Hdd: 01
    • product_type: IT Product (Multi Function Product)
    • certification_date: 2009-11-13
    • cc_version: 2.3
    • assurance_level: EAL3
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/c0239_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0239_img.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0239_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP, made by RICOH COMPANY, LTD., that provides the functions of copier, scanner, printer and fax (optional). Those are for digitizing the paper document files, managing the document files and printing the document files. The TOE is an image I/O device that incorporates the functionality of copier, scanner, fax and printer. In general, the TOE is connected to an office LAN and is used to input, store and output the document data. TOE security functions The major security functions of the TOE are as follows: - Identification and Authentication Function and Document Data Access Control Function to protect the stored document data from the unauthorized access - Encryption Function to protect the stored document data from the leakage - Network Communication Data Protection Function to protect the communication data from the leakage or tampering - Telephone Line Intrusion Protection Function to prevent the unauthorized intrusion from a telephone line - MFP Control Software Verification Function to check the integrity of the control software
  • cert_id: C0246
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: -----
  • expiration_date: 2015-03
  • claim: EAL3+ ALC_FLR.2 PP
  • certification_date: 2010-02
  • toe_overseas_link: None
  • toe_japan_name: Ricoh imagio MP 5000SP/4000SP with security card Type 9 - Firmware Configuration System VersionV2.16-00 System/Copy1.11.1, Network Support7.26, Network DocBox1.10C, Web Support1.59, Web Uapl1.15, animation1.3, Scanner01.24, RPDL7.33, Printer;1.11, MSIS7.15.02, RPCS Font1.01, Engine1.04:05, OpePanel1.01, LANG01.01, LANG11.01, ADF15.000:15 - ASIC  Ic Key1100 - Option  Data Erase Opt1.01m
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0246_it9257.html
  • enhanced:
    • product: Ricoh imagio MP 5000SP/4000SP with security card Type 9
    • toe_version: - Firmware Configuration System VersionV2.16-00 System/Copy1.11.1 Network Support7.26 Network DocBox1.10C Web Support1.59 Web Uapl1.15 animation1.3 Scanner01.24 RPDL7.33 Printer1.11 MSIS7.15.02 RPCS Font1.01 Engine1.04:05 OpePanel1.01 LANG01.01 LANG11.01 ADF15.000:15 - ASIC Ic Key1100 - Option Data Erase Opt1.01m
    • product_type: Multi Function Product
    • certification_date: 2010-02-25
    • cc_version: 3.1
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • protection_profile: 2600.1, Protection Profile for Hardcopy Devices, Operational Environment A 1.0, dated June 2009
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0246_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0246_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0246_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions. TOE security functionality The main security functions are described as follows: - Audit Function: to generate / review audit log of the event. - Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout. - Access Control Function: to control available functions for each user, and to control the document operation. - Network Protection Function: to protect information on the Network with use of the encrypted communication. - Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data. - Security Management Function: to make the administrators control the security functions. - Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes.
heuristics/scheme_data/cert_id C0239 C0246
heuristics/scheme_data/certification_date 2009-11 2010-02
heuristics/scheme_data/claim EAL3 EAL3+ ALC_FLR.2 PP
heuristics/scheme_data/enhanced
  • product: Japan: Ricoh imagio MP 4000/5000 series Overseas: Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series
  • toe_version: System/Copy: 1.09 Network Support: 7.23 Scanner: 01.23 Printer: 1.09 Fax: 03.00.00 Web Support: 1.57 Web Uapl: 1.13.1 Network Doc Box: 1.09.3C Ic Key: 1100 Ic Hdd: 01
  • product_type: IT Product (Multi Function Product)
  • certification_date: 2009-11-13
  • cc_version: 2.3
  • assurance_level: EAL3
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0239_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0239_img.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0239_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP, made by RICOH COMPANY, LTD., that provides the functions of copier, scanner, printer and fax (optional). Those are for digitizing the paper document files, managing the document files and printing the document files. The TOE is an image I/O device that incorporates the functionality of copier, scanner, fax and printer. In general, the TOE is connected to an office LAN and is used to input, store and output the document data. TOE security functions The major security functions of the TOE are as follows: - Identification and Authentication Function and Document Data Access Control Function to protect the stored document data from the unauthorized access - Encryption Function to protect the stored document data from the leakage - Network Communication Data Protection Function to protect the communication data from the leakage or tampering - Telephone Line Intrusion Protection Function to prevent the unauthorized intrusion from a telephone line - MFP Control Software Verification Function to check the integrity of the control software
  • product: Ricoh imagio MP 5000SP/4000SP with security card Type 9
  • toe_version: - Firmware Configuration System VersionV2.16-00 System/Copy1.11.1 Network Support7.26 Network DocBox1.10C Web Support1.59 Web Uapl1.15 animation1.3 Scanner01.24 RPDL7.33 Printer1.11 MSIS7.15.02 RPCS Font1.01 Engine1.04:05 OpePanel1.01 LANG01.01 LANG11.01 ADF15.000:15 - ASIC Ic Key1100 - Option Data Erase Opt1.01m
  • product_type: Multi Function Product
  • certification_date: 2010-02-25
  • cc_version: 3.1
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: 2600.1, Protection Profile for Hardcopy Devices, Operational Environment A 1.0, dated June 2009
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0246_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0246_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0246_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions. TOE security functionality The main security functions are described as follows: - Audit Function: to generate / review audit log of the event. - Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout. - Access Control Function: to control available functions for each user, and to control the document operation. - Network Protection Function: to protect information on the Network with use of the encrypted communication. - Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data. - Security Management Function: to make the administrators control the security functions. - Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes.
heuristics/scheme_data/enhanced/assurance_level EAL3 EAL3 Augmented with ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 2.3 3.1
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0239_img.pdf https://www.ipa.go.jp/en/security/c0246_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2009-11-13 2010-02-25
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP, made by RICOH COMPANY, LTD., that provides the functions of copier, scanner, printer and fax (optional). Those are for digitizing the paper document files, managing the document files and printing the document files. The TOE is an image I/O device that incorporates the functionality of copier, scanner, fax and printer. In general, the TOE is connected to an office LAN and is used to input, store and output the document data. TOE security functions The major security functions of the TOE are as follows: - Identification and Authentication Function and Document Data Access Control Function to protect the stored document data from the unauthorized access - Encryption Function to protect the stored document data from the leakage - Network Communication Data Protection Function to protect the communication data from the leakage or tampering - Telephone Line Intrusion Protection Function to prevent the unauthorized intrusion from a telephone line - MFP Control Software Verification Function to check the integrity of the control software PRODUCT DESCRIPTION Description of TOE The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions. TOE security functionality The main security functions are described as follows: - Audit Function: to generate / review audit log of the event. - Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout. - Access Control Function: to control available functions for each user, and to control the document operation. - Network Protection Function: to protect information on the Network with use of the encrypted communication. - Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data. - Security Management Function: to make the administrators control the security functions. - Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes.
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Evaluation Department Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
heuristics/scheme_data/enhanced/product Japan: Ricoh imagio MP 4000/5000 series Overseas: Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series Ricoh imagio MP 5000SP/4000SP with security card Type 9
heuristics/scheme_data/enhanced/product_type IT Product (Multi Function Product) Multi Function Product
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0239_erpt.pdf https://www.ipa.go.jp/en/security/c0246_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0239_est.pdf https://www.ipa.go.jp/en/security/c0246_est.pdf
heuristics/scheme_data/enhanced/toe_version System/Copy: 1.09 Network Support: 7.23 Scanner: 01.23 Printer: 1.09 Fax: 03.00.00 Web Support: 1.57 Web Uapl: 1.13.1 Network Doc Box: 1.09.3C Ic Key: 1100 Ic Hdd: 01 - Firmware Configuration System VersionV2.16-00 System/Copy1.11.1 Network Support7.26 Network DocBox1.10C Web Support1.59 Web Uapl1.15 animation1.3 Scanner01.24 RPDL7.33 Printer1.11 MSIS7.15.02 RPCS Font1.01 Engine1.04:05 OpePanel1.01 LANG01.01 LANG11.01 ADF15.000:15 - ASIC Ic Key1100 - Option Data Erase Opt1.01m
heuristics/scheme_data/expiration_date 2014-11 2015-03
heuristics/scheme_data/supplier RICOH COMPANY, LTD. RICOH COMPANY, LTD.
heuristics/scheme_data/toe_japan_name Ricoh imagio MP 4000/5000 series System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01 Ricoh imagio MP 5000SP/4000SP with security card Type 9 - Firmware Configuration System VersionV2.16-00 System/Copy1.11.1, Network Support7.26, Network DocBox1.10C, Web Support1.59, Web Uapl1.15, animation1.3, Scanner01.24, RPDL7.33, Printer;1.11, MSIS7.15.02, RPCS Font1.01, Engine1.04:05, OpePanel1.01, LANG01.01, LANG11.01, ADF15.000:15 - ASIC  Ic Key1100 - Option  Data Erase Opt1.01m
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0239_it8206.html None
heuristics/scheme_data/toe_overseas_name Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01 -----
pdf_data/report_filename c0239_erpt.pdf c0246_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0239-01: 1
  • Certification No. C0239: 1
  • CRP-C0246-01: 1
  • Certification No. C0246: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 2
  • A.SUPERVISOR: 1
  • A.NETWORK: 1
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
pdf_data/report_keywords/cc_claims/T
  • T.ILLEGAL_USE: 3
  • T.UNAUTH_ACCESS: 3
  • T.ABUSE_SEC_MNG: 3
  • T.SALVAGE: 3
  • T.TRANSIT: 3
  • T.FAX_LINE: 4
  • T.DOC: 2
  • T.FUNC: 1
  • T.PROT: 1
  • T.CONF: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 3
  • EAL3: 3
  • EAL3 augmented: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 7
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/crypto_protocol/TLS/SSL/SSL 7 1
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2005-08-001: 2
  • CCMB-2005-08-002: 2
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-004: 2
  • CCMB-2006-09-001: 2
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2007-09-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 282719
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /ModDate: D:20100112162204+09'00'
  • /CreationDate: D:20100112162204+09'00'
  • /Title: Microsoft Word - C0239_Certification Report.doc
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Author: s-hara
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 230440
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
  • /ModDate: D:20100629170727+09'00'
  • /CreationDate: D:20100629170727+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20100112162204+09'00' D:20100629170727+09'00'
pdf_data/report_metadata//ModDate D:20100112162204+09'00' D:20100629170727+09'00'
pdf_data/report_metadata//Title Microsoft Word - C0239_Certification Report.doc untitled
pdf_data/report_metadata/pdf_file_size_bytes 282719 230440
pdf_data/report_metadata/pdf_number_of_pages 33 29
pdf_data/st_filename c0239_est.pdf c0246_est.pdf
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 5
  • A.SUPERVISOR: 4
  • A.NETWORK: 5
  • A.ACCESS: 5
  • A.USER: 4
  • A.ADMIN: 10
pdf_data/st_keywords/cc_claims/A/A.ADMIN 5 10
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT: 15
  • O.DOC_ACC: 8
  • O.MANAGE: 12
  • O.MEM: 11
  • O.NET: 10
  • O.GENUINE: 9
  • O.LINE_PROTECT: 10
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_claims/O/O.AUDIT 15 9
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 3
  • OE.SUPERVISOR: 3
  • OE.NETWORK: 3
  • OE.AUDIT_STORAGE: 4
  • OE.AUDIT_ACCESS: 3
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 1
  • OE.USER: 21
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • OE.PHYISCAL: 3
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 3 8
pdf_data/st_keywords/cc_claims/T
  • T.ILLEGAL_USE: 4
  • T.UNAUTH_ACCESS: 3
  • T.ABUSE_SEC_MNG: 4
  • T.SALVAGE: 3
  • T.TRANSIT: 4
  • T.FAX_LINE: 3
  • T.DOC: 10
  • T.FUNC: 5
  • T.PROT: 5
  • T.CONF: 10
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 3
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 1
    • AVA_VLA.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.2: 3
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.1: 2
  • ADV_HLD.2: 3
  • ADV_RCR.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_ADM.1: 2
  • AGD_USR.1: 2
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.1: 3
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 3 2
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 2 1
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 2 1
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 2 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_MSU.1: 2
  • AVA_SOF.1: 1
  • AVA_VLA.1: 2
  • AVA_VAN.2: 2
pdf_data/st_keywords/cc_security_level/EAL/EAL3 9 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 36
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 15
    • FAU_SAR.2: 12
    • FAU_STG.1: 14
    • FAU_STG.4: 14
    • FAU_GEN.1.2: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_COP.1: 18
    • FCS_CKM.2: 2
    • FCS_CKM.4: 5
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 20
    • FDP_ACF.1: 17
    • FDP_IFC.1: 18
    • FDP_IFF.1: 14
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_AFL.1: 16
    • FIA_ATD.1: 15
    • FIA_SOS.1: 16
    • FIA_UAU.2: 18
    • FIA_UAU.7: 14
    • FIA_UID.2: 16
    • FIA_USB.1: 12
    • FIA_UAU.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UID.1: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 2
  • FMT:
    • FMT_MSA.1: 14
    • FMT_MSA.3: 19
    • FMT_MTD.1: 14
    • FMT_SMF.1: 17
    • FMT_SMR.1: 20
    • FMT_MSA.2: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 15
    • FPT_RVM.1: 43
    • FPT_SEP.1: 48
    • FPT_TST.1: 13
    • FPT_RVM.1.1: 1
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1.1: 1
    • FPT_AMT.1: 4
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_TRP.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
    • FTP_TST.1: 1
  • FAU:
    • FAU_STG.1: 9
    • FAU_STG.4: 8
    • FAU_SAR.1: 10
    • FAU_SAR.2: 7
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FDP:
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ACF.1: 27
    • FDP_ACC.1: 29
    • FDP_ACC.1.1: 2
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 8
    • FIA_UAU.7: 7
    • FIA_SOS.1: 8
    • FIA_UAU.1: 14
    • FIA_UID.1: 17
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMF.1: 20
    • FMT_SMR.1: 26
    • FMT_MSA.3: 24
    • FMT_MSA.1: 23
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 4
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_TST.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TST.1: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 36
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 15
  • FAU_SAR.2: 12
  • FAU_STG.1: 14
  • FAU_STG.4: 14
  • FAU_GEN.1.2: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG.1: 9
  • FAU_STG.4: 8
  • FAU_SAR.1: 10
  • FAU_SAR.2: 7
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 36 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 15 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 12 7
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 14 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 14 8
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 20
  • FDP_ACF.1: 17
  • FDP_IFC.1: 18
  • FDP_IFF.1: 14
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF.1.6: 1
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACF.1: 27
  • FDP_ACC.1: 29
  • FDP_ACC.1.1: 2
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 2
  • FDP_ACF.1.4: 2
  • FDP_RIP.1: 6
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 20 29
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 17 27
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 18 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 16
  • FIA_ATD.1: 15
  • FIA_SOS.1: 16
  • FIA_UAU.2: 18
  • FIA_UAU.7: 14
  • FIA_UID.2: 16
  • FIA_USB.1: 12
  • FIA_UAU.1: 5
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UID.1: 9
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 2
  • FIA_AFL.1: 8
  • FIA_UAU.7: 7
  • FIA_SOS.1: 8
  • FIA_UAU.1: 14
  • FIA_UID.1: 17
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 9
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 16 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 15 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 16 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 5 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 14 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 9 17
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 12 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.3 2 1
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 14
  • FMT_MSA.3: 19
  • FMT_MTD.1: 14
  • FMT_SMF.1: 17
  • FMT_SMR.1: 20
  • FMT_MSA.2: 7
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 20
  • FMT_SMR.1: 26
  • FMT_MSA.3: 24
  • FMT_MSA.1: 23
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 11
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 14 23
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 19 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 14 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 17 20
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 20 26
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 15
  • FPT_RVM.1: 43
  • FPT_SEP.1: 48
  • FPT_TST.1: 13
  • FPT_RVM.1.1: 1
  • FPT_SEP.1.1: 1
  • FPT_SEP.1.2: 1
  • FPT_STM.1.1: 1
  • FPT_AMT.1: 4
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_FDI_EXP: 4
  • FPT_FDI_EXP.1: 11
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 9
  • FPT_TST.1: 6
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 15 9
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 13 6
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 13
  • FTP_TRP.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 2
  • FTP_TRP.1.3: 2
  • FTP_TST.1: 1
  • FTP_ITC.1: 18
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TST.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 13 18
pdf_data/st_keywords/crypto_protocol/TLS/SSL/SSL 10 3
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 3
    • FIPS 197: 1
  • BSI:
    • BSI-AIS31: 3
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
pdf_data/st_metadata//Author itoh masahiro
pdf_data/st_metadata//CreationDate D:20100112151008+09'00' D:20100618152326+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2 PScript5.dll Version 5.2.2
pdf_data/st_metadata//ModDate D:20100112151008+09'00' D:20100618152326+09'00'
pdf_data/st_metadata//Title Microsoft Word - 100111_MP_4000_ST_1.13_eng.doc Microsoft Word - C0246ST_eng_2010-6-18.doc
pdf_data/st_metadata/pdf_file_size_bytes 641281 464939
pdf_data/st_metadata/pdf_number_of_pages 100 65
dgst 011a212ee8367e21 93cdda41b5a03cdf