Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco Info Center v7.1 with Cisco WebTop v2.0
CCEVS-VR-VID-10066-2008
DataOverwriteSecurity Unit Type I Software Version: 1.01m
JISEC-CC-CRP-C0146
name Cisco Info Center v7.1 with Cisco WebTop v2.0 DataOverwriteSecurity Unit Type I Software Version: 1.01m
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme US JP
not_valid_after 20.07.2012 07.10.2013
not_valid_before 31.07.2008 28.02.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10066-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0146_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10066-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0146_est.pdf
manufacturer Cisco Systems, Inc. Ricoh Company, Ltd.
manufacturer_web https://www.cisco.com https://www.ricoh.com/
security_level EAL2 EAL3
dgst 020a3ef1d95cabd6 e94414ed23397f0a
heuristics/cert_id CCEVS-VR-VID-10066-2008 JISEC-CC-CRP-C0146
heuristics/cert_lab US []
heuristics/extracted_sars ADV_HLD.1, AVA_VLA.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ADV_RCR.1, AGD_ADM.1, AVA_SOF.1, AGD_USR.1, ADV_FSP.1 AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1
heuristics/extracted_versions 7.1, 2.0 1.01
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10066/
  • categories: ['Network Management']
  • category: Network Management
  • certification_date: 31.07.2008
  • evaluation_facility: Arca CCTL
  • expiration_date:
  • id: CCEVS-VR-VID10066
  • product: Cisco Info Center v7.1 with Cisco WebTop v2.0
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10066
  • vendor: Cisco Systems, Inc.
  • cert_id: JISEC-CC-CRP-C0146
  • certification_date: 01.02.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0146_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; Ricoh imagio MP 2550 series Ricoh imagio MP 3350 series Ricoh imagio MP 4000 series Ricoh imagio MP 5000 series Ricoh Aficio MP 2550 series Ricoh Aficio MP 3350 series Savin 9025/9033 series Lanier LD425/433 series Lanier MP 2550/3350 series Gestetner MP 2550/3350 series Nashuatec MP 2550/3350 series Rex-Rotary MP 2550/3350 series Infotec MP 2550/3350 series Ricoh Aficio MP 4000 series Ricoh Aficio MP 5000 series Savin 9040/9050 series Lanier LD040/050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series TOE security functions Same as above.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: imagio Security Card Type 9 Software (Japanese name) DataOverwriteSecurity Unit Type I Software (English name)
    • product_type: IT Product (software to overwrite data)
    • report_link: https://www.ipa.go.jp/en/security/c0146_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0146_est.pdf
    • toe_version: 1.01m
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.10.2013
  • revalidations: [frozendict({'date': '2009-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0146_it7170_01.html'})]
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: imagio Security Card Type 9 Software 1.01m
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0146_it7170.html
  • toe_overseas_name: DataOverwriteSecurity Unit Type I Software 1.01m
pdf_data/report_filename st_vid10066-vr.pdf c0146_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10066-2008
    • cert_item: Cisco Info Center v7.1 with Cisco WebTop v2.0
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10066-2008: 1
  • JP:
    • CRP-C0146-01: 1
    • Certification No. C0146: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 4: 1
    • EAL2: 4
    • EAL3: 1
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.1: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 1
    • AVA_VLA.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.INSTALL: 1
    • A.LOWEXP: 1
    • A.OSLOGIN: 1
    • A.PHYSEC: 1
    • A.PROBE: 1
    • A.SEL_PRO: 1
    • A.SOLARIS: 1
    • A.TRUSTED: 1
  • A:
    • A.MODE: 2
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 62
    • Cisco Systems: 2
    • Cisco Systems, Inc: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20081023163449-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20081024080127-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 375382
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /CreationDate: D:20080911170307+09'00'
  • /ModDate: D:20080911170307+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 98568
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename st_vid10066-st.pdf c0146_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 5
  • EAL:
    • EAL3: 9
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 1
    • AVA_VLA.1: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN_EXP: 1
    • FAU_GEN_EXP.1: 9
    • FAU_GEN_EXP.1.1: 1
    • FAU_GEN_EXP.1.2: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 19
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.4: 3
    • FCS_COP: 2
    • FCS_COP.1: 16
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 12
    • FDP_IFF.1: 13
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_AFL.1: 14
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 13
    • FIA_SOS.1.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 12
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MSA.1: 22
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 1
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 7
    • FMT_SMR.1: 9
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_RVM.1: 2
    • FPT_RVM_EXP: 1
    • FPT_RVM_EXP.1: 8
    • FPT_RVM_EXP.1.1: 1
    • FPT_SEP.1: 2
    • FPT_SEP_EXP: 1
    • FPT_SEP_EXP.1: 5
    • FPT_SEP_EXP.1.1: 1
    • FPT_SEP_EXP.1.2: 1
    • FPT_STM.1: 7
    • FPT_TRC.1: 7
    • FPT_TRC.1.2: 1
  • FDP:
    • FDP_RIP.1: 5
    • FDP_SIP.1: 13
    • FDP_SIP.1.1: 1
  • FPT:
    • FPT_RVM.1: 8
    • FPT_RVM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.INSTALL: 4
    • A.LOWEXP: 2
    • A.OSLOGIN: 2
    • A.PHYSEC: 2
    • A.PROBE: 2
    • A.SEL_PRO: 4
    • A.SOLARIS: 2
    • A.TRUSTED: 3
  • O:
    • O.AUDITING: 4
    • O.AUDITPROTECT: 4
    • O.AUTHORIZATION: 4
    • O.DISCRETIONARY_ACCESS: 4
    • O.MANAGE: 4
    • O.REPLICATION: 4
    • O.SECURECOMMS: 4
    • O.SEL_PRO: 6
  • OE:
    • OE.CREDEN: 3
    • OE.INSTALL: 5
    • OE.LOWEXP: 3
    • OE.OSLOGIN: 6
    • OE.PAM: 5
    • OE.PHYSICAL: 3
    • OE.PROBE: 3
    • OE.SEL_PRO: 7
  • T:
    • T.AUD: 3
    • T.COMPDATA: 3
    • T.DATABASEFAIL: 4
    • T.DATABSEFAIL: 1
    • T.INSECURE: 4
    • T.LOWEXP: 5
    • T.NETSEC: 9
    • T.SEL_PRO: 2
    • T.UNAUTH: 5
  • A:
    • A: 1
    • A.MODE: 6
  • O:
    • O.OVERWRITE: 6
  • OE:
    • OE.MODE: 6
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 73
    • Cisco Systems: 3
    • Cisco Systems, Inc: 4
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3-DES: 2
    • DES:
      • DES: 7
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 46-2: 2
  • PKCS:
    • PKCS #1: 2
    • PKCS #3: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • these dependencies are addressed by the correct implementation of the standard protocols, which is out of scope of the evaluation of this TOE. Ultimately the validity of the key management for these protocols is: 1
    • to a platform needing to communicate. The destruction of the TOE public/private key pair is also out of scope of the evaluation as once the keys are created they are data files controlled by operating systems: 1
  • OutOfScope:
    • attack capability is needed for attacks such as bypassing or tampering TSF, but those are out of scope of this evaluation. That is to say, an analysis of apparent vulnerability (AVA_VLA.1) is sufficient: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20080916084256-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20081024080135-04'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 460851
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
  • /CreationDate: D:20080820190525+09'00'
  • /ModDate: D:20080820190525+09'00'
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • pdf_file_size_bytes: 406687
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 30
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different