Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
imagio Security Card Type 7 (Japanese name), DataOverwriteSecurity Unit Type H (English name) Version: 1.02x
JISEC-CC-CRP-C0416
Microsoft Windows 2003 and Microsoft Windows XP
CCEVS-VR-0131-2005
name imagio Security Card Type 7 (Japanese name), DataOverwriteSecurity Unit Type H (English name) Version: 1.02x Microsoft Windows 2003 and Microsoft Windows XP
category Other Devices and Systems Operating Systems
scheme JP US
not_valid_after 01.09.2019 07.09.2012
not_valid_before 29.11.2013 06.11.2005
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0416_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4025-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0416_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4025-st.pdf
manufacturer Ricoh Company, Ltd. Microsoft Corporation
manufacturer_web https://www.ricoh.com/ https://www.microsoft.com
security_level EAL3 EAL4+, AVA_VLA.4, ALC_FLR.3
dgst 02861daa4430e538 b3eff67d30a6fa07
heuristics/cert_id JISEC-CC-CRP-C0416 CCEVS-VR-0131-2005
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:microsoft:windows_xp:-:-:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:gold:64-bit-2002:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:gold:64-bit-2003:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:starter:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:starter:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:starter:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:professional:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:*:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:*:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:media_center:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*, cpe:2.3:o:microsoft:windows_xp:-:gold:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:gold:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:starter:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:embedded:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:starter:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x86:*
heuristics/related_cves {} CVE-2010-2739, CVE-2011-1868, CVE-2013-1294, CVE-2009-2511, CVE-2010-1887, CVE-2007-3724, CVE-2002-2117, CVE-2006-2373, CVE-2012-1865, CVE-2011-0660, CVE-2007-3463, CVE-2002-0724, CVE-2001-0860, CVE-2010-2568, CVE-2010-2738, CVE-2014-0300, CVE-2010-3974, CVE-2012-2553, CVE-2009-2493, CVE-2013-1248, CVE-2007-6753, CVE-2011-1894, CVE-2013-1253, CVE-2007-1765, CVE-2012-0180, CVE-2013-1250, CVE-2009-1545, CVE-2002-0974, CVE-2010-3888, CVE-2013-0810, CVE-2011-1231, CVE-2010-2731, CVE-2012-0151, CVE-2012-0175, CVE-2008-4114, CVE-2004-0206, CVE-2014-4971, CVE-2013-1313, CVE-2011-1875, CVE-2010-3956, CVE-2011-1282, CVE-2009-0085, CVE-2013-3129, CVE-2008-1440, CVE-2004-0200, CVE-2009-1123, CVE-2010-0028, CVE-2009-0079, CVE-2012-2529, CVE-2010-1098, CVE-2011-1230, CVE-2011-1985, CVE-2012-0181, CVE-2008-4327, CVE-2010-0238, CVE-2007-1212, CVE-2008-0322, CVE-2011-1870, CVE-2009-0087, CVE-2010-1891, CVE-2012-1893, CVE-2010-1896, CVE-2004-0897, CVE-2013-3940, CVE-2009-0081, CVE-2007-1206, CVE-2011-1238, CVE-2011-0671, CVE-2010-0480, CVE-2013-1273, CVE-2013-1274, CVE-2008-0015, CVE-2011-1268, CVE-2010-3970, CVE-2014-0323, CVE-2010-3139, CVE-2012-1851, CVE-2011-2011, CVE-2013-1264, CVE-2011-0665, CVE-2013-3173, CVE-2000-1218, CVE-2011-3389, CVE-2013-3879, CVE-2005-0058, CVE-2007-1204, CVE-2001-0876, CVE-2013-1287, CVE-2001-0877, CVE-2009-2653, CVE-2004-2339, CVE-2008-4834, CVE-2007-1531, CVE-2008-1456, CVE-2010-1886, CVE-2011-1225, CVE-2013-1280, CVE-2011-0090, CVE-2012-1870, CVE-2013-3195, CVE-2010-2729, CVE-2004-0124, CVE-2013-3198, CVE-2013-1342, CVE-2011-1880, CVE-2011-0039, CVE-2003-0813, CVE-2010-4562, CVE-2010-4398, CVE-2009-2513, CVE-2010-1882, CVE-2012-5362, CVE-2010-1734, CVE-2011-0042, CVE-2006-5758, CVE-2009-2528, CVE-2010-2265, CVE-2003-0897, CVE-2013-3175, CVE-2013-5065, CVE-2009-0089, CVE-2010-2743, CVE-2008-2245, CVE-2013-1344, CVE-2004-0575, CVE-2010-2566, CVE-2010-1735, CVE-2008-1086, CVE-2011-1968, CVE-2002-1327, CVE-2013-3136, CVE-2008-4250, CVE-2009-2504, CVE-2013-3167, CVE-2011-0658, CVE-2010-1883, CVE-2012-1850, CVE-2013-1275, CVE-2003-1048, CVE-2009-1125, CVE-2008-4835, CVE-2011-0677, CVE-2008-6194, CVE-2013-1266, CVE-2018-0599, CVE-2010-0027, CVE-2009-2510, CVE-2009-0568, CVE-2013-3876, CVE-2009-1544, CVE-2008-2250, CVE-2010-0484, CVE-2003-0306, CVE-2011-5046, CVE-2002-0283, CVE-2004-0117, CVE-2013-1278, CVE-2011-1991, CVE-2008-4036, CVE-2007-5133, CVE-2006-4071, CVE-2011-0041, CVE-2010-1897, CVE-2008-1441, CVE-2010-0819, CVE-2013-3660, CVE-2013-1255, CVE-2009-2524, CVE-2012-1890, CVE-2011-1237, CVE-2008-1457, CVE-2013-1263, CVE-2009-2503, CVE-2011-1249, CVE-2008-3013, CVE-2008-3012, CVE-2017-0176, CVE-2010-1690, CVE-2007-3034, CVE-2004-0207, CVE-2011-1232, CVE-2011-1878, CVE-2007-0843, CVE-2013-3172, CVE-2009-0320, CVE-2012-0217, CVE-2010-0233, CVE-2009-0243, CVE-2011-3406, CVE-2008-1083, CVE-2011-2003, CVE-2006-3351, CVE-2007-1205, CVE-2002-0055, CVE-2009-2502, CVE-2011-0673, CVE-2002-2132, CVE-2010-0021, CVE-2012-1868, CVE-2007-0214, CVE-2011-1869, CVE-2013-1267, CVE-2012-2972, CVE-2008-1454, CVE-2010-0818, CVE-2012-0004, CVE-2011-0096, CVE-2009-2519, CVE-2012-0154, CVE-2004-0840, CVE-2005-3177, CVE-2007-1946, CVE-2012-4786, CVE-2013-1254, CVE-2008-2249, CVE-2013-1291, CVE-2013-3863, CVE-2010-3943, CVE-2002-0391, CVE-2010-2553, CVE-2009-4313, CVE-2008-4609, CVE-2012-1867, CVE-2006-4696, CVE-2013-1276, CVE-2009-0083, CVE-2012-0013, CVE-2010-2740, CVE-2010-3144, CVE-2011-1228, CVE-2011-1883, CVE-2009-1511, CVE-2011-1226, CVE-2013-1268, CVE-2011-5049, CVE-2001-0879, CVE-2017-8461, CVE-2011-1227, CVE-2004-0116, CVE-2011-1974, CVE-2011-1247, CVE-2011-1243, CVE-2009-0082, CVE-2011-3402, CVE-2011-3400, CVE-2007-2218, CVE-2010-0232, CVE-2012-0148, CVE-2010-1255, CVE-2013-3200, CVE-2011-1876, CVE-2013-3196, CVE-2010-0016, CVE-2011-1881, CVE-2010-2741, CVE-2010-2157, CVE-2005-1207, CVE-2013-3918, CVE-2010-0252, CVE-2004-0123, CVE-2007-1492, CVE-2011-1241, CVE-2007-2237, CVE-2013-3181, CVE-2007-2224, CVE-2007-2374, CVE-2006-7210, CVE-2012-2971, CVE-2013-1249, CVE-2013-1334, CVE-2013-1252, CVE-2003-0469, CVE-2010-3942, CVE-2012-2526, CVE-2011-0662, CVE-2002-0053, CVE-2013-1285, CVE-2012-1864, CVE-2008-0087, CVE-2009-0230, CVE-2013-5056, CVE-2010-0486, CVE-2013-1272, CVE-2005-1212, CVE-2012-1852, CVE-2011-1239, CVE-2010-0024, CVE-2010-0023, CVE-2010-1885, CVE-2010-1895, CVE-2013-1341, CVE-2010-3143, CVE-2010-1888, CVE-2012-2530, CVE-2005-1214, CVE-2009-3677, CVE-2011-2600, CVE-2010-2744, CVE-2012-0157, CVE-2011-0638, CVE-2011-2014, CVE-2010-4669, CVE-2013-1269, CVE-2010-0250, CVE-2010-1689, CVE-2013-1251, CVE-2011-0661, CVE-2005-1987, CVE-2012-1866, CVE-2007-5348, CVE-2012-0002, CVE-2008-4038, CVE-2009-0229, CVE-2013-0077, CVE-2010-0231, CVE-2011-0666, CVE-2009-2501, CVE-2004-2527, CVE-2011-1229, CVE-2009-4210, CVE-2011-1281, CVE-2013-1257, CVE-2011-1242, CVE-2004-0199, CVE-2005-4269, CVE-1999-0524, CVE-2009-1808, CVE-2010-3222, CVE-2013-1286, CVE-2010-4701, CVE-2006-6723, CVE-2006-6797, CVE-2010-3939, CVE-2011-0675, CVE-2011-0676, CVE-2012-0173, CVE-2007-6026, CVE-2012-1527, CVE-2002-0699, CVE-2010-3889, CVE-2010-0269, CVE-2003-0909, CVE-2010-0018, CVE-2013-3865, CVE-2010-2550, CVE-2014-0266, CVE-2013-1270, CVE-2009-4311, CVE-2007-0066, CVE-2007-5352, CVE-2011-0670, CVE-2009-2514, CVE-2009-0235, CVE-2009-0550, CVE-2008-3648, CVE-2010-0020, CVE-2011-1884, CVE-2004-0230, CVE-2012-1853, CVE-2013-3174, CVE-2013-1340, CVE-2019-1489, CVE-2007-0038, CVE-2013-3866, CVE-2008-0020, CVE-2001-0909, CVE-2007-1215, CVE-2004-0209, CVE-2008-3465, CVE-2013-3878, CVE-2011-1885, CVE-2008-3014, CVE-2009-1926, CVE-2008-1453, CVE-2010-0820, CVE-2005-0904, CVE-2013-3128, CVE-2009-2500, CVE-2009-2494, CVE-2011-0045, CVE-2008-0083, CVE-2013-1262, CVE-2010-3941, CVE-2013-1283, CVE-2005-1208, CVE-2009-4312, CVE-2007-1211, CVE-2011-0088, CVE-2006-2374, CVE-2021-36958, CVE-2013-1256, CVE-2002-0862, CVE-2010-3963, CVE-2010-0485, CVE-2010-2567, CVE-2011-1886, CVE-2009-1124, CVE-2012-4774, CVE-2014-0301, CVE-2007-1912, CVE-2010-0234, CVE-2011-0086, CVE-2013-1343, CVE-2003-0907, CVE-2009-1930, CVE-2011-0674, CVE-2007-0069, CVE-2013-1295, CVE-2013-3887, CVE-2009-1928, CVE-2010-0487, CVE-2013-1271, CVE-2009-0231, CVE-2012-1528, CVE-2009-1546, CVE-2014-0317, CVE-2007-5145, CVE-2013-1345, CVE-2010-0236, CVE-2008-1436, CVE-2004-1049, CVE-2006-0005, CVE-2008-2251, CVE-2004-0119, CVE-2013-1258, CVE-2009-1127, CVE-2002-2324, CVE-2012-5364, CVE-2018-0598, CVE-2010-2563, CVE-2009-1920, CVE-2011-1240, CVE-2011-1882, CVE-2007-1537, CVE-2009-2515, CVE-2013-3197, CVE-2011-0033, CVE-2010-3940, CVE-2011-1234, CVE-2011-2018, CVE-2013-1265, CVE-2012-0005, CVE-2013-3869, CVE-2011-2005, CVE-2008-1445, CVE-2003-0807, CVE-2017-8487, CVE-2006-4692, CVE-2001-0721, CVE-2011-0087, CVE-2013-1279, CVE-2011-0030, CVE-2005-1935, CVE-2010-0811, CVE-2011-0043, CVE-2013-3864, CVE-2011-1233, CVE-2013-1259, CVE-2009-1126, CVE-2010-0812, CVE-2011-1284, CVE-2011-1283, CVE-2011-3401, CVE-2011-0034, CVE-2010-3959, CVE-2011-1967, CVE-2012-0159, CVE-2011-0089, CVE-2013-5058, CVE-2013-1261, CVE-2010-3140, CVE-2009-0232, CVE-2006-3209, CVE-2009-0078, CVE-2013-1260, CVE-2012-0003, CVE-2013-1277, CVE-2010-0235, CVE-2009-1929, CVE-2011-3408, CVE-2008-0088, CVE-2013-3894, CVE-2004-0208, CVE-2010-3957, CVE-2011-0667, CVE-2009-0119, CVE-2009-2507, CVE-2010-0237, CVE-2011-3397, CVE-2011-0672, CVE-2010-1894, CVE-2004-0120, CVE-2012-0009, CVE-2013-3899, CVE-2011-0657, CVE-2010-2746, CVE-2011-1879, CVE-2008-2252, CVE-2009-2516, CVE-2012-2527, CVE-2008-1087, CVE-2010-0025, CVE-2009-3675, CVE-2013-1300, CVE-2009-3126, CVE-2009-1133, CVE-2007-2219, CVE-2011-0028, CVE-2011-1873, CVE-2009-0086, CVE-2006-5586, CVE-2001-1200, CVE-2007-2228, CVE-2010-3227, CVE-2012-2556, CVE-2012-1848, CVE-2009-1922, CVE-2008-3464, CVE-2011-1236, CVE-2014-0315, CVE-2008-1084, CVE-2013-3661, CVE-2010-0022, CVE-2011-1874, CVE-2010-0719, CVE-2011-1235
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 AVA_MSU.2, ALC_FLR.3, ATE_FUN.1, ADV_RCR.1, ADV_LLD.1, ATE_IND.2, ATE_DPT.1, AGD_USR.1, ASE_REQ.1, ADV_IMP.1, ALC_LCD.1, AVA_VLA.4, ADV_HLD.2, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, AVA_SOF.1, ASE_OBJ.1, ADV_SPM.1
heuristics/extracted_versions 1.02 2003
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0416-2007, BSI-DSZ-CC-0366-2008
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0416-2007, BSI-DSZ-CC-0366-2008
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0416
  • certification_date: 01.11.2013
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0416_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; - RICOH MP C5503 - RICOH MP C4503 - RICOH MP C6003 - RICOH MP C5503A - RICOH MP C4503A - Ricoh MP C4503 - Ricoh MP C4503G - Ricoh MP C4503A - Ricoh MP C5503 - Ricoh MP C5503G - Ricoh MP C5503A - Ricoh MP C6003 - Ricoh MP C6003G - Savin MP C4503 - Savin MP C4503G - Savin MP C5503 - Savin MP C5503G - Savin MP C6003 - Savin MP C6003G - Lanier MP C4503 - Lanier MP C4503G - Lanier MP C5503 - Lanier MP C5503G - Lanier MP C6003 - Lanier MP C6003G - nashuatec MP C4503 - nashuatec MP C4503A - nashuatec MP C5503 - nashuatec MP C5503A - nashuatec MP C6003 - Rex-Rotary MP C4503 - Rex-Rotary MP C4503A - Rex-Rotary MP C5503 - Rex-Rotary MP C5503A - Rex-Rotary MP C6003 - Gestetner MP C4503 - Gestetner MP C4503A - Gestetner MP C5503 - Gestetner MP C5503A - Gestetner MP C6003 - infotec MP C4503 - infotec MP C4503A - infotec MP C5503 - infotec MP C5503A - infotec MP C6003 TOE security functionality Same as above.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: imagio Security Card Type 7 (Japanese name) DataOverwriteSecurity Unit Type H (English name)
    • product_type: Software to overwrite data
    • report_link: https://www.ipa.go.jp/en/security/c0416_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0416_est.pdf
    • toe_version: 1.02x
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.12.2018
  • revalidations: [frozendict({'date': '2015-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0416_it3458_04.html'})]
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: imagio Security Card Type 71.02x
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0416_it3458.html
  • toe_overseas_name: DataOverwriteSecurity Unit Type H 1.02x
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/4025/
  • categories: ['Operating System']
  • category: Operating System
  • certification_date: 07.10.2005
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date:
  • id: CCEVS-VR-VID4025
  • product: Microsoft Windows 2003 Server SP1, XP SP2, and XP Embedded SP2 (for specific editions, updates, patches and hotfixes see Section 1 in Security Target)
  • scheme: US
  • url: https://www.niap-ccevs.org/products/4025
  • vendor: Microsoft Corporation
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0416-2007, BSI-DSZ-CC-0453-2009, BSI-DSZ-CC-0387-2007
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0416-2007, BSI-DSZ-CC-0453-2009, BSI-DSZ-CC-0387-2007
maintenance_updates
pdf_data/report_filename c0416_erpt.pdf st_vid4025-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-05-0131
    • cert_item: Microsoft Windows 2003 Server and XP Workstation
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0416-01: 1
    • Certification No. C0416: 1
  • US:
    • CCEVS-VR-05-0131: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL 4 augmented: 2
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 1
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS.1: 1
  • ALC:
    • ALC_FLR.3: 3
  • ASE:
    • ASE_OBJ.1: 2
    • ASE_REQ: 2
    • ASE_REQ.1: 1
  • AVA:
    • AVA_VLA.1.1: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_STG.1: 1
  • FDP:
    • FDP_ACF.1: 1
  • FIA:
    • FIA_USB.1: 1
  • FMT:
    • FMT_REV.1: 1
    • FMT_SMF.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.MODE: 2
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 1
  • Microsoft:
    • Microsoft: 24
    • Microsoft Corporation: 2
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • X509:
    • X.509: 3
pdf_data/report_metadata
  • /CreationDate: D:20140204162613+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20140204162638+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 173797
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 24
pdf_data/st_filename c0416_est.pdf st_vid4025-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 3: 4
    • EAL 4: 14
    • EAL 4 augmented: 5
    • EAL3: 2
    • EAL4: 21
    • EAL4 augmented: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT.1: 14
    • ACM_CAP.4: 24
    • ACM_SCP.2: 11
  • ADO:
    • ADO_DEL.2: 11
    • ADO_IGS.1: 10
  • ADV:
    • ADV_FSP.2: 14
    • ADV_HLD.2: 16
    • ADV_IMP.1: 11
    • ADV_LLD.1: 18
    • ADV_RCR.1: 8
    • ADV_SPM.1: 14
  • AGD:
    • AGD_ADM.1: 15
    • AGD_USR.1: 13
  • ALC:
    • ALC_DVS.1: 11
    • ALC_FLR.3: 25
    • ALC_LCD.1: 12
    • ALC_TAT.1: 13
  • ATE:
    • ATE_COV.2: 11
    • ATE_DPT.1: 9
    • ATE_FUN.1: 14
    • ATE_IND.2: 12
  • AVA:
    • AVA_MSU.2: 18
    • AVA_SOF.1: 11
    • AVA_VLA.2: 16
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_RIP: 5
    • FDP_RIP.1.1: 1
    • FDP_SIP: 1
    • FDP_SIP.1: 15
    • FDP_SIP.1.1: 2
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 14
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 13
    • FAU_SAR.3.1: 2
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 10
    • FAU_STG.3.1: 1
    • FAU_STG.4: 14
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXP.1: 1
    • FCS_CKM_EXP.2.2: 1
    • FCS_COP: 1
    • FCS_COP.1: 31
    • FCS_COP.1.1: 16
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.2: 30
    • FDP_ACC.2.1: 3
    • FDP_ACC.2.2: 3
    • FDP_ACF.1: 36
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 3
    • FDP_ACF.2: 2
    • FDP_IFC.1: 30
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 20
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 2
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITT.1: 9
    • FDP_ITT.1.1: 1
    • FDP_RIP.2: 11
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 15
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 18
    • FIA_USB.1: 4
  • FMT:
    • FMT_MOF.1: 39
    • FMT_MOF.1.1: 4
    • FMT_MSA: 1
    • FMT_MSA.1: 64
    • FMT_MSA.1.1: 6
    • FMT_MSA.2: 9
    • FMT_MSA.3: 50
    • FMT_MSA.3.1: 5
    • FMT_MSA.3.2: 5
    • FMT_MTD.1: 140
    • FMT_MTD.1.1: 16
    • FMT_MTD.1.2: 1
    • FMT_MTD.2: 11
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_REV: 1
    • FMT_REV.1: 19
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SAE.1: 11
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 45
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMR.3: 8
    • FMT_SMR.3.1: 1
  • FPT:
    • FPT_AMT.1: 7
    • FPT_ITT.1: 6
    • FPT_ITT.3: 3
    • FPT_RPL: 1
    • FPT_RPL.1: 3
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 9
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TRC.1: 4
  • FRU:
    • FRU_RSA.1: 9
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_LSA.1: 1
    • FTA_MCS.1: 2
    • FTA_MSC.1: 1
    • FTA_SSL.1: 8
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 12
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
    • FTA_TRP.1: 1
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 11
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.MODE: 8
  • O:
    • O.OVERWRITE: 8
  • OE:
    • OE.MODE: 6
  • A:
    • A.CONNECT: 3
    • A.COOP: 5
    • A.LOCATE: 3
    • A.MANAGE: 2
    • A.NO_EVIL_ADM: 3
    • A.PEER: 3
    • A.PROTECT: 2
  • O:
    • O.ASSURANCE: 4
    • O.AUDITING: 7
    • O.AUDIT_: 1
    • O.AUDIT_PROTECTION: 4
    • O.AUTHORIZATION: 7
    • O.CREDEN: 4
    • O.DISCRETIONARY_ACCESS: 3
    • O.ENCRYPTED_DATA: 10
    • O.ENFORCEMENT: 8
    • O.INSTALL: 4
    • O.IPSEC: 12
    • O.LEGAL_WARNING: 4
    • O.LIMIT_AUTHORIZATION: 8
    • O.MANAGE: 7
    • O.MEDIATE: 8
    • O.PHYSICAL: 5
    • O.PROTECT: 9
    • O.RESIDUAL_INFORMATION: 7
    • O.TRUSTED_PATH: 8
  • T:
    • T.ADDRESS_MASQUERADE: 4
    • T.ADMIN_ERROR: 4
    • T.AUDIT_COMPROMISE: 5
    • T.AUDIT_CORRUPT: 4
    • T.CONFIG_CORRUPT: 3
    • T.EAVESDROP: 4
    • T.MASQUERADE: 3
    • T.OBJECTS_NOT_CLEAN: 4
    • T.POOR_DESIGN: 3
    • T.POOR_IMPLEMENTATION: 4
    • T.REPLAY: 4
    • T.SPOOF: 4
    • T.SYSACC: 4
    • T.TCPIP_ATTACK: 3
    • T.UNATTENDED_SESSION: 5
    • T.UNAUTH_ACCESS: 7
    • T.UNAUTH_MODIFICATION: 4
    • T.UNDETECTED_ACTIONS: 4
    • T.UNIDENTIFIED_ACTIONS: 8
    • T.USER_CORRUPT: 7
    • T.USER_CURRUPT: 1
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 1
  • Infineon:
    • Infineon: 2
  • Microsoft:
    • Microsoft: 42
    • Microsoft Corporation: 168
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
    • RC:
      • RC4: 2
  • DES:
    • 3DES:
      • 3DES: 12
    • DES:
      • DES: 18
  • constructions:
    • MAC:
      • HMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 17
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 21
      • SHA1: 2
    • SHA2:
      • SHA-256: 3
      • SHA-384: 3
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 11
  • TLS:
    • SSL:
      • SSL: 12
    • TLS:
      • TLS: 5
  • VPN:
    • VPN: 3
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 12
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • ECB:
    • ECB: 5
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 140: 5
    • FIPS 140-1: 6
    • FIPS 140-2: 5
    • FIPS 140-214: 1
    • FIPS 180-2: 1
    • FIPS 186-2: 2
    • FIPS 197: 2
    • FIPS 46-3: 3
  • PKCS:
    • PKCS#1: 2
    • PKCS#5: 7
  • RFC:
    • RFC 2617: 1
    • RFC 3739: 1
  • X509:
    • X.509: 3
    • x.509: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20140131135638+09'00'
  • /Creator: CubePDF
  • /Keywords:
  • /ModDate: D:20140131135642+09'00'
  • /Producer: GPL Ghostscript 9.06; modified using iText® 5.3.2 ©2000-2012 1T3XT BVBA (AGPL-version)
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 154078
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different