Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

RICOH IM 7000/8000/9000, SAVIN IM 7000/8000/9000, LANIER IM 7000/8000/9000, nashuatec IM 7000/8000/9000, Rex Rotary IM 7000/8000/9000, Gestetner IM 7000/8000/9000 E-1.00
JISEC-CC-CRP-C0729-01-2021
Japan: Ricoh imagio MP 2550/3350 series, Overseas:Ricoh Aficio MP 2550/3350 series,Savin 9025/9033 series,Lanier LD425/LD433 series,Lanier LD425/LD433 series,Lanier MP 2550/3350 series,Gestetner MP 2550/3350 series,nashuatec MP 2550/3350 series,RexRotary MP 2550/3350 series,infotec MP 2550/3350 series Version:System/Copy:1.14,Network Support:7.23,Scanner:1.11,Printer:1.05,Fax:05.00.00,Web Support:1.52,Web Uapl:1.10,Network Doc Box:1.10C,Ic Key:1100,Ic Hdd: 01
JISEC-CC-CRP-C0244
name RICOH IM 7000/8000/9000, SAVIN IM 7000/8000/9000, LANIER IM 7000/8000/9000, nashuatec IM 7000/8000/9000, Rex Rotary IM 7000/8000/9000, Gestetner IM 7000/8000/9000 E-1.00 Japan: Ricoh imagio MP 2550/3350 series, Overseas:Ricoh Aficio MP 2550/3350 series,Savin 9025/9033 series,Lanier LD425/LD433 series,Lanier LD425/LD433 series,Lanier MP 2550/3350 series,Gestetner MP 2550/3350 series,nashuatec MP 2550/3350 series,RexRotary MP 2550/3350 series,infotec MP 2550/3350 series Version:System/Copy:1.14,Network Support:7.23,Scanner:1.11,Printer:1.05,Fax:05.00.00,Web Support:1.52,Web Uapl:1.10,Network Doc Box:1.10C,Ic Key:1100,Ic Hdd: 01
not_valid_before 2021-09-17 2010-02-25
not_valid_after 2026-09-17 2015-03-01
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0729_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0244_est.pdf
status active archived
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0729_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0244_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0729_eimg.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash 81db9f593e8c2328a1448fc5e4eaaa33e89ffb4574e91f4a4bda557c2de86263 None
state/cert/txt_hash dd7f375d8303523b9d641d02f9bf251d4e5eecffc2a6eaf33d89361aa2855b22 None
state/report/pdf_hash e654cc38db9726179e298793c73fb707e623f5ea9982aa7053aff1d6ec281352 c194e52a453d5172405ca423c1676596e5816c6c321c70179d2773572d469986
state/report/txt_hash 296c4acbdb29d14f75ca73b081f1f534bc8aea7e38adf31f18b2559dbef53442 d16144e315bd184153504d7410ef0503a33652276f95cfaf7200be44bcfdbfec
state/st/pdf_hash 783822b6752cc87638c770416187385d064328bdc96e5198635bf6e39119cfec 49a2bcba5f0139fb73762f8eb47daabf1322a3db8aa633432a04b2ea0a0834b4
state/st/txt_hash b89275089c19c7edbf1f1473aa4c77d006cfb21332feeaf458fa5608cc86298e d1c242a3d7314a1932aa0869c70fbdba91c607736e40499dbf53d363c0fc3ed9
heuristics/cert_id JISEC-CC-CRP-C0729-01-2021 JISEC-CC-CRP-C0244
heuristics/extracted_versions 1.00 1.05, 1.11, 1.52, 7.23, 1.14, 05.00.00, 1.10
heuristics/scheme_data/cert_id C0729 C0244
heuristics/scheme_data/certification_date 2021-09 2010-02
heuristics/scheme_data/claim PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) EAL3
heuristics/scheme_data/enhanced
  • product: RICOH IM 7000/8000/9000, SAVIN IM 7000/8000/9000, LANIER IM 7000/8000/9000, nashuatec IM 7000/8000/9000, Rex Rotary IM 7000/8000/9000, Gestetner IM 7000/8000/9000
  • toe_version: E-1.00
  • product_type: Multi Function Product
  • cert_id: JISEC-C0729
  • certification_date: 2021-09-17
  • cc_version: 3.1 Release5
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000am8-att/c0729_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000am8-att/c0729_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000am8-att/c0729_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: Japan: Ricoh imagio MP 2550/3350 series Overseas: Ricoh Aficio MP 2550/3350 series Savin 9025/9033 series Lanier LD425/LD433 series Lanier MP 2550/3350 series Gestetner MP 2550/3350 series nashuatec MP 2550/3350 series RexRotary MP 2550/3350 series infotec MP 2550/3350 series
  • toe_version: System/Copy: 1.14 Network Support: 7.23 Scanner: 1.11 Printer: 1.05 Fax: 05.00.00 Web Support: 1.52 Web Uapl: 1.10 Network Doc Box: 1.10C Ic Key: 1100 Ic Hdd: 01
  • product_type: Multi Function Product
  • certification_date: 2010-02-25
  • cc_version: 3.1
  • assurance_level: EAL3
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0244_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0244_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0244_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP (hereafter, MFP) for digitizing paper documents, managing digitized documents, and printing documents and faxing documents. Also, it provides the secure environment for using the functions of copier, scanner, printer, document server, and fax (optional). TOE security functionality The major security functions for the TOE are as follows: - Audit Function to record security events as audit logs. - Stored Data Protection Function to encrypt the stored document data on hard disk. - Document Data Access Control Function to control the document operation for each user. - Telephone Line Intrusion Protection Function to accept the fax communication only. - Identification and Authentication Function to identify and authenticate users. - Security Management Function to totally manage the settings of security functions (including Service Mode Lock Function). - MFP Control Software Verification Function to check the integrity of the control software. - Network Communication Data Protection Function to encrypt the network communication.
heuristics/scheme_data/enhanced/assurance_level EAL2 Augmented by ALC_FLR.2 EAL3
heuristics/scheme_data/enhanced/cc_version 3.1 Release5 3.1
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000am8-att/c0729_eimg.pdf https://www.ipa.go.jp/en/security/c0244_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2021-09-17 2010-02-25
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP (hereafter, MFP) for digitizing paper documents, managing digitized documents, and printing documents and faxing documents. Also, it provides the secure environment for using the functions of copier, scanner, printer, document server, and fax (optional). TOE security functionality The major security functions for the TOE are as follows: - Audit Function to record security events as audit logs. - Stored Data Protection Function to encrypt the stored document data on hard disk. - Document Data Access Control Function to control the document operation for each user. - Telephone Line Intrusion Protection Function to accept the fax communication only. - Identification and Authentication Function to identify and authenticate users. - Security Management Function to totally manage the settings of security functions (including Service Mode Lock Function). - MFP Control Software Verification Function to check the integrity of the control software. - Network Communication Data Protection Function to encrypt the network communication.
heuristics/scheme_data/enhanced/evaluation_facility ECSEC Laboratory Inc. Evaluation Center Information Technology Security Center Evaluation Department
heuristics/scheme_data/enhanced/product RICOH IM 7000/8000/9000, SAVIN IM 7000/8000/9000, LANIER IM 7000/8000/9000, nashuatec IM 7000/8000/9000, Rex Rotary IM 7000/8000/9000, Gestetner IM 7000/8000/9000 Japan: Ricoh imagio MP 2550/3350 series Overseas: Ricoh Aficio MP 2550/3350 series Savin 9025/9033 series Lanier LD425/LD433 series Lanier MP 2550/3350 series Gestetner MP 2550/3350 series nashuatec MP 2550/3350 series RexRotary MP 2550/3350 series infotec MP 2550/3350 series
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000am8-att/c0729_erpt.pdf https://www.ipa.go.jp/en/security/c0244_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000am8-att/c0729_est.pdf https://www.ipa.go.jp/en/security/c0244_est.pdf
heuristics/scheme_data/enhanced/toe_version E-1.00 System/Copy: 1.14 Network Support: 7.23 Scanner: 1.11 Printer: 1.05 Fax: 05.00.00 Web Support: 1.52 Web Uapl: 1.10 Network Doc Box: 1.10C Ic Key: 1100 Ic Hdd: 01
heuristics/scheme_data/expiration_date None 2015-03
heuristics/scheme_data/supplier RICOH COMPANY, LTD. RICOH COMPANY, LTD.
heuristics/scheme_data/toe_japan_name ----- Ricoh imagio MP 2550/3350 series System/Copy: 1.14, Network Support: 7.23, Scanner: 1.11, Printer: 1.05, Fax: 05.00.00, Web Support: 1.52, Web Uapl: 1.10, Network Doc Box: 1.10C, Ic Key: 1100, Ic Hdd: 01
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0729_it1777.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0244_it9256.html
heuristics/scheme_data/toe_overseas_name RICOH IM 7000/8000/9000, SAVIN IM 7000/8000/9000, LANIER IM 7000/8000/9000, nashuatec IM 7000/8000/9000, Rex Rotary IM 7000/8000/9000, Gestetner IM 7000/8000/9000E-1.00 Ricoh Aficio MP 2550/3350 series Savin 9025/9033 series Lanier LD425/LD433 series Lanier MP 2550/3350 series Gestetner MP 2550/3350 series nashuatec MP 2550/3350 series RexRotary MP 2550/3350 series infotec MP 2550/3350 series System/Copy: 1.14, Network Support: 7.23, Scanner: 1.11, Printer: 1.05, Fax: 05.00.00, Web Support: 1.52, Web Uapl: 1.10, Network Doc Box: 1.10C, Ic Key: 1100, Ic Hdd: 01
pdf_data/cert_filename c0729_eimg.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0729-01-2021: 1
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ECSEC:
      • ECSEC Laboratory: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 176678
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20211109141826+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20211109142704+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20211109045218
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
None
pdf_data/report_filename c0729_erpt.pdf c0244_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0729-01-2021: 1
  • CRP-C0244-01: 1
  • Certification No. C0244: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.ADMIN: 2
  • A.SUPERVISOR: 1
  • A.NETWORK: 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 4
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
  • T.ILLEGAL_USE: 4
  • T.UNAUTH_ACCESS: 4
  • T.ABUSE_SEC_MNG: 4
  • T.SALVAGE: 4
  • T.TRANSIT: 4
  • T.FAX_LINE: 5
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2 augmented: 2
  • EAL3: 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.2: 1
      • TLS: 1
  • IPsec:
    • IPsec: 5
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 10
pdf_data/report_keywords/crypto_protocol/TLS
  • TLS:
    • TLS 1.2: 1
    • TLS: 1
  • SSL:
    • SSL: 10
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/standard_id/CC
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
  • CCMB-2006-09-001: 2
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2007-09-004: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 364988
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
  • /CreationDate: D:20211110152622+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20211110153930+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 268487
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
  • /ModDate: D:20100629165657+09'00'
  • /CreationDate: D:20100629165657+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20211110152622+09'00' D:20100629165657+09'00'
pdf_data/report_metadata//ModDate D:20211110153930+09'00' D:20100629165657+09'00'
pdf_data/report_metadata//Producer Microsoft® Word for Office 365 Acrobat Distiller 6.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 364988 268487
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/st_filename c0729_est.pdf c0244_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.STORAGE: 14
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • O:
    • O.AUDIT: 14
    • O.MEM: 10
    • O.GENUINE: 8
    • O.LINE_PROTECT: 8
    • O.DOC_ACC: 6
    • O.MANAGE: 10
    • O.NET: 8
  • T:
    • T.ILLEGAL_USE: 4
    • T.UNAUTH_ACCESS: 3
    • T.ABUSE_SEC_MNG: 4
    • T.SALVAGE: 3
    • T.TRANSIT: 4
    • T.FAX_LINE: 3
  • A:
    • A.ADMIN: 5
    • A.SUPERVISOR: 4
    • A.NETWORK: 5
  • OE:
    • OE.ADMIN: 3
    • OE.SUPERVISOR: 3
    • OE.NETWORK: 3
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 5
  • A.USER: 4
  • A.ADMIN: 10
  • A.ADMIN: 5
  • A.SUPERVISOR: 4
  • A.NETWORK: 5
pdf_data/st_keywords/cc_claims/A/A.ADMIN 10 5
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.AUDIT: 14
  • O.MEM: 10
  • O.GENUINE: 8
  • O.LINE_PROTECT: 8
  • O.DOC_ACC: 6
  • O.MANAGE: 10
  • O.NET: 8
pdf_data/st_keywords/cc_claims/O/O.AUDIT 9 14
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 3
  • OE.AUDIT_ACCESS: 2
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 4
  • OE.USER: 21
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • OE.ADMIN: 3
  • OE.SUPERVISOR: 3
  • OE.NETWORK: 3
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 8 3
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 14
  • T.FUNC: 7
  • T.PROT: 5
  • T.CONF: 10
  • T.ILLEGAL_USE: 4
  • T.UNAUTH_ACCESS: 3
  • T.ABUSE_SEC_MNG: 4
  • T.SALVAGE: 3
  • T.TRANSIT: 4
  • T.FAX_LINE: 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 1
  • EAL3: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_STG.1: 9
    • FAU_STG.4: 8
    • FAU_SAR.1: 10
    • FAU_SAR.2: 8
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_ACC.1: 31
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 9
    • FIA_UAU.7: 8
    • FIA_SOS.1: 8
    • FIA_UID.1: 18
    • FIA_UAU.1: 14
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMF.1: 23
    • FMT_SMR.1: 29
    • FMT_MSA.3: 22
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1.3: 4
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.2: 9
    • FAU_STG.1: 9
    • FAU_STG.4: 9
    • FAU_GEN.1.2: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_COP.1: 10
    • FCS_CKM.2: 2
    • FCS_CKM.4: 6
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACF.1: 13
    • FDP_IFC.1: 12
    • FDP_IFF.1: 10
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_ATD.1: 10
    • FIA_SOS.1: 8
    • FIA_UAU.2: 12
    • FIA_UAU.7: 9
    • FIA_UID.2: 10
    • FIA_USB.1: 9
    • FIA_UAU.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UID.1: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 12
    • FMT_MSA.3: 14
    • FMT_MTD.1: 16
    • FMT_SMF.1: 19
    • FMT_SMR.1: 19
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 9
    • FPT_TST.1: 9
    • FPT_STM: 1
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_TRP.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
    • FTP_TST.1: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.1: 9
  • FAU_STG.4: 8
  • FAU_SAR.1: 10
  • FAU_SAR.2: 8
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 11
  • FAU_SAR.2: 9
  • FAU_STG.1: 9
  • FAU_STG.4: 9
  • FAU_GEN.1.2: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 11
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 8 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 11 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 7 6
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF.1: 31
  • FDP_ACF.1.1: 3
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 3
  • FDP_ACC.1: 31
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 2
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
  • FDP_ACC.1: 16
  • FDP_ACF.1: 13
  • FDP_IFC.1: 12
  • FDP_IFF.1: 10
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 31 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 31 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 4 12
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 10
  • FIA_ATD.1: 10
  • FIA_SOS.1: 8
  • FIA_UAU.2: 12
  • FIA_UAU.7: 9
  • FIA_UID.2: 10
  • FIA_USB.1: 9
  • FIA_UAU.1: 6
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UID.1: 8
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 9 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 8 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 14 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 8 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 18 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 6 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 12 16
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 23 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 29 19
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 5
  • FPT_FDI_EXP.1: 11
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1: 6
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1: 9
  • FPT_TST.1: 9
  • FPT_STM: 1
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 6 9
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1.3: 4
  • FTP_ITC.1: 17
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1: 8
  • FTP_TRP.1: 10
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 2
  • FTP_TRP.1.3: 2
  • FTP_TST.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 17 8
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 4 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS1.2: 1
  • IPsec:
    • IPsec: 10
  • TLS:
    • SSL:
      • SSL: 9
pdf_data/st_keywords/crypto_protocol/TLS
  • TLS:
    • TLS1.2: 1
  • SSL:
    • SSL: 9
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 4
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 3
  • BSI:
    • BSI-AIS31: 3
  • CC:
    • CCMB-2006-09-002: 1
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-0004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2006-09-002: 1
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2006-09-001: 1
  • CCMB-2007-09-0004: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS197 2 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 6 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 1270857
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 92
  • /Title: RICOH IM 7000/8000/9000, SAVIN IM 7000/8000/9000, LANIER IM 7000/8000/9000, nashuatec IM 7000/8000/9000, Rex Rotary IM 7000/8000/9000, Gestetner IM 7000/8000/9000 Security Target
  • /Author: RICOH
  • /Creator: Microsoft® Word for Microsoft 365
  • /CreationDate: D:20211105143535+09'00'
  • /ModDate: D:20211105143535+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_hyperlinks: https://support.ricoh.com/services/device/ccmanual/IM_7000_8000_9000/en/Guidance_na.zip
  • pdf_file_size_bytes: 608634
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 83
  • /CreationDate: D:20100622092130+09'00'
  • /Author: Funaki Yasushi
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20100622092130+09'00'
  • /Company: 株式会社リコー
  • /SourceModified: D:20100621051630
  • /Title: imagioMP4000/5000,AficioMP4000/5000
  • pdf_hyperlinks:
pdf_data/st_metadata//Author RICOH Funaki Yasushi
pdf_data/st_metadata//CreationDate D:20211105143535+09'00' D:20100622092130+09'00'
pdf_data/st_metadata//Creator Microsoft® Word for Microsoft 365 PScript5.dll Version 5.2
pdf_data/st_metadata//ModDate D:20211105143535+09'00' D:20100622092130+09'00'
pdf_data/st_metadata//Producer Microsoft® Word for Microsoft 365 Acrobat Distiller 7.0.5 (Windows)
pdf_data/st_metadata//Title RICOH IM 7000/8000/9000, SAVIN IM 7000/8000/9000, LANIER IM 7000/8000/9000, nashuatec IM 7000/8000/9000, Rex Rotary IM 7000/8000/9000, Gestetner IM 7000/8000/9000 Security Target imagioMP4000/5000,AficioMP4000/5000
pdf_data/st_metadata/pdf_file_size_bytes 1270857 608634
pdf_data/st_metadata/pdf_hyperlinks https://support.ricoh.com/services/device/ccmanual/IM_7000_8000_9000/en/Guidance_na.zip
pdf_data/st_metadata/pdf_number_of_pages 92 83
dgst 119531b1909228fa c8b114f8cb6531f8