Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

RICOH IM C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A,nashuatec IM C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A,Rex Rotary IM C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A,Gestetner IM C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510Awith Fax Option Type M52 and HDD OptionType M52 320GBE-1.01
JISEC-CC-CRP-C0800-01-2023
RICOH IM 370F/460F,nashuatec IM 370F/460F,Rex Rotary IM 370F/460F,Gestetner IM 370F/460FE-1.00
JISEC-CC-CRP-C0807-01-2024
name RICOH IM C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A,nashuatec IM C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A,Rex Rotary IM C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A,Gestetner IM C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510Awith Fax Option Type M52 and HDD OptionType M52 320GBE-1.01 RICOH IM 370F/460F,nashuatec IM 370F/460F,Rex Rotary IM 370F/460F,Gestetner IM 370F/460FE-1.00
not_valid_before 2023-11-16 2024-03-04
not_valid_after 2028-11-16 2029-03-04
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0800_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0807_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0800_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0807_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0800_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0807_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/cert/pdf_hash 115f5a835e066bfbec280be0ef0264b80a65ff694abfc432a6dc2df5292d8fa0 b472fb3b9c62d9fa70a1f4419087836f5966d9dc9b6f151db16c9cd361ec4159
state/cert/txt_hash 8d6c7f8c0d89b78b5ecc2e3f672c6051a0c390c017f865897c6667e55aa61278 6d57295eab5e1f5d75040fa77e767363a0b874555a1f2320a840398c66261e9f
state/report/pdf_hash 73ee6c8a762c9fb6c5d2c05f004f9cb2637110bcc3b96ff4bed24c342de14c57 4d86432651874122b95397ef20f73a7fdeea2103ee6237e15601031c7bf7168c
state/report/txt_hash acc82f677bf5906a9daaafef88ad12bd033b113c578596a7e2067409c3fa05fc 9df9ca5b4fee8e04ec1a52802f72bc4720f2a2758fc3bf0dd1ef2e7f6eeae08a
state/st/pdf_hash 0d85b917e46937af8c97f2abda99af3eb575888183aa669e2476bfccf59d6ed9 c5bacd61ffd5e2c73fd3e9a73e54c89739d3c20e244c163c08cc493235595ca1
state/st/txt_hash c1c8adf0b7537ef0165a38f2e7600fd82dd15e02b50b68babea967ddf3a3c26b c8daac81663e55ff309b6c6735b62d2af8924e7377735c0715a793159a3126b3
heuristics/cert_id JISEC-CC-CRP-C0800-01-2023 JISEC-CC-CRP-C0807-01-2024
heuristics/extracted_versions 1.01 1.00
heuristics/scheme_data/cert_id C0800 C0807
heuristics/scheme_data/certification_date 2023-11 2024-03
heuristics/scheme_data/claim PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) EAL2
heuristics/scheme_data/enhanced/assurance_level EAL2 Augmented by ALC_FLR.2 EAL2
heuristics/scheme_data/enhanced/cert_id JISEC-C0800 JISEC-C0807
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/kcrmqo0000000per-att/c0800_eimg.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo000000y1r4-att/c0807_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2023-11-16 2029-03-04
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. TOE security functionality The TOE provides the following security functions: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions to prevent unauthorized disclosure and alteration of user data and security function setting data. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Network Protection Function: Enables the TOE to protect network communications using encryption. Stored Data Protection Function: Enables the TOE to protect the stored data using encryption. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
heuristics/scheme_data/enhanced/product RICOH IM C2010/C2010A/C2510/C2510A/C3010/C3010A/ C3510/C3510A, nashuatec IM C2010/C2010A/C2510/C2510A/C3010/C3010A/ C3510/C3510A, Rex Rotary IM C2010/C2010A/C2510/C2510A/C3010/C3010A/ C3510/C3510A, Gestetner IM C2010/C2010A/C2510/C2510A/C3010/C3010A/ C3510/C3510A with Fax Option Type M52 and HDD Option Type M52 320GB RICOH IM 370F/460F, nashuatec IM 370F/460F, Rex Rotary IM 370F/460F, Gestetner IM 370F/460F
heuristics/scheme_data/enhanced/protection_profile U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) none
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/kcrmqo0000000per-att/c0800_erpt.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo000000y1r4-att/c0807_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/kcrmqo0000000per-att/c0800_est.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo000000y1r4-att/c0807_est.pdf
heuristics/scheme_data/enhanced/toe_version E-1.01 E-1.00
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0800_it2833.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0807_it3863.html
heuristics/scheme_data/toe_overseas_name RICOH IM C2010/C2010A/C2510/C2510A/C3010/ C3010A/C3510/C3510A, nashuatec IM C2010/C2010A/C2510/C2510A/ C3010/C3010A/C3510/C3510A, Rex Rotary IM C2010/C2010A/C2510/C2510A/ C3010/C3010A/C3510/C3510A, Gestetner IM C2010/C2010A/C2510/C2510A/ C3010/C3010A/C3510/C3510A with Fax Option Type M52 and HDD Option Type M52 320GB E-1.01 RICOH IM 370F/460F, nashuatec IM 370F/460F, Rex Rotary IM 370F/460F, Gestetner IM 370F/460F E-1.00
pdf_data/cert_filename c0800_eimg.pdf c0807_eimg.pdf
pdf_data/cert_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0800-01-2023: 1
  • JISEC-CC-CRP-C0807-01-2024: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_metadata//CreationDate D:20231227165119+09'00' D:20240502113132+09'00'
pdf_data/cert_metadata//ModDate D:20231227165229+09'00' D:20240502113319+09'00'
pdf_data/cert_metadata//SourceModified D:20231227075036 D:20240502023112
pdf_data/cert_metadata/pdf_file_size_bytes 235642 167844
pdf_data/report_filename c0800_erpt.pdf c0807_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0800-01-2023: 1
  • JISEC-CC-CRP-C0807-01-2024: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.PHYSICAL_PROTECTION: 1
  • A.NETWORK_PROTECTION: 1
  • A.USER: 1
  • A.ADMIN: 1
  • A.TRUSTED_ADMIN: 1
pdf_data/report_keywords/cc_claims/A/A.ADMIN 2 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 3
  • T.FUNC: 2
  • T.PROT: 2
  • T.CONF: 4
  • T.DOCUMENT_DATA_DIS: 2
  • T.DOCUMENT_DATA_ALT: 2
  • T.JOB_ALT: 2
  • T.PROTECT_DATA_ALT: 2
  • T.CONFIDENTIAL_DATA_DIS: 2
  • T.CONFIDENTIAL_DATA_ALT: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2 augmented: 2
  • EAL2: 4
pdf_data/report_keywords/crypto_protocol/TLS/TLS/TLS 5 6
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_metadata//CreationDate D:20240122142211+09'00' D:20240513165510+09'00'
pdf_data/report_metadata//ModDate D:20240122142309+09'00' D:20240513165609+09'00'
pdf_data/report_metadata//SourceModified D:20240119063600 D:20240513073209
pdf_data/report_metadata/pdf_file_size_bytes 610708 592713
pdf_data/report_metadata/pdf_number_of_pages 38 32
pdf_data/st_filename c0800_est.pdf c0807_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.DOC: 19
    • D.FUNC: 13
    • D.PROT: 4
    • D.CONF: 4
  • O:
    • O.PROT: 10
    • O.DOC: 18
    • O.FUNC: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 5
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 4
    • OE.AUDIT_ACCESS: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 20
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • O:
    • O.DOCUMENT_DATA_DIS: 16
    • O.DOCUMENT_DATA_ALT: 13
    • O.JOB_ALT: 16
    • O.PROTECT_DATA_ALT: 13
    • O.CONFIDENTIAL_DATA_DIS: 15
    • O.CONFIDENTIAL_DATA_ALT: 12
    • O.AUTHORIZATION: 28
    • O.FAX: 8
    • O.VALIDATION: 10
    • O.AUDIT: 12
    • O.EMMC_ENCRYPTION: 12
  • T:
    • T.DOCUMENT_DATA_DIS: 4
    • T.DOCUMENT_DATA_ALT: 4
    • T.PROTECT_DATA_ALT: 4
    • T.CONFIDENTIAL_DATA_DIS: 4
    • T.CONFIDENTIAL_DATA_ALT: 4
    • T.JOB_ALT: 3
  • A:
    • A.PHYSICAL_PROTECTION: 4
    • A.NETWORK_PROTECTION: 4
    • A.USER: 4
    • A.ADMIN: 4
    • A.TRUSTED_ADMIN: 4
  • OE:
    • OE.AUDIT: 4
    • OE.PHYSICAL_PROTECTION: 4
    • OE.NETWORK_PROTECTION: 3
    • OE.AUTHORIZED_USER: 16
    • OE.TRAINED_USER: 4
    • OE.TRAINED_ADMIN: 4
    • OE.TRUSTED_ADMIN: 3
    • OE.AUDIT_MANAGE: 3
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 5
  • A.USER: 5
  • A.ADMIN: 10
  • A.PHYSICAL_PROTECTION: 4
  • A.NETWORK_PROTECTION: 4
  • A.USER: 4
  • A.ADMIN: 4
  • A.TRUSTED_ADMIN: 4
pdf_data/st_keywords/cc_claims/A/A.ADMIN 10 4
pdf_data/st_keywords/cc_claims/A/A.USER 5 4
pdf_data/st_keywords/cc_claims/O
  • O.PROT: 10
  • O.DOC: 18
  • O.FUNC: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.DOCUMENT_DATA_DIS: 16
  • O.DOCUMENT_DATA_ALT: 13
  • O.JOB_ALT: 16
  • O.PROTECT_DATA_ALT: 13
  • O.CONFIDENTIAL_DATA_DIS: 15
  • O.CONFIDENTIAL_DATA_ALT: 12
  • O.AUTHORIZATION: 28
  • O.FAX: 8
  • O.VALIDATION: 10
  • O.AUDIT: 12
  • O.EMMC_ENCRYPTION: 12
pdf_data/st_keywords/cc_claims/O/O.AUDIT 9 12
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 4
  • OE.AUDIT_ACCESS: 3
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 4
  • OE.USER: 20
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • OE.AUDIT: 4
  • OE.PHYSICAL_PROTECTION: 4
  • OE.NETWORK_PROTECTION: 3
  • OE.AUTHORIZED_USER: 16
  • OE.TRAINED_USER: 4
  • OE.TRAINED_ADMIN: 4
  • OE.TRUSTED_ADMIN: 3
  • OE.AUDIT_MANAGE: 3
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT 3 4
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 10
  • T.FUNC: 5
  • T.PROT: 5
  • T.CONF: 10
  • T.DOCUMENT_DATA_DIS: 4
  • T.DOCUMENT_DATA_ALT: 4
  • T.PROTECT_DATA_ALT: 4
  • T.CONFIDENTIAL_DATA_DIS: 4
  • T.CONFIDENTIAL_DATA_ALT: 4
  • T.JOB_ALT: 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 4
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL2 2 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_STG.1: 10
    • FAU_STG.4: 7
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_GEN.1: 12
    • FAU_GEN: 1
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FDP:
    • FDP_ACF.1: 26
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ACC.1: 28
    • FDP_ACC.1.1: 2
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 8
    • FIA_UAU.7: 7
    • FIA_SOS.1: 7
    • FIA_UID.1: 23
    • FIA_UAU.1: 14
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_SMR.1: 31
    • FMT_SMF.1: 25
    • FMT_MSA.3: 23
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 26
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 16
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 10
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 13
    • FAU_GEN.2: 8
    • FAU_STG.1: 12
    • FAU_STG.4: 7
    • FAU_SAR.1: 11
    • FAU_SAR.2: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.4: 12
    • FCS_COP.1: 9
    • FCS_CKM.2: 2
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_FXS_EXP: 2
    • FDP_ACC.1: 16
    • FDP_ACF.1: 16
    • FDP_FXS_EXP.1: 12
    • FDP_FXS_EXP.1.1: 2
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL.1: 7
    • FIA_ATD.1: 9
    • FIA_SOS.1: 7
    • FIA_UAU.1: 14
    • FIA_UAU.7: 7
    • FIA_UID.1: 30
    • FIA_USB.1: 7
    • FIA_AFL: 1
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MSA.1: 14
    • FMT_MSA.3: 14
    • FMT_MTD.1: 22
    • FMT_SMF.1: 26
    • FMT_SMR.1: 30
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_TST_EXP: 2
    • FPT_STM.1: 10
    • FPT_TST_EXP.1: 12
    • FPT_TST_EXP.1.1: 2
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.1: 10
  • FAU_STG.4: 7
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_GEN.1: 12
  • FAU_GEN: 1
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_GEN.1: 13
  • FAU_GEN.2: 8
  • FAU_STG.1: 12
  • FAU_STG.4: 7
  • FAU_SAR.1: 11
  • FAU_SAR.2: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 12 13
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 6 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 11
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 9 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 10 12
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF.1: 26
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACC.1: 28
  • FDP_ACC.1.1: 2
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 2
  • FDP_ACF.1.4: 2
  • FDP_RIP.1: 5
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
  • FDP_FXS_EXP: 2
  • FDP_ACC.1: 16
  • FDP_ACF.1: 16
  • FDP_FXS_EXP.1: 12
  • FDP_FXS_EXP.1.1: 2
  • FDP_ITC.1: 4
  • FDP_ITC.2: 4
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 28 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 26 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 4 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 8
  • FIA_UAU.7: 7
  • FIA_SOS.1: 7
  • FIA_UID.1: 23
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 7
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 5
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 7
  • FIA_ATD.1: 9
  • FIA_SOS.1: 7
  • FIA_UAU.1: 14
  • FIA_UAU.7: 7
  • FIA_UID.1: 30
  • FIA_USB.1: 7
  • FIA_AFL: 1
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 8 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 7 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 23 30
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 5 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 8 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 26 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 23 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 16 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 25 26
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 31 30
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 3
  • FPT_FDI_EXP.1: 10
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 8
  • FPT_STM.1.1: 1
  • FPT_TST.1: 5
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_TST_EXP: 2
  • FPT_STM.1: 10
  • FPT_TST_EXP.1: 12
  • FPT_TST_EXP.1.1: 2
  • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 8 10
pdf_data/st_keywords/cc_sfr/FTA/FTA_SSL.3 7 8
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 11 18
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 6 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES
  • AES: 7
  • AES-128: 2
  • AES: 9
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 9
pdf_data/st_metadata//CreationDate D:20240119175316+09'00' D:20240501142445+09'00'
pdf_data/st_metadata//ModDate D:20240119175316+09'00' D:20240501142445+09'00'
pdf_data/st_metadata//Title RICOH IM C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A, nashuatec IM C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A, Rex Rotary IM C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A, Gestetner IM C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A with Fax Option Type M52 and HDD Option Type M52 320GB Security Target RICOH IM 370F/460F, nashuatec IM 370F/460F, Rex Rotary IM 370F/460F, Gestetner IM 370F/460F Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1446453 1241817
pdf_data/st_metadata/pdf_number_of_pages 101 90
dgst 1de2e24bd1bde92d 414ff3829b0ff6ce