Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
imagio Security Card Type 9 (Japanese name), DataOverwriteSecurity Unit Type I (English name) Version: 1.02m
JISEC-CC-CRP-C0417
Microsoft Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions; Windows XP Professional SP2 and x64 SP2; Windows XP Embedded SP2
CCEVS-VR-VID-10184-2008
name imagio Security Card Type 9 (Japanese name), DataOverwriteSecurity Unit Type I (English name) Version: 1.02m Microsoft Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions; Windows XP Professional SP2 and x64 SP2; Windows XP Embedded SP2
category Other Devices and Systems Operating Systems
scheme JP US
not_valid_after 01.09.2019 07.02.2010
not_valid_before 29.11.2013 07.02.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0417_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10184-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0417_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10184-st.pdf
manufacturer Ricoh Company, Ltd. Microsoft Corporation
manufacturer_web https://www.ricoh.com/ https://www.microsoft.com
security_level EAL3 EAL4+, ALC_FLR.3
dgst 221bca7fbf6eb6af cf3575b11c3e657d
heuristics/cert_id JISEC-CC-CRP-C0417 CCEVS-VR-VID-10184-2008
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_2003_server:-:r2_sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:itanium:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:itanium:*
heuristics/related_cves {} CVE-2012-0013, CVE-2015-1677, CVE-2010-0233, CVE-2009-2500, CVE-2014-0300, CVE-2009-3675, CVE-2015-0092, CVE-2010-0025, CVE-2007-5352, CVE-2011-0674, CVE-2012-0003, CVE-2011-3414, CVE-2010-1894, CVE-2010-2739, CVE-2013-1264, CVE-2008-1445, CVE-2008-1453, CVE-2011-2018, CVE-2008-4609, CVE-2011-1235, CVE-2007-3036, CVE-2012-0001, CVE-2014-4077, CVE-2013-1276, CVE-2008-4835, CVE-2015-0091, CVE-2007-1531, CVE-2007-5145, CVE-2010-2744, CVE-2011-1282, CVE-2009-1926, CVE-2010-0811, CVE-2011-0676, CVE-2013-3866, CVE-2009-0229, CVE-2008-3648, CVE-2011-1873, CVE-2012-1850, CVE-2013-3174, CVE-2011-0045, CVE-2011-1879, CVE-2019-1489, CVE-2010-0232, CVE-2009-0320, CVE-2012-0148, CVE-2010-3959, CVE-2015-1702, CVE-2014-0315, CVE-2008-5044, CVE-2009-1139, CVE-2011-1881, CVE-2010-0269, CVE-2011-0030, CVE-2013-3200, CVE-2009-2504, CVE-2008-3012, CVE-2015-1723, CVE-2008-0322, CVE-2011-1868, CVE-2013-3876, CVE-2006-4692, CVE-2010-4398, CVE-2011-0657, CVE-2007-1215, CVE-2007-6026, CVE-2011-1878, CVE-2010-2729, CVE-2005-1987, CVE-2009-2519, CVE-2007-0214, CVE-2015-1643, CVE-2015-0088, CVE-2009-1133, CVE-2008-2252, CVE-2012-0173, CVE-2010-0486, CVE-2008-2250, CVE-2013-1270, CVE-2015-1727, CVE-2008-6819, CVE-2010-1690, CVE-2009-0231, CVE-2010-2738, CVE-2015-0073, CVE-2013-5058, CVE-2011-1248, CVE-2013-3172, CVE-2010-3957, CVE-2015-1724, CVE-2007-0069, CVE-2013-3894, CVE-2013-1280, CVE-2009-1924, CVE-2010-0016, CVE-2013-3198, CVE-2015-1678, CVE-2011-1974, CVE-2008-4834, CVE-2013-3196, CVE-2009-0550, CVE-2011-0028, CVE-2014-0323, CVE-2008-4327, CVE-2013-1266, CVE-2014-4118, CVE-2012-2526, CVE-2011-1227, CVE-2009-1929, CVE-2014-6332, CVE-2010-2742, CVE-2015-2367, CVE-2004-0119, CVE-2010-0476, CVE-2013-3660, CVE-2012-1851, CVE-2009-2524, CVE-2012-1893, CVE-2007-0040, CVE-2011-1991, CVE-2010-3942, CVE-2009-3020, CVE-2009-2494, CVE-2015-0093, CVE-2009-3126, CVE-2011-0661, CVE-2015-0080, CVE-2013-1275, CVE-2015-2363, CVE-2011-1284, CVE-2012-1527, CVE-2002-0862, CVE-2013-1279, CVE-2008-3013, CVE-2013-5056, CVE-2017-0176, CVE-2012-1852, CVE-2013-1255, CVE-2014-4148, CVE-2015-1720, CVE-2011-1230, CVE-2010-1883, CVE-2008-2245, CVE-2013-1345, CVE-2009-0568, CVE-2013-1258, CVE-2013-3128, CVE-2014-0266, CVE-2008-1441, CVE-2013-1262, CVE-2014-1807, CVE-2010-1098, CVE-2008-3464, CVE-2013-1261, CVE-2008-1086, CVE-2012-0157, CVE-2009-2517, CVE-2010-4701, CVE-2007-0038, CVE-2010-3970, CVE-2010-0035, CVE-2011-0665, CVE-2003-1048, CVE-2011-3416, CVE-2013-1294, CVE-2002-0391, CVE-2012-2530, CVE-2008-1087, CVE-2015-1644, CVE-2010-0018, CVE-2015-0057, CVE-2012-0180, CVE-2009-0086, CVE-2015-0005, CVE-2010-1255, CVE-2014-6321, CVE-2011-1247, CVE-2008-0020, CVE-2010-0812, CVE-2010-0235, CVE-2013-3195, CVE-2012-5364, CVE-2015-0074, CVE-2013-1263, CVE-2012-0006, CVE-2010-2746, CVE-2015-0096, CVE-2007-1205, CVE-2013-1274, CVE-2009-1126, CVE-2011-1882, CVE-2010-1882, CVE-2011-2600, CVE-2011-3417, CVE-2015-2365, CVE-2007-1206, CVE-2014-0301, CVE-2011-1268, CVE-2010-2568, CVE-2010-3974, CVE-2010-0023, CVE-2010-3943, CVE-2010-3940, CVE-2010-2265, CVE-2013-3887, CVE-2014-1817, CVE-2013-3181, CVE-2009-1123, CVE-2015-1719, CVE-2011-1232, CVE-2007-3034, CVE-2010-1888, CVE-2009-1125, CVE-2013-1273, CVE-2009-4312, CVE-2011-0090, CVE-2007-6753, CVE-2015-0010, CVE-2013-1268, CVE-2011-1240, CVE-2011-1231, CVE-2011-1894, CVE-2014-1818, CVE-2013-1342, CVE-2011-1241, CVE-2011-1985, CVE-2010-3956, CVE-2011-0666, CVE-2010-0820, CVE-2015-0087, CVE-2007-0843, CVE-2013-3940, CVE-2013-3136, CVE-2010-0022, CVE-2002-2324, CVE-2010-2731, CVE-2009-2509, CVE-2008-3014, CVE-2010-2567, CVE-2013-1251, CVE-2009-2515, CVE-2011-0658, CVE-2012-1890, CVE-2007-3463, CVE-2013-3878, CVE-2011-1283, CVE-2010-1897, CVE-2004-0230, CVE-2015-1645, CVE-2009-2514, CVE-2007-2218, CVE-2007-1204, CVE-2009-0233, CVE-2011-0042, CVE-2009-0094, CVE-2015-2417, CVE-2015-0094, CVE-2012-4774, CVE-2010-0484, CVE-2013-1254, CVE-2006-2374, CVE-2014-1819, CVE-2015-2371, CVE-2014-0317, CVE-2013-1283, CVE-2012-1867, CVE-2010-0021, CVE-2015-0061, CVE-2011-0660, CVE-2015-0077, CVE-2009-0081, CVE-2011-3415, CVE-2013-3197, CVE-2009-0079, CVE-2012-0004, CVE-2009-2510, CVE-2015-1722, CVE-2011-1228, CVE-2011-1281, CVE-2009-0243, CVE-2008-1084, CVE-2013-1260, CVE-2011-1234, CVE-2010-3140, CVE-2015-0009, CVE-2015-2374, CVE-2009-1930, CVE-2011-5046, CVE-2007-3898, CVE-2006-7210, CVE-2007-1212, CVE-2009-1124, CVE-2009-2508, CVE-2013-3173, CVE-2011-0040, CVE-2010-0231, CVE-2011-0096, CVE-2010-3222, CVE-2009-0093, CVE-2013-5065, CVE-2015-1716, CVE-2013-1287, CVE-2010-2563, CVE-2008-4036, CVE-2013-1267, CVE-2014-4113, CVE-2003-0907, CVE-2007-2224, CVE-2006-2373, CVE-2015-0006, CVE-2009-1808, CVE-2013-3175, CVE-2011-0033, CVE-2009-2653, CVE-2015-0011, CVE-2009-4313, CVE-2011-0086, CVE-2010-2553, CVE-2006-6723, CVE-2015-2369, CVE-2011-0041, CVE-2011-3397, CVE-2012-1528, CVE-2014-1767, CVE-2010-1887, CVE-2010-0818, CVE-2010-0234, CVE-2012-0181, CVE-2013-0077, CVE-2011-2005, CVE-2011-1968, CVE-2011-1875, CVE-2009-2528, CVE-2010-2740, CVE-2012-1865, CVE-2012-2529, CVE-2013-1272, CVE-2013-1269, CVE-2011-0671, CVE-2009-0078, CVE-2009-2507, CVE-2007-1211, CVE-2010-0024, CVE-2004-0840, CVE-2011-3401, CVE-2013-1340, CVE-2009-0232, CVE-2014-6355, CVE-2012-0175, CVE-2013-1252, CVE-2008-0087, CVE-2010-1886, CVE-2010-1891, CVE-2013-1250, CVE-2006-5758, CVE-2007-1765, CVE-2003-0904, CVE-2009-1928, CVE-2010-0485, CVE-2011-0675, CVE-2011-2011, CVE-2011-1233, CVE-2009-0083, CVE-2009-4210, CVE-2013-1253, CVE-2009-1511, CVE-2008-3465, CVE-2012-2553, CVE-2013-1259, CVE-2013-1341, CVE-2009-0085, CVE-2008-1456, CVE-2011-1236, CVE-2012-1864, CVE-2007-2237, CVE-2009-2501, CVE-2014-0318, CVE-2015-2416, CVE-2009-3677, CVE-2013-1313, CVE-2009-0230, CVE-2014-4076, CVE-2009-2493, CVE-2011-1970, CVE-2011-1229, CVE-2011-1884, CVE-2013-3869, CVE-2011-0677, CVE-2008-1457, CVE-2013-3899, CVE-2012-0005, CVE-2015-0003, CVE-2013-3918, CVE-2009-4311, CVE-2008-2251, CVE-2013-1334, CVE-2015-0014, CVE-2009-0234, CVE-2009-2516, CVE-2010-3227, CVE-2010-2741, CVE-2011-0087, CVE-2011-0667, CVE-2013-1343, CVE-2012-5362, CVE-2015-0004, CVE-2010-0819, CVE-2012-1866, CVE-2010-0237, CVE-2011-0089, CVE-2007-5133, CVE-2011-0654, CVE-2017-8487, CVE-2009-1545, CVE-2007-0066, CVE-2015-0060, CVE-2011-0043, CVE-2009-0087, CVE-2012-0009, CVE-2010-0028, CVE-2013-1248, CVE-2011-1264, CVE-2012-2527, CVE-2011-1886, CVE-2015-1726, CVE-2000-1218, CVE-2017-8461, CVE-2009-1922, CVE-2007-5348, CVE-2011-0088, CVE-2006-5586, CVE-2008-4114, CVE-2010-0238, CVE-2013-1249, CVE-2009-1920, CVE-2013-1295, CVE-2011-0672, CVE-2010-2550, CVE-2010-0250, CVE-2011-1870, CVE-2015-0089, CVE-2013-3865, CVE-2012-0217, CVE-2013-3879, CVE-2012-1868, CVE-2013-1291, CVE-2015-1701, CVE-2013-1344, CVE-2010-1735, CVE-2011-1239, CVE-2009-0089, CVE-2015-0075, CVE-2008-2249, CVE-2010-0027, CVE-2011-3406, CVE-2010-0252, CVE-2011-1984, CVE-2010-1734, CVE-2011-3408, CVE-2013-1277, CVE-2012-1848, CVE-2015-0095, CVE-2014-4971, CVE-2011-1226, CVE-2014-4064, CVE-2011-1967, CVE-2010-4669, CVE-2013-1257, CVE-2009-2502, CVE-2011-1880, CVE-2010-0487, CVE-2009-0119, CVE-2011-1225, CVE-2012-2556, CVE-2014-6324, CVE-2012-1870, CVE-2006-0005, CVE-2009-0082, CVE-2008-1436, CVE-2011-1242, CVE-2011-1249, CVE-2008-0083, CVE-2010-1895, CVE-2011-1238, CVE-2010-3939, CVE-2013-3129, CVE-2010-1885, CVE-2008-1451, CVE-2008-0088, CVE-2013-1265, CVE-2012-4786, CVE-2013-1271, CVE-2011-1885, CVE-2013-3863, CVE-2013-3661, CVE-2008-1454, CVE-2010-0020, CVE-2008-4038, CVE-2003-0813, CVE-2011-3402, CVE-2010-2566, CVE-2009-2511, CVE-2009-2513, CVE-2011-0670, CVE-2010-0719, CVE-2008-1440, CVE-2010-3144, CVE-2010-3963, CVE-2011-1883, CVE-2009-1544, CVE-2015-0015, CVE-2010-3941, CVE-2009-2503, CVE-2009-1127, CVE-2013-3167, CVE-2011-0034, CVE-2015-2364, CVE-2015-1637, CVE-2015-2360, CVE-2015-1721, CVE-2013-1285, CVE-2012-1853, CVE-2014-1814, CVE-2012-0149, CVE-2009-1546, CVE-2011-0662, CVE-2011-1876, CVE-2011-2003, CVE-2007-2228, CVE-2014-4115, CVE-2011-1874, CVE-2015-2370, CVE-2015-1676, CVE-2013-1256, CVE-2011-2014, CVE-2007-2219, CVE-2015-1680, CVE-2015-2387, CVE-2002-2132, CVE-2009-0235, CVE-2008-0015, CVE-2013-3864, CVE-2015-1768, CVE-2010-1689, CVE-2011-1869, CVE-2011-1237, CVE-2015-1679, CVE-2013-1300, CVE-2012-0002, CVE-2013-1286, CVE-2008-1083, CVE-2007-1537, CVE-2010-0236, CVE-2015-0081, CVE-2009-1925, CVE-2015-0090, CVE-2011-0039, CVE-2013-0810, CVE-2009-1923, CVE-2008-4250, CVE-2010-0480, CVE-2011-1243, CVE-2012-0151, CVE-2011-0673, CVE-2010-1896, CVE-2012-0154, CVE-2013-1278, CVE-2014-6317, CVE-2010-2743, CVE-2012-0159, CVE-2015-0008, CVE-2010-4562, CVE-2011-3400, CVE-2015-1725, CVE-2007-1912
heuristics/extracted_sars AGD_OPE.1, ASE_ECD.1, ADV_TDS.2, ATE_DPT.1, ADV_FSP.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ALC_CMC.3, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_IND.2, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, AGD_PRE.1, ALC_CMS.3 AGD_USR.1, ADV_HLD.2, ADV_FSP.2, AVA_MSU.2, ATE_DPT.1, ALC_DVS.1, ALC_LCD.1, ADV_IMP.1, ADV_RCR.1, ATE_IND.2, ADV_SPM.1, ALC_FLR.3, ATE_COV.2, ATE_FUN.1, AVA_SOF.1, ALC_TAT.1, AVA_VLA.2, ADV_LLD.1, AGD_ADM.1
heuristics/extracted_versions 1.02 2003
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0417
  • certification_date: 01.11.2013
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0417_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; - RICOH MP C3503 - RICOH MP C3003 - Ricoh MP C3003 - Ricoh MP C3003G - Ricoh MP C3503 - Ricoh MP C3503G - Savin MP C3003 - Savin MP C3003G - Savin MP C3503 - Savin MP C3503G - Lanier MP C3003 - Lanier MP C3003G - Lanier MP C3503 - Lanier MP C3503G - nashuatec MP C3003 - nashuatec MP C3503 - Rex-Rotary MP C3003 - Rex-Rotary MP C3503 - Gestetner MP C3003 - Gestetner MP C3503 - infotec MP C3003 - infotec MP C3503 TOE security functionality Same as above.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: imagio Security Card Type 9 (Japanese name) DataOverwriteSecurity Unit Type I (English name)
    • product_type: Software to overwrite data
    • report_link: https://www.ipa.go.jp/en/security/c0417_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0417_est.pdf
    • toe_version: 1.02m
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.12.2018
  • revalidations: [frozendict({'date': '2015-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0417_it3459_05.html'})]
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: imagio Security Card Type 91.02m
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0417_it3459.html
  • toe_overseas_name: DataOverwriteSecurity Unit Type I1.02m
maintenance_updates
pdf_data/report_filename c0417_erpt.pdf st_vid10184-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10184-2008
    • cert_item: Microsoft Windows Server 2003, Microsoft Windows XP Professional, and Microsoft Windows XP embedded
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0417-01: 1
    • Certification No. C0417: 1
  • US:
    • CCEVS-VR-VID10184-2008: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL 4 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.MODE: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 68
    • Microsoft Corporation: 2
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • X509:
    • X.509: 3
pdf_data/report_metadata
  • /CreationDate: D:20140204162732+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20140204162753+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 173623
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 24
  • /Author: Santosh Chokhani
  • /Company: Orion
  • /CreationDate: D:20080222120444-05'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20080222120502-05'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20080222170424
  • /Title: Validation Report
  • pdf_file_size_bytes: 222190
  • pdf_hyperlinks: http://www.cve.mitre.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename c0417_est.pdf st_vid10184-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 3: 4
    • EAL 4: 14
    • EAL 4 augmented: 5
    • EAL3: 2
    • EAL4: 21
    • EAL4 augmented: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT.1: 14
    • ACM_CAP.4: 24
    • ACM_SCP.2: 11
  • ADO:
    • ADO_DEL.2: 11
    • ADO_IGS.1: 10
  • ADV:
    • ADV_FSP.2: 14
    • ADV_HLD.2: 16
    • ADV_IMP.1: 11
    • ADV_LLD.1: 18
    • ADV_RCR.1: 8
    • ADV_SPM.1: 13
  • AGD:
    • AGD_ADM.1: 15
    • AGD_USR.1: 13
  • ALC:
    • ALC_DVS.1: 11
    • ALC_FLR.3: 25
    • ALC_LCD.1: 12
    • ALC_TAT.1: 13
  • ATE:
    • ATE_COV.2: 11
    • ATE_DPT.1: 9
    • ATE_FUN.1: 14
    • ATE_IND.2: 12
  • AVA:
    • AVA_MSU.2: 18
    • AVA_SOF.1: 11
    • AVA_VLA.2: 16
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_RIP: 5
    • FDP_RIP.1.1: 1
    • FDP_SIP: 1
    • FDP_SIP.1: 15
    • FDP_SIP.1.1: 2
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 14
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 13
    • FAU_SAR.3.1: 2
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 10
    • FAU_STG.3.1: 1
    • FAU_STG.4: 14
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXP.1: 1
    • FCS_CKM_EXP.2.2: 1
    • FCS_COP: 1
    • FCS_COP.1: 31
    • FCS_COP.1.1: 16
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.2: 37
    • FDP_ACC.2.1: 4
    • FDP_ACC.2.2: 4
    • FDP_ACF.1: 45
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 4
    • FDP_ACF.2: 2
    • FDP_IFC.1: 41
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 29
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_IFF.1.6: 3
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITT.1: 9
    • FDP_ITT.1.1: 1
    • FDP_RIP.2: 11
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 15
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 18
    • FIA_USB.1: 4
  • FMT:
    • FMT_MOF.1: 46
    • FMT_MOF.1.1: 4
    • FMT_MSA: 1
    • FMT_MSA.1: 73
    • FMT_MSA.1.1: 8
    • FMT_MSA.2: 9
    • FMT_MSA.3: 64
    • FMT_MSA.3.1: 7
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 141
    • FMT_MTD.1.1: 17
    • FMT_MTD.1.2: 1
    • FMT_MTD.2: 11
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_REV: 1
    • FMT_REV.1: 19
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SAE.1: 11
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 33
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMR.3: 8
    • FMT_SMR.3.1: 1
  • FPT:
    • FPT_AMT.1: 7
    • FPT_ITT.1: 6
    • FPT_ITT.3: 3
    • FPT_RPL: 1
    • FPT_RPL.1: 3
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_SEP: 2
    • FPT_SEP.1: 10
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 12
    • FPT_STM.1.1: 1
    • FPT_SUS: 3
    • FPT_TRC.1: 4
  • FRU:
    • FRU_RSA.1: 9
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_LSA.1: 1
    • FTA_MCS.1: 2
    • FTA_MSC.1: 1
    • FTA_SSL.1: 8
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 12
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
    • FTA_TRP.1: 1
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 11
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.MODE: 8
  • O:
    • O.OVERWRITE: 8
  • OE:
    • OE.MODE: 6
  • A:
    • A.CONNECT: 3
    • A.COOP: 5
    • A.LOCATE: 3
    • A.MANAGE: 2
    • A.NO_EVIL_ADM: 3
    • A.PEER: 3
    • A.PROTECT: 2
  • O:
    • O.ASSURANCE: 4
    • O.AUDITING: 8
    • O.AUDIT_: 1
    • O.AUDIT_PROTECTION: 4
    • O.AUTHORIZATION: 8
    • O.CREDEN: 4
    • O.DISCRETIONARY_ACCESS: 3
    • O.ENCRYPTED_DATA: 11
    • O.ENFORCEMENT: 9
    • O.FRAMEWORK: 5
    • O.INSTALL: 4
    • O.IPSEC: 13
    • O.LEGAL_WARNING: 4
    • O.LIMIT_AUTHORIZATION: 9
    • O.MANAGE: 7
    • O.MEDIATE: 9
    • O.OUTDATED_SW: 2
    • O.PARTIAL_RECOVERY: 8
    • O.PHYSICAL: 5
    • O.PROTECT: 9
    • O.RESIDUAL_INFORMATION: 8
    • O.SOFTWARE_PROTECT: 4
    • O.TRUSTED_PATH: 8
    • O.UPDATED_SW: 1
  • T:
    • T.ADDRESS_MASQUERADE: 4
    • T.ADMIN_ERROR: 4
    • T.AUDIT_COMPROMISE: 5
    • T.AUDIT_CORRUPT: 4
    • T.CONFIG_CORRUPT: 3
    • T.EAVESDROP: 4
    • T.LOST_DATA: 3
    • T.MALICIOUS_CODE_EXEC: 4
    • T.MASQUERADE: 3
    • T.OBJECTS_NOT_CLEAN: 4
    • T.OLD_SW: 3
    • T.POOR_DESIGN: 3
    • T.POOR_IMPLEMENTATION: 4
    • T.REPLAY: 4
    • T.SPOOF: 4
    • T.SYSACC: 4
    • T.TCPIP_ATTACK: 3
    • T.UNATTENDED_SESSION: 5
    • T.UNAUTH_ACCESS: 7
    • T.UNAUTH_MODIFICATION: 4
    • T.UNDETECTED_ACTIONS: 4
    • T.UNIDENTIFIED_ACTIONS: 8
    • T.USER_CORRUPT: 7
    • T.USER_CURRUPT: 1
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 1
  • Infineon:
    • Infineon: 1
  • Microsoft:
    • Microsoft: 51
    • Microsoft Corporation: 186
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
    • RC:
      • RC4: 2
  • DES:
    • 3DES:
      • 3DES: 12
    • DES:
      • DES: 18
  • constructions:
    • MAC:
      • HMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 17
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 21
      • SHA1: 2
    • SHA2:
      • SHA-256: 3
      • SHA-384: 3
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 11
  • TLS:
    • SSL:
      • SSL: 12
    • TLS:
      • TLS: 5
  • VPN:
    • VPN: 3
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 12
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • ECB:
    • ECB: 5
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 140: 5
    • FIPS 140-1: 6
    • FIPS 140-2: 5
    • FIPS 140-214: 1
    • FIPS 180-2: 1
    • FIPS 186-2: 2
    • FIPS 197: 2
    • FIPS 46-3: 3
  • PKCS:
    • PKCS#1: 2
    • PKCS#5: 7
  • RFC:
    • RFC 2617: 1
    • RFC 3739: 1
  • X509:
    • X.509: 3
    • x.509: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20140131135801+09'00'
  • /Creator: CubePDF
  • /Keywords:
  • /ModDate: D:20140131135802+09'00'
  • /Producer: GPL Ghostscript 9.06; modified using iText® 5.3.2 ©2000-2012 1T3XT BVBA (AGPL-version)
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 153617
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
  • /Author: SAIC
  • /Company: SAIC
  • /CreationDate: D:20080222121234-05'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20080222121818-05'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20080222171054
  • /Title: Windows 2003/XP Security Target
  • pdf_file_size_bytes: 1878359
  • pdf_hyperlinks: mailto:[email protected], http://creativecommons.org/licenses/by-nd-nc/1.0/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 183
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different