Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Ricoh Aficio MP C4502/C4502G/C5502/C5502G, Savin MP C4502/C4502G/C5502/C5502G, Lanier MP C4502/C4502G/C5502/C5502G, nashuatec MP C4502/C5502, Rex-Rotary MP C4502/C5502, Gestetner MP C4502/C5502, infotec MP C4502/C5502 all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03
JISEC-CC-CRP-C0357
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
CCEVS-VR-VID-10443-2012
name Ricoh Aficio MP C4502/C4502G/C5502/C5502G, Savin MP C4502/C4502G/C5502/C5502G, Lanier MP C4502/C4502G/C5502/C5502G, nashuatec MP C4502/C5502, Rex-Rotary MP C4502/C5502, Gestetner MP C4502/C5502, infotec MP C4502/C5502 all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
category Multi-Function Devices Detection Devices and Systems
not_valid_before 2012-06-14 2012-10-01
not_valid_after 2017-02-07 2014-11-01
scheme JP US
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0357_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf
manufacturer Ricoh Company, Ltd. Tenable Network Security, Inc.
manufacturer_web https://www.ricoh.com/ https://www.tenable.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0357_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile Intrusion Detection System - System for Basic Robustness Environme...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf', 'pp_ids': None})
state/report/pdf_hash 2d8d0bdbf7a0170537f1d51c6a4d7315a18940d96276f4a5b2ff474dd31f181e 6bbe4e39fb1e3e1496edb10118d6519fe521fc80f7080eb44d7404caa0dbfbb4
state/report/txt_hash 2315884227b94f62807e17753bde2b800495b8da37fd28b85419e2bdd3ecd960 0cc9c7cf65c4283fa42658cbdbdf224629263190e3e25cbfe0a0fd5d7e8152ce
state/st/pdf_hash 384621fd81065a70b9abb99cb7800ab2694aeb05ff8e0a0498759ffc3686d978 3b767d5258133c0eb3601092a8cf7081b94bf08c654a872c21fb6c7e48566775
state/st/txt_hash 00bdc81a4fefd99944e480523af52e908a2682d3860e2444e7638be9e53d941d ac95bdcc32b3b1fa5fb3cb004f461c884649a1e12a831f99e30019259a8b5792
heuristics/cert_id JISEC-CC-CRP-C0357 CCEVS-VR-VID-10443-2012
heuristics/cert_lab None US
heuristics/cpe_matches None cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:*
heuristics/extracted_versions 0.16, 1.07, 1.01, 01.00.04, 02.00.00, 11.77, 1.05.4, 1.06, 1.04, 1.03, 3.5, 01.09, 1.00, 1.05.1 5.0.1, 2.0.1, 4.4, 2.1, 3.6
heuristics/related_cves None CVE-2018-1141, CVE-2022-22827, CVE-2017-18214, CVE-2017-5179, CVE-2018-20843, CVE-2022-22824, CVE-2016-1000029, CVE-2022-23852, CVE-2020-5774, CVE-2019-3923, CVE-2024-0971, CVE-2018-1148, CVE-2022-28291, CVE-2021-20079, CVE-2022-22825, CVE-2023-6062, CVE-2022-32973, CVE-2019-3962, CVE-2023-3252, CVE-2021-3449, CVE-2023-3251, CVE-2021-3450, CVE-2018-5407, CVE-2021-20106, CVE-2021-46143, CVE-2022-33757, CVE-2016-9260, CVE-2020-5765, CVE-2022-22826, CVE-2022-22822, CVE-2022-23990, CVE-2019-3982, CVE-2016-4055, CVE-2019-3961, CVE-2022-0778, CVE-2019-1559, CVE-2022-22823, CVE-2021-45960, CVE-2023-3253, CVE-2022-3499, CVE-2024-0955, CVE-2023-6178, CVE-2022-4313, CVE-2018-1147, CVE-2021-20135, CVE-2022-32974, CVE-2016-1000028
heuristics/scheme_data
  • cert_id: C0357
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: Ricoh Aficio MP C4502/C4502G/C5502/C5502G, Savin MP C4502/C4502G/C5502/C5502G, Lanier MP C4502/C4502G/C5502/C5502G, nashuatec MP C4502/C5502, Rex-Rotary MP C4502/C5502, Gestetner MP C4502/C5502, infotec MP C4502/C5502 all of above with Facsimile Function - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, < Cont. >
  • expiration_date: 2017-02
  • claim: EAL3+ ALC_FLR.2 PP
  • certification_date: 2012-06
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0357_it1375.html
  • toe_japan_name: -----
  • enhanced:
    • product: Ricoh Aficio MP C4502/C4502G/C5502/C5502G, Savin MP C4502/C4502G/C5502/C5502G, Lanier MP C4502/C4502G/C5502/C5502G, nashuatec MP C4502/C5502, Rex-Rotary MP C4502/C5502, Gestetner MP C4502/C5502, infotec MP C4502/C5502 all of above with Facsimile Function
    • toe_version: -Software: System/Copy 1.05.4 Network Support 11.77 Fax 02.00.00 RemoteFax 02.00.00 NetworkDocBox 1.04 Web Support 1.07 Web Uapl 1.03 animation 1.00 Scanner 01.09 Printer 1.05.1 PCL 1.07 PCL Font 1.06 Data Erase Onb 1.01x GWFCU3.5-4(WW) 01.00.04 Engine 0.16:04 OpePanel 1.04 LANG0 1.03 LANG1 1.03 -Hardware: Ic Key 01020700 Ic Ctlr 03
    • product_type: Multi Function Product
    • certification_date: 2012-06-14
    • cc_version: 3.1
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • protection_profile: IEEE Std 2600.1-2009
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0357_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0357_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0357_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: Log Correlation Engine 6.0.6
  • id: CCEVS-VR-VID11065
  • url: https://www.niap-ccevs.org/product/11065
  • certification_date: 2020-12-08T00:00:00Z
  • expiration_date: 2022-12-08T00:00:00Z
  • category: Application Software
  • vendor: Tenable, Inc
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • scheme: US
heuristics/scheme_data/certification_date 2012-06 2020-12-08T00:00:00Z
heuristics/scheme_data/expiration_date 2017-02 2022-12-08T00:00:00Z
pdf_data/report_filename c0357_erpt.pdf st_vid10443-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10443-2012
    • cert_item: Tenable SecurityCenter 4 and Components
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0357-01: 1
    • Certification No. C0357: 1
  • US:
    • CCEVS-VR-VID10443-2012: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.WKSTN: 1
  • A.OS: 1
  • A.LOCATE: 1
  • A.PROTCT: 1
  • A.MANAGE: 1
  • A.NOEVIL: 1
  • A.NOTRST: 1
  • A.ACCESS: 1
  • A.ASCOPE: 1
  • A.DYNMIC: 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 2
  • T.FUNC: 1
  • T.PROT: 1
  • T.CONF: 2
  • T.COMINT: 1
  • T.COMDIS: 1
  • T.LOSSOF: 1
  • T.NOHALT: 1
  • T.PRIVIL: 1
  • T.IMPCON: 1
  • T.INFLUX: 1
  • T.FACCNT: 1
  • T.SCNCFG: 1
  • T.SCNMLC: 1
  • T.SCNVUL: 1
  • T.FALACT: 1
  • T.FALREC: 1
  • T.FALASC: 1
  • T.MISUSE: 1
  • T.INADVE: 1
  • T.MISACT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.2 4 5
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 1
  • EAL 2: 4
  • EAL 4: 1
  • EAL2: 1
  • EAL2+: 3
  • EAL 2 augmented: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
  • IPsec:
    • IPsec: 5
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/crypto_protocol/TLS/SSL/SSL 3 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 387703
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 39
  • /CreationDate: D:20120719145231+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20120719145313+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 441073
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
  • /Title: Validation Report for IronPort Messaging Gateway
  • /Author: Evaluation Team
  • /Subject: Validator Report
  • /Keywords: VR
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20121024103543
  • /ModDate: D:20121024103543
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20120719145231+09'00' D:20121024103543
pdf_data/report_metadata//Creator Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/report_metadata//ModDate D:20120719145313+09'00' D:20121024103543
pdf_data/report_metadata//Producer Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/report_metadata/pdf_file_size_bytes 387703 441073
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 39 25
pdf_data/st_filename c0357_est.pdf st_vid10443-st.pdf
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 5
  • A.USER: 4
  • A.ADMIN: 10
  • A.ACCESS: 3
  • A.ASCOPE: 3
  • A.DYNMIC: 3
  • A.LOCATE: 3
  • A.PROTCT: 3
  • A.MANAGE: 3
  • A.NOEVIL: 3
  • A.NOTRST: 3
pdf_data/st_keywords/cc_claims/A/A.ACCESS 5 3
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.PROTCT: 11
  • O.IDSCAN: 7
  • O.IDSENS: 7
  • O.IDANLZ: 5
  • O.RESPON: 5
  • O.EADMIN: 5
  • O.ACCESS: 12
  • O.IDAUTH: 20
  • O.OFLOWS: 6
  • O.AUDITS: 5
  • O.INTEGR: 7
  • O.EXPORT: 3
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 3
  • OE.AUDIT_ACCESS: 2
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 4
  • OE.USER: 21
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • OE.INSTAL: 7
  • OE.PHYCAL: 6
  • OE.CREDEN: 6
  • OE.TIME: 4
  • OE.INTROP: 5
  • OE.PERSON: 5
  • OE.AUDIT_PROTECTION: 4
  • OE.AUDIT_SORT: 2
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 10
  • T.FUNC: 5
  • T.PROT: 5
  • T.CONF: 10
  • T.COMINT: 3
  • T.COMDIS: 3
  • T.LOSSOF: 3
  • T.NOHALT: 3
  • T.PRIVIL: 3
  • T.IMPCON: 3
  • T.INFLUX: 3
  • T.FACCNT: 3
  • T.SCNCFG: 3
  • T.SCNMLC: 3
  • T.SCNVUL: 3
  • T.FALACT: 3
  • T.FALREC: 3
  • T.FALASC: 3
  • T.MISUSE: 3
  • T.INADVE: 3
  • T.MISACT: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.2: 3
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ADV:
    • ADV_ARC.1: 22
    • ADV_FSP.2: 12
    • ADV_TDS.1: 12
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 7
  • ALC:
    • ALC_FLR.2: 22
    • ALC_CMS.2: 8
    • ALC_DEL.1: 6
    • ALC_CMC.2: 8
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 9
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
  • ADV_ARC.1: 22
  • ADV_FSP.2: 12
  • ADV_TDS.1: 12
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 1 22
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 1 11
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 1 7
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
  • ALC_FLR.2: 22
  • ALC_CMS.2: 8
  • ALC_DEL.1: 6
  • ALC_CMC.2: 8
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 1 6
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 3 22
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 5
  • ATE_FUN.1: 9
  • ATE_IND.2: 8
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 9
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 8
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 2 8
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 1
  • EAL2: 9
  • EAL 2: 1
  • EAL2 augmented: 4
  • EAL 2 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_STG.1: 9
    • FAU_STG.4: 8
    • FAU_SAR.1: 10
    • FAU_SAR.2: 8
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_ACC.1: 31
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 9
    • FIA_UAU.7: 8
    • FIA_SOS.1: 10
    • FIA_UAU.1: 31
    • FIA_UID.1: 39
    • FIA_UAU.2: 12
    • FIA_UID.2: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMF.1: 22
    • FMT_SMR.1: 29
    • FMT_MSA.3: 23
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 8
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TST.1: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_SAR: 6
    • FAU_SEL: 2
    • FAU_STG: 4
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 5
    • FAU_SAR.2: 6
    • FAU_SEL.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG.2: 9
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
  • FIA:
    • FIA_UAU.2: 8
    • FIA_AFL: 2
    • FIA_ATD: 2
    • FIA_UAU: 2
    • FIA_UID: 2
    • FIA_UID.2: 7
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 1
    • FIA_UAU.1: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMR: 2
    • FMT_MOF.1: 7
    • FMT_MDT.1: 1
    • FMT_SMR.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 2
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_ITT.1: 9
    • FPT_ITT.1.1: 1
    • FPT_STM: 1
    • FPT_ITA.1: 2
    • FPT_ITC.1: 2
    • FPT_ITI.1: 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.1: 9
  • FAU_STG.4: 8
  • FAU_SAR.1: 10
  • FAU_SAR.2: 8
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_GEN: 2
  • FAU_SAR: 6
  • FAU_SEL: 2
  • FAU_STG: 4
  • FAU_GEN.1: 7
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_SAR.1: 5
  • FAU_SAR.2: 6
  • FAU_SEL.1: 5
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_SAR.3: 4
  • FAU_SAR.3.1: 1
  • FAU_SEL.1.1: 1
  • FAU_STG.2: 9
  • FAU_STG.2.1: 1
  • FAU_STG.2.2: 1
  • FAU_STG.2.3: 1
  • FAU_STG.4: 5
  • FAU_STG.4.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 12 7
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 5
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 8 6
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 5
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UAU.2: 8
  • FIA_AFL: 2
  • FIA_ATD: 2
  • FIA_UAU: 2
  • FIA_UID: 2
  • FIA_UID.2: 7
  • FIA_AFL.1: 2
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 4
  • FIA_ATD.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 1
  • FIA_UAU.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 9 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 8 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 31 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 12 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 39 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 13 7
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMF.1: 22
  • FMT_SMR.1: 29
  • FMT_MSA.3: 23
  • FMT_MSA.1: 20
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MOF: 2
  • FMT_MTD: 2
  • FMT_SMF: 2
  • FMT_SMR: 2
  • FMT_MOF.1: 7
  • FMT_MDT.1: 1
  • FMT_SMR.1: 5
  • FMT_MOF.1.1: 1
  • FMT_MTD.1: 7
  • FMT_MTD.1.1: 1
  • FMT_SMF.1: 9
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 12 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 29 5
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 8
  • FPT_FDI_EXP.1: 11
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1: 5
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_ITT: 2
  • FPT_STM.1: 6
  • FPT_STM.1.1: 1
  • FPT_ITT.1: 9
  • FPT_ITT.1.1: 1
  • FPT_STM: 1
  • FPT_ITA.1: 2
  • FPT_ITC.1: 2
  • FPT_ITI.1: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 9 6
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
  • SSH:
    • SSH: 18
  • TLS:
    • SSL:
      • SSL: 20
  • VPN:
    • VPN: 1
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL3.0: 1
  • TLS:
    • TLS1.0: 2
  • SSL:
    • SSL: 20
pdf_data/st_keywords/crypto_protocol/TLS/SSL
  • SSL3.0: 1
  • SSL: 20
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 1 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3DES: 6
pdf_data/st_metadata
  • pdf_file_size_bytes: 746225
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 94
  • /Producer: Nitro PDF PrimoPDF
  • /CreationDate: D:20120627142922-09'00'
  • /ModDate: D:20120627142922-09'00'
  • /Title: Microsoft Word - MP_C4502_ST_EXP_1.00_jp_ENG_0.01
  • /Creator: PrimoPDF http://www.primopdf.com
  • /Author: z00se00558
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1188447
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 59
  • /Author: ktodd
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20121024103427
  • /ModDate: D:20121024103427
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks: http://cve.mitre.org/, http://nvd.nist.gov/fdcc/download_fdcc.cfm, http://www.securityfocus.com/bid/
pdf_data/st_metadata//Author z00se00558 ktodd
pdf_data/st_metadata//CreationDate D:20120627142922-09'00' D:20121024103427
pdf_data/st_metadata//Creator PrimoPDF http://www.primopdf.com Microsoft® Office Word 2007
pdf_data/st_metadata//ModDate D:20120627142922-09'00' D:20121024103427
pdf_data/st_metadata//Producer Nitro PDF PrimoPDF Microsoft® Office Word 2007
pdf_data/st_metadata/pdf_file_size_bytes 746225 1188447
pdf_data/st_metadata/pdf_hyperlinks http://cve.mitre.org/, http://nvd.nist.gov/fdcc/download_fdcc.cfm, http://www.securityfocus.com/bid/
pdf_data/st_metadata/pdf_number_of_pages 94 59
dgst 2ab7f8ea0e4daf9a 7a9d9dd29e76bfba