Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RICOH IM C6000/C5500/C4500 Version: J-1.01
JISEC-CC-CRP-C0635-01-2019
Carte Upteq NFC 2.0.4_OFM release B sur composant ST33F1ME (T1020364, release B)
ANSSI-CC-2013/28
name RICOH IM C6000/C5500/C4500 Version: J-1.01 Carte Upteq NFC 2.0.4_OFM release B sur composant ST33F1ME (T1020364, release B)
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 27.03.2024 01.09.2019
not_valid_before 27.03.2019 29.05.2013
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0635_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0635_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-28fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0635_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-28en.pdf
manufacturer Ricoh Company, Ltd. Gemalto / STMicroelectronics
manufacturer_web https://www.ricoh.com/ https://www.gemalto.com/
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL4+, AVA_VAN.5
dgst 2fb6a8cc9217ea02 3dcf00d5f9878043
heuristics/cert_id JISEC-CC-CRP-C0635-01-2019 ANSSI-CC-2013/28
heuristics/cert_lab [] THALES
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1
heuristics/extracted_versions 1.01 2.0.4
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2014/56, ANSSI-CC-2013/27
heuristics/report_references/directly_referencing {} ANSSI-CC-2011/07, ANSSI-CC-2012/48
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2014/56, ANSSI-CC-2013/27, ANSSI-CC-2014/83, ANSSI-CC-2014/96
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2010/49, ANSSI-CC-2011/17, ANSSI-CC-2012/48, ANSSI-CC-2011/07, ANSSI-CC-2011/77, ANSSI-CC-2010/50
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0635
  • certification_date: 01.03.2019
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0635
    • cert_link: https://www.ipa.go.jp/en/security/c0635_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH IM C6000/C5500/C4500
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0635_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0635_est.pdf
    • toe_version: J-1.01
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.04.2024
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0635_it8683.html
  • toe_japan_name: RICOH IM C6000/C5500/C4500J-1.01
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles 43ce79b420f23a00 7b81fd67c02d34de
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-04en.pdf
pdf_data/cert_filename c0635_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0635-01-2019: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20190422140017+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190422140250+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 167221
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename c0635_erpt.pdf ANSSI-CC_2013-28fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmenté ALC_DVS.2 et AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2013/28
    • cert_item: Carte Upteq NFC 2.0.4_OFM release B sur composant ST33F1ME (T1020364, release B
    • cert_item_version: Plateforme Upteq NFC 2.0.4_OFM release B sur composant ST33F1ME (S1121881, release B
    • cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
    • developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit \\(référence/version\\)(.+)Nom de la TOE \\(référence/version\\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PPUSIMB], version 2.0.2 (U)SIM Java Card Platform Protection Profile - Basic configuration
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0635-01-2019: 1
  • FR:
    • ANSSI-CC-2011/07: 4
    • ANSSI-CC-2011/07-S01: 1
    • ANSSI-CC-2012/48: 2
    • ANSSI-CC-2013/28: 20
    • ANSSI-CC-PP-2010/04: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/04: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Gemalto:
    • Gemalto: 7
  • Morpho:
    • Morpho: 1
  • STMicroelectronics:
    • STMicroelectronics: 2
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
  • Neslib:
    • NesLib v3.0: 2
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_metadata
  • /CreationDate: D:20190610141722+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190610143710+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 542098
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
  • /CreationDate:
  • /CreationDate--Text:
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate:
  • /ModDate--Text:
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 320571
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename c0635_est.pdf ANSSI-CC-cible_2013-28en.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1: 1
    • CC-2: 4
    • CC-3: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-2007-0035: 2
  • other:
    • PP-SSCD: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 1
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 6
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 9
    • ADV_IMP.1: 5
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 9
  • AGD:
    • AGD_ADM: 1
    • AGD_OPE.1: 10
    • AGD_PRE.1: 6
    • AGD_USR: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 9
    • ALC_LCD.1: 3
    • ALC_TAT.1: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 18
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_ARP.1: 17
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 3
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 14
    • FCO_NRO.2: 8
  • FCS:
    • FCS_CKM: 73
    • FCS_CKM.1: 23
    • FCS_CKM.2: 7
    • FCS_CKM.3: 4
    • FCS_CKM.4: 45
    • FCS_CKM.4.1: 1
    • FCS_COP: 59
    • FCS_COP.1: 18
    • FCS_RND: 2
    • FCS_RND.1: 9
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 48
    • FDP_ACC.1: 22
    • FDP_ACC.2: 8
    • FDP_ACF: 38
    • FDP_ACF.1: 25
    • FDP_IFC: 46
    • FDP_IFC.1: 26
    • FDP_IFC.2: 4
    • FDP_IFF: 40
    • FDP_IFF.1: 28
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.4: 1
    • FDP_ITC: 20
    • FDP_ITC.1: 19
    • FDP_ITC.2: 33
    • FDP_ITT.1: 1
    • FDP_RIP: 116
    • FDP_RIP.1: 10
    • FDP_ROL: 21
    • FDP_ROL.1: 7
    • FDP_SDI: 6
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 12
    • FDP_UIT.1: 4
  • FIA:
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UAU: 18
    • FIA_UAU.1: 2
    • FIA_UAU.4: 1
    • FIA_UID: 33
    • FIA_UID.1: 16
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 2
    • FMT_LIM.2: 1
    • FMT_MOF: 6
    • FMT_MOF.1: 1
    • FMT_MSA: 173
    • FMT_MSA.1: 18
    • FMT_MSA.2: 2
    • FMT_MSA.3: 27
    • FMT_MSA.3.1: 2
    • FMT_MTD: 26
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_REV: 8
    • FMT_REV.1: 4
    • FMT_SMF: 68
    • FMT_SMF.1: 30
    • FMT_SMF.1.1: 1
    • FMT_SMR: 75
    • FMT_SMR.1: 48
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 11
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 61
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT: 12
    • FPT_ITT.1: 3
    • FPT_PHP.3: 1
    • FPT_RCV: 22
    • FPT_RCV.3: 12
    • FPT_RCV.4: 2
    • FPT_TDC.1: 10
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 1
    • FPT_UNO: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 24
    • FTP_ITC.1: 10
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
  • A:
    • A.APPLET: 5
    • A.APPS-PROVIDER: 4
    • A.CONTROLLING-: 2
    • A.CONTROLLING-AUTHORITY: 2
    • A.DELETION: 2
    • A.KEY-ESCROW: 5
    • A.MOBILE-OPERATOR: 4
    • A.OTA-ADMIN: 4
    • A.PERSONALIZER: 4
    • A.PRODUCTION: 4
    • A.VERIFICATION: 4
    • A.VERIFICATION-: 2
    • A.VERIFICATION-AUTHORITY: 2
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 8
    • D.APP_C_DATA: 5
    • D.APP_I_DATA: 6
    • D.APSD_KEYS: 3
    • D.CARD_MNGT_DATA: 3
    • D.CASD_KEYS: 3
    • D.CRYPTO: 4
    • D.GP_CODE: 1
    • D.ISD_KEYS: 3
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.OPTIONAL_PF_SERVICE: 2
    • D.PIN: 4
    • D.SEC_DATA: 7
    • D.VASD_KEYS: 2
  • O:
    • O.ALARM: 21
    • O.APPLET: 21
    • O.APPLI-: 1
    • O.APPLI-AUTH: 10
    • O.CARD-: 5
    • O.CARD-MANAGEMENT: 49
    • O.CARD_MANAGEMENT: 2
    • O.CIPHER: 25
    • O.CODE_PKG: 14
    • O.COMM_AUTH: 16
    • O.COMM_CONFIDENTIALITY: 13
    • O.COMM_INTEGRITY: 16
    • O.DELETION: 15
    • O.DOMAIN-: 9
    • O.DOMAIN-RIGHTS: 19
    • O.FIREWALL: 52
    • O.GLOBAL_ARRAYS_CONFID: 18
    • O.GLOBAL_ARRAYS_INTEG: 11
    • O.INSTALL: 16
    • O.JAVAOBJECT: 41
    • O.KEY-: 2
    • O.KEY-MNGT: 33
    • O.LOAD: 16
    • O.NATIVE: 13
    • O.OBJ-DELETION: 8
    • O.OPERATE: 36
    • O.PIN-: 7
    • O.PIN-MNGT: 15
    • O.REALLOCATION: 16
    • O.REMOTE: 15
    • O.REMOTE_MTHD: 6
    • O.REMOTE_OBJ: 10
    • O.REMOTE_SERVICE_ACTIVATION: 11
    • O.REMOTE_SERVICE_AUDIT: 11
    • O.RESOURCES: 26
    • O.RMI_SERVICE: 12
    • O.RND: 10
    • O.ROR: 5
    • O.SCP: 28
    • O.SCP-: 3
    • O.SCP-SUPPORT: 19
    • O.SID: 36
    • O.TRANSACTION: 19
  • OE:
    • OE.ACTIVATION-: 1
    • OE.ACTIVATION-KEY-ESCROW: 6
    • OE.AID-MANAGEMENT: 6
    • OE.AP-KEYS: 6
    • OE.APPLET: 9
    • OE.APPS-PROVIDER: 6
    • OE.BASIC-: 4
    • OE.BASIC-APPS-: 6
    • OE.BASIC-APPS-VALIDATION: 16
    • OE.CA-KEYS: 8
    • OE.CARD_MANAGEMENT: 2
    • OE.CONTROLLING-: 1
    • OE.CONTROLLING-AUTHORITY: 5
    • OE.GEMACTIVATE-ADMIN: 5
    • OE.KEY-CHANGE: 7
    • OE.KEY-ESCROW: 7
    • OE.KEY-GENERATION: 4
    • OE.MOBILE-OPERATOR: 6
    • OE.OPERATOR-KEYS: 6
    • OE.OTA-ADMIN: 4
    • OE.OTA-LOADING: 4
    • OE.OTA-SERVERS: 6
    • OE.PERSONALIZER: 4
    • OE.PRODUCTION: 5
    • OE.QUOTAS: 6
    • OE.SCP: 3
    • OE.SECURE-APPS-CERTIFICATION: 4
    • OE.SECURITY-DOMAINS: 4
    • OE.SHARE-CONTROL: 6
    • OE.TRUSTED-APPS-DEVELOPER: 7
    • OE.TRUSTED-APPS-PRE-ISSUANCE: 5
    • OE.VA-KEYS: 7
    • OE.VERIFICATION: 34
    • OE.VERIFICATION-: 1
    • OE.VERIFICATION-AUTHORITY: 3
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 3
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.INVOKE: 3
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.RET_RORD: 3
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.ACTIVATION-KEY-ESCROW: 5
    • OSP.AID-MANAGEMENT: 4
    • OSP.APSD-KEYS: 4
    • OSP.BASIC-: 1
    • OSP.BASIC-APPS-VALIDATION: 3
    • OSP.CASD-KEYS: 4
    • OSP.KEY-CHANGE: 4
    • OSP.KEY-GENERATION: 4
    • OSP.OPERATOR-KEYS: 4
    • OSP.OTA-LOADING: 4
    • OSP.OTA-SERVERS: 4
    • OSP.QUOTAS: 4
    • OSP.RNG: 5
    • OSP.SECURE-APPS-: 2
    • OSP.SECURE-APPS-CERTIFICATION: 2
    • OSP.SECURITY-DOMAINS: 4
    • OSP.SERVICE: 1
    • OSP.SERVICE_AUDIT: 4
    • OSP.SHARE-CONTROL: 4
    • OSP.TRUSTED-: 1
    • OSP.TRUSTED-APPS-DEVELOPER: 5
    • OSP.TRUSTED-APPS-PRE-: 2
    • OSP.TRUSTED-APPS-PRE-ISSUANCE: 2
    • OSP.VASD-KEYS: 4
    • OSP.VERIFICATION: 5
  • R:
    • R.JAVA: 11
  • T:
    • T.COM_EXPLOIT: 6
    • T.CONFID-APPLI-DATA: 18
    • T.CONFID-JCS-: 9
    • T.CONFID-JCS-CODE: 5
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 7
    • T.EXE-: 1
    • T.EXE-CODE: 11
    • T.EXE-CODE-REMOTE: 4
    • T.INSTALL: 6
    • T.INTEG-: 10
    • T.INTEG-APPLI-: 7
    • T.INTEG-APPLI-CODE: 9
    • T.INTEG-APPLI-DATA: 16
    • T.INTEG-JCS-CODE: 7
    • T.INTEG-JCS-DATA: 6
    • T.INTEG-USER-DATA: 9
    • T.LIFE_CYCLE: 6
    • T.NATIVE: 7
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 5
    • T.RESOURCES: 8
    • T.SID: 18
    • T.UNAUTHORIZED_ACCESS: 4
    • T.UNAUTHORIZED_ACCESS_TO_SERVIC: 1
    • T.UNAUTHORIZED_ACCESS_TO_SERVICE: 5
    • T.UNAUTHORIZED_CARD_MNGT: 9
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 199
  • Morpho:
    • Morpho: 2
  • STMicroelectronics:
    • STMicroelectronics: 3
pdf_data/st_keywords/eval_facility
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • TDES: 5
    • DES:
      • DES: 16
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-2: 3
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 3
      • SHA2: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 21
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS1.0: 1
      • TLS1.1: 1
      • TLS1.2: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 10
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 8
  • ECB:
    • ECB: 4
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • Nescrypt: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • fault induction: 2
    • malfunction: 3
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • physical probing: 1
  • other:
    • JIL: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
  • CC:
    • CCIMB-2009-07-001: 1
    • CCIMB-2009-07-002: 1
    • CCIMB-2009-07-003: 1
    • CCIMB-2009-07-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-2: 1
    • FIPS 180-3: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 3
    • FIPS PUB 81: 4
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 5
    • PKCS #5: 1
    • PKCS#1: 3
    • PKCS#5: 1
  • RFC:
    • RFC2085: 1
    • RFC2104: 1
  • SCP:
    • SCP 01: 1
    • SCP 02: 1
    • SCP 80: 1
    • SCP02: 5
    • SCP80: 8
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 1
    • Global Platform 2.2.2: 1
  • JavaCard:
    • Java Card 2.2.2: 2
    • Java Card 3.0.1: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 2
  • javacard:
    • javacard.framework: 2
    • javacard.framework.service: 1
    • javacard.security: 2
  • javacardx:
    • javacardx.crypto: 10
    • javacardx.rmi: 1
    • javacardx.security: 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP-SUPPORT are: 1
    • out of scope: 2
    • parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [USR] for details. JCS.EraseResidualData The security function ensures that: 1
pdf_data/st_metadata
  • /Author: RICOH
  • /CreationDate: D:20190322160717+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20190322160717+09'00'
  • /Producer: Microsoft® Word for Office 365
  • /Title: RICOH IM C6000/C5500/C4500 Security Target
  • pdf_file_size_bytes: 1093265
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
  • /CreationDate: D:20121001120716+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130711165213+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title:
  • pdf_file_size_bytes: 2345844
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 177
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different