Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Vertiv Secure KVM and Matrix models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165
CCEVS-VR-VID-10987-2019
RICOH IM C3510/C3010/C2510/C2010with FAX Unit Type M52 and HDD Option Type M52,RICOH IM C3510F/C3010F/C2510F/C2010Fwith HDD Option Type M52J-1.01
JISEC-CC-CRP-C0799-01-2023
name Vertiv Secure KVM and Matrix models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165 RICOH IM C3510/C3010/C2510/C2010with FAX Unit Type M52 and HDD Option Type M52,RICOH IM C3510F/C3010F/C2510F/C2010Fwith HDD Option Type M52J-1.01
category Other Devices and Systems Multi-Function Devices
scheme US JP
status archived active
not_valid_after 01.08.2021 16.11.2028
not_valid_before 01.08.2019 16.11.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10987-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0799_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10987-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0799_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10987-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0799_est.pdf
manufacturer Vertiv Ricoh Company, Ltd.
manufacturer_web https://www.vertivco.com https://www.ricoh.com/
security_level {} EAL2, ALC_FLR.2
dgst 327e1793402c8dab 344df4a447c825d7
heuristics/cert_id CCEVS-VR-VID-10987-2019 JISEC-CC-CRP-C0799-01-2023
heuristics/cert_lab US []
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 1.01
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 01.08.2019
  • evaluation_facility: DXC.technology
  • expiration_date: 01.08.2021
  • id: CCEVS-VR-VID10987
  • product: Vertiv Secure KVM and Matrix models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10987
  • vendor: Vertiv IT Systems
  • cert_id: JISEC-CC-CRP-C0799
  • certification_date: 01.11.2023
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0799
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/kcrmqo0000000p3s-att/c0799_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. TOE security functionality The TOE provides the following security functions: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc., Evaluation Center
    • product: RICOH IM C3510/C3010/C2510/C2010 with FAX Unit Type M52 and HDD Option Type M52, RICOH IM C3510F/C3010F/C2510F/C2010F with HDD Option Type M52
    • product_type: Multifunction Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/kcrmqo0000000p3s-att/c0799_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/kcrmqo0000000p3s-att/c0799_est.pdf
    • toe_version: J-1.01
    • vendor: RICOH COMPANY, LTD.
  • expiration_date:
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0799_it2832.html
  • toe_japan_name: RICOH IM C3510 / C3010 / C2510 / C2010 with FAX Unit Type M52 and HDD Option Type M52, RICOH IM C3510F / C3010F / C2510F / C2010F with HDD Option Type M52 J-1.01
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles da2e45c9b3fbb700 43ce79b420f23a00
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf
pdf_data/cert_filename st_vid10987-ci.pdf c0799_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10987-2019: 1
  • JP:
    • JISEC-CC-CRP-C0799-01-2023: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
pdf_data/cert_metadata
  • /CreationDate: D:20190815123628-04'00'
  • /ModDate: D:20190815123628-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181955
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate: D:20231227165313+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20231227165412+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20231227074910
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 235879
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid10987-vr.pdf c0799_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10987-2019
    • cert_item: Vertiv Secure KVM Models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, SC8165
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10987-2019: 1
  • JP:
    • JISEC-CC-CRP-C0799-01-2023: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_VAN.1: 1
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFF.1: 2
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 2
  • FMT:
    • FMT_MOF.1.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.ANTI_TAMPERING: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRI: 1
    • O.ANTI_TAMPERING_BACKUP_POWER: 1
    • O.ANTI_TAMPERING_INDICATION: 1
    • O.ANTI_TAMPERING_PERMANENTLY_D: 1
    • O.AUTHORIZED_SWITCHING: 1
    • O.COMPUTER_INTERFACE_ISOLATION: 1
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_TO_AUDIO_ISOLATION: 1
    • O.CONTINUOUS_INDICATION: 1
    • O.DISABLE_UNAUTHORIZED_ENDPOINT: 1
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 1
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 1
    • O.KEYBOARD_MOUSE_EMULATED: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.NO_AMBIGUOUS_CONTROL: 1
    • O.NO_ANALOG_AUDIO_INPUT: 1
    • O.NO_CONNECTED_COMPUTER_CONTR: 1
    • O.NO_DOCKING_PROTOCOLS: 1
    • O.NO_OTHER_EXTERNAL_INTERFACES: 1
    • O.NO_TOE_ACCESS: 1
    • O.NO_USER_DATA_RETENTION: 1
    • O.PERIPHERAL_PORTS_ISOLATION: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.SELF_TEST: 1
    • O.SELF_TEST_FAIL_INDICATION: 1
    • O.SELF_TEST_FAIL_TOE_DISABLE: 1
    • O.TAMPER_EVIDENT_LABEL: 1
    • O.UNIDIRECTIONAL_AUDIO_OUT: 1
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_AUTHENTICATION_ADMIN: 1
    • O.USER_AUTHENTICATION_ISOLATION: 1
    • O.USER_AUTHENTICATION_RESET: 1
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 1
  • OE:
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_SWITCHING: 1
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 3
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • DXC:
    • DXC Technology: 5
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 3
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 5
      • TLS 1.2: 3
      • TLS 1.3: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_metadata
  • /CreationDate: D:20190815120007-04'00'
  • /ModDate: D:20190815120007-04'00'
  • pdf_file_size_bytes: 962935
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
  • /Author:
  • /Company:
  • /CreationDate: D:20240122141936+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /Manager:
  • /ModDate: D:20240122142027+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240119062831
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 623221
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 34
pdf_data/st_filename st_vid10987-st.pdf c0799_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 79
    • FDP_IFC.1.1: 2
    • FDP_IFF: 2
    • FDP_IFF.1: 87
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 14
    • FDP_RIP: 1
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 3
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 2
    • FMT_MSA: 1
    • FMT_MSA.3: 12
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 16
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT: 1
    • FTA_ATH_EXT.1: 11
    • FTA_ATH_EXT.1.1: 2
    • FTA_CIN_EXT: 6
    • FTA_CIN_EXT.1: 9
    • FTA_CIN_EXT.1.1: 2
    • FTA_SSL.4: 1
    • FTA_TAB.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 28
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 26
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 23
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 26
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 23
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 16
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 25
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 31
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 10
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 2
    • A.NO_TEMPEST: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ANTI_TAMPERING: 8
    • O.ANTI_TAMPERING_BACKUP_FAIL_T: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TR: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG: 2
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 2
    • O.ANTI_TAMPERING_BACKUP_POWER: 7
    • O.ANTI_TAMPERING_INDICATION: 7
    • O.ANTI_TAMPERING_PERMANENTLY_: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISA: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISAB: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_SWITCHING: 7
    • O.COMPUTER_INTERFACE_ISOLATION: 11
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TO: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE: 2
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 4
    • O.COMPUTER_TO_AUDIO_ISOLATION: 7
    • O.CONTINUOUS_INDICATION: 7
    • O.DISABLE_UNAUTHORIZED_ENDPOIN: 2
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 5
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 2
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 5
    • O.DISPLAYPORT_AUX_FILTERING: 2
    • O.KEYBOARD_AND_MOUSE_TIED: 7
    • O.KEYBOARD_MOUSE_EMULATED: 7
    • O.KEYBOARD_MOUSE_UNIDIRECTION: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 7
    • O.NO_ANALOG_AUDIO_INPUT: 8
    • O.NO_CONNECTED_COMPUTER_CONT: 2
    • O.NO_CONNECTED_COMPUTER_CONTRO: 1
    • O.NO_CONNECTED_COMPUTER_CONTROL: 4
    • O.NO_DOCKING_PROTOCOLS: 7
    • O.NO_OTHER_EXTERNAL_INTERFACES: 10
    • O.NO_TOE_ACCESS: 8
    • O.NO_USER_DATA_RETENTION: 9
    • O.PERIPHERAL_PORTS_ISOLATION: 12
    • O.PURGE_TOE: 3
    • O.PURGE_TOE_KB_DATA_WHILE_SWI: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHI: 2
    • O.SELF_TEST: 9
    • O.SELF_TEST_FAIL_INDICATION: 7
    • O.SELF_TEST_FAIL_TOE_DISABLE: 9
    • O.TAMPER_EVIDENT_LABEL: 8
    • O.UNIDIRECTIONAL_AUDIO_OUT: 7
    • O.UNIDIRECTIONAL_VIDEO: 7
    • O.UNIDIRERCTIONAL_EDID: 7
    • O.USER_AUTHENTICATION_ADMIN: 7
    • O.USER_AUTHENTICATION_ISOLATION: 7
    • O.USER_AUTHENTICATION_RESET: 11
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 9
  • OE:
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 6
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 3
    • T.FAILED: 2
    • T.LOGICAL_TAMPER: 3
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 3
    • T.RESIDUAL_LEAK: 3
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVIC: 1
    • T.UNAUTHORIZED_DEVICES: 2
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 5
  • D:
    • D.CONF: 4
    • D.DOC: 19
    • D.FUNC: 13
    • D.PROT: 4
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 10
    • O.SOFTWARE: 9
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 4
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 20
  • T:
    • T.CONF: 10
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • djb:
    • ChaCha:
      • ChaCha20: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 2
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 9
  • TLS:
    • SSL:
      • SSL: 4
    • TLS:
      • TLS: 9
      • TLS1.2: 2
      • TLS1.3: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • physical tampering: 14
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_metadata
  • /Author: 株式会社リコー
  • /CreationDate: D:20240119175537+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240119175537+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: RICOH IM C3510/C3010/C2510/C2010 with FAX Unit Type M52 and HDD Option Type M52, RICOH IM C3510F/C3010F/C2510F/C2010F with HDD Option Type M52
  • pdf_file_size_bytes: 1357783
  • pdf_hyperlinks: https://support.ricoh.com/services/device/ccmanual/IM_C3510_C3010_C2510_C2010/ja/Guidance_ja.zip
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 95
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different