Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

RICOH IM 350, nashuatec IM 350, Rex Rotary IM 350, Gestetner IM 350 E-1.00
JISEC-CC-CRP-C0642-01-2019
RICOH IM C4510/C4510A/C5510/C5510A/C6010,nashuatec IM C4510/C4510A/C5510/C5510A/C6010,Rex Rotary IM C4510/C4510A/C5510/C5510A/C6010,Gestetner IM C4510/C4510A/C5510/C5510A/C6010with Fax Option Type M52 and HDD OptionType M52 320GBE-1.01
JISEC-CC-CRP-C0798-01-2023
name RICOH IM 350, nashuatec IM 350, Rex Rotary IM 350, Gestetner IM 350 E-1.00 RICOH IM C4510/C4510A/C5510/C5510A/C6010,nashuatec IM C4510/C4510A/C5510/C5510A/C6010,Rex Rotary IM C4510/C4510A/C5510/C5510A/C6010,Gestetner IM C4510/C4510A/C5510/C5510A/C6010with Fax Option Type M52 and HDD OptionType M52 320GBE-1.01
not_valid_before 2019-06-17 2023-11-16
not_valid_after 2024-06-17 2028-11-16
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0642_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0798_est.pdf
status archived active
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0642_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0798_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0642_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0798_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/cert/pdf_hash a2b349afbecd2c3230a58ab91d20b10d6cce85f3b3e1634122513cbe150ffa66 c0a65594b6e635cf30555a996c33be5bfea8392c086fc05959571dc927791a46
state/cert/txt_hash 2217740b2d3637f7d6e80ff225c7e4b3f9f893e1678a0683c21db1a95d493e5c 6d3fc89cbb0543a91bbd73ed4930bd15125f58dcd0b454831995afa5144ab24f
state/report/pdf_hash efbae65032ec45f4eb3b21fff6d6e0ab5de6e9483dab1e164ce51e86d4269554 2df24e048de74c3848470a8f0f13694ba5f3a92a84146bb69f7b5d77b2fb6a61
state/report/txt_hash e7a2ac4a1fd5940ba8d934cf25910b595140dd6181c12c9752e0497ab61a5f32 09a9b55183c3ef4eac10587f35735592a169fa22422116981a8d98095ebe6150
state/st/pdf_hash f97f1dd049a7e6b7addba38751dace65b2cfaf9146cbbe0713bf3859709cc69f dbd6e4d712a5fb724f0d7f7b6b8e1b215a6d1360de52e87c9b75814f40706dc7
state/st/txt_hash 14294347769efb3fe6c438e42b24d529bf0fbc11563148b6c37e114cd3e55ec7 156d6896114ab3bf84d519091f5054bd552a32ce5570f17f6e8edbbb05399b2d
heuristics/cert_id JISEC-CC-CRP-C0642-01-2019 JISEC-CC-CRP-C0798-01-2023
heuristics/extracted_versions 1.00 1.01
heuristics/scheme_data/cert_id C0642 C0798
heuristics/scheme_data/certification_date 2019-06 2023-11
heuristics/scheme_data/claim PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
heuristics/scheme_data/enhanced/cert_id JISEC-C0642 JISEC-C0798
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000kih-att/c0642_eimg.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/kcrmqo0000000obm-att/c0798_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2019-06-17 2023-11-16
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
heuristics/scheme_data/enhanced/evaluation_facility ECSEC Laboratory Inc. Evaluation Center ECSEC Laboratory Inc., Evaluation Center
heuristics/scheme_data/enhanced/product RICOH IM 350, nashuatec IM 350, Rex Rotary IM 350, Gestetner IM 350 RICOH IM C4510/C4510A/C5510/C5510A/ C6010, nashuatec IM C4510/C4510A/C5510/C5510A/ C6010, Rex Rotary IM C4510/C4510A/C5510/ C5510A/C6010, Gestetner IM C4510/C4510A/C5510/ C5510A/C6010 with Fax Option Type M52 and HDD Option Type M52 320GB
heuristics/scheme_data/enhanced/product_type Multi Function Product Multifunction Product
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000kih-att/c0642_erpt.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/kcrmqo0000000obm-att/c0798_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000kih-att/c0642_est.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/kcrmqo0000000obm-att/c0798_est.pdf
heuristics/scheme_data/enhanced/toe_version E-1.00 E-1.01
heuristics/scheme_data/expiration_date 2024-07 None
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0642_it8668.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0798_it2835.html
heuristics/scheme_data/toe_overseas_name RICOH IM 350, nashuatec IM 350, Rex Rotary IM 350, Gestetner IM 350E-1.00 RICOH IM C4510/C4510A/C5510/C5510A/C6010, nashuatec IM C4510/C4510A/C5510/C5510A/C6010, Rex Rotary IM C4510/C4510A/C5510/C5510A/C6010, Gestetner IM C4510/C4510A/C5510/C5510A/C6010 with Fax Option Type M52 and HDD Option Type M52 320GB E-1.01
pdf_data/cert_filename c0642_eimg.pdf c0798_eimg.pdf
pdf_data/cert_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0642-01-2019: 1
  • JISEC-CC-CRP-C0798-01-2023: 1
pdf_data/cert_metadata
  • pdf_file_size_bytes: 150015
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20190807142126+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190807142334+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 235686
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20231227165454+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20231227165551+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20231227074610
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
pdf_data/cert_metadata//CreationDate D:20190807142126+09'00' D:20231227165454+09'00'
pdf_data/cert_metadata//Creator Microsoft® Word 2010 Word 用 Acrobat PDFMaker 17
pdf_data/cert_metadata//ModDate D:20190807142334+09'00' D:20231227165551+09'00'
pdf_data/cert_metadata//Producer Microsoft® Word 2010 Adobe PDF Library 17.11.238
pdf_data/cert_metadata/pdf_file_size_bytes 150015 235686
pdf_data/report_filename c0642_erpt.pdf c0798_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0642-01-2019: 1
  • JISEC-CC-CRP-C0798-01-2023: 1
pdf_data/report_keywords/cc_claims/T/T.CONF 2 4
pdf_data/report_keywords/cc_claims/T/T.DOC 2 3
pdf_data/report_keywords/cc_claims/T/T.FUNC 1 2
pdf_data/report_keywords/cc_claims/T/T.PROT 1 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/crypto_protocol/IPsec/IPsec 4 6
pdf_data/report_keywords/crypto_protocol/TLS/TLS
  • TLS: 3
  • TLS: 5
  • TLS 1.2: 3
  • TLS 1.3: 3
pdf_data/report_keywords/crypto_protocol/TLS/TLS/TLS 3 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/vendor/Microsoft/Microsoft 1 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 320668
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 32
  • /CreationDate: D:20190919144406+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190919144508+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 604883
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
  • /Author:
  • /Company:
  • /CreationDate: D:20240122141704+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /Manager:
  • /ModDate: D:20240122141806+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240119062251
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20190919144406+09'00' D:20240122141704+09'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 Word 用 Acrobat PDFMaker 17
pdf_data/report_metadata//ModDate D:20190919144508+09'00' D:20240122141806+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Adobe PDF Library 17.11.238
pdf_data/report_metadata/pdf_file_size_bytes 320668 604883
pdf_data/report_metadata/pdf_number_of_pages 32 38
pdf_data/st_filename c0642_est.pdf c0798_est.pdf
pdf_data/st_keywords/cc_claims/A/A.USER 4 5
pdf_data/st_keywords/cc_claims/D
  • D.DOC: 6
  • D.FUNC: 6
  • D.DOC: 19
  • D.FUNC: 13
  • D.PROT: 4
  • D.CONF: 4
pdf_data/st_keywords/cc_claims/D/D.DOC 6 19
pdf_data/st_keywords/cc_claims/D/D.FUNC 6 13
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.PROT: 10
  • O.DOC: 18
  • O.FUNC: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_claims/O/O.PROT 9 10
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_ACCESS 2 3
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_STORAGE 3 4
pdf_data/st_keywords/cc_claims/OE/OE.USER 21 20
pdf_data/st_keywords/cc_claims/T/T.DOC 14 10
pdf_data/st_keywords/cc_claims/T/T.FUNC 7 5
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 3 4
pdf_data/st_keywords/cc_security_level/EAL/EAL2 1 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_STG.1: 9
    • FAU_STG.4: 8
    • FAU_SAR.1: 10
    • FAU_SAR.2: 8
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_ACC.1: 31
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 9
    • FIA_UAU.7: 8
    • FIA_SOS.1: 8
    • FIA_UID.1: 18
    • FIA_UAU.1: 14
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMF.1: 22
    • FMT_SMR.1: 29
    • FMT_MSA.3: 23
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 10
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1.3: 4
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
  • FAU:
    • FAU_STG.1: 10
    • FAU_STG.4: 7
    • FAU_SAR.1: 10
    • FAU_SAR.2: 9
    • FAU_GEN.1: 12
    • FAU_GEN: 1
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FDP:
    • FDP_ACF.1: 26
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ACC.1: 28
    • FDP_ACC.1.1: 2
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 8
    • FIA_UAU.7: 7
    • FIA_SOS.1: 7
    • FIA_UID.1: 23
    • FIA_UAU.1: 14
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_SMR.1: 31
    • FMT_SMF.1: 25
    • FMT_MSA.3: 23
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 26
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 16
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 10
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.1: 9
  • FAU_STG.4: 8
  • FAU_SAR.1: 10
  • FAU_SAR.2: 8
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1: 10
  • FAU_STG.4: 7
  • FAU_SAR.1: 10
  • FAU_SAR.2: 9
  • FAU_GEN.1: 12
  • FAU_GEN: 1
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 8 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 9 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 7
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF.1: 31
  • FDP_ACF.1.1: 3
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 3
  • FDP_ACC.1: 31
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 2
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
  • FDP_ACF.1: 26
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACC.1: 28
  • FDP_ACC.1.1: 2
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 2
  • FDP_ACF.1.4: 2
  • FDP_RIP.1: 5
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 31 28
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 31 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 3 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 3 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 8 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 3 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 8 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 9 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 8 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 8 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 18 23
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 6 5
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMF.1: 22
  • FMT_SMR.1: 29
  • FMT_MSA.3: 23
  • FMT_MSA.1: 20
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MOF.1: 8
  • FMT_SMR.1: 31
  • FMT_SMF.1: 25
  • FMT_MSA.3: 23
  • FMT_MOF.1.1: 1
  • FMT_MSA.1: 26
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 16
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 26
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 12 16
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 25
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 29 31
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP 5 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 9 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 6 5
pdf_data/st_keywords/cc_sfr/FTA/FTA_SSL.3 9 7
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 17 11
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 4 1
pdf_data/st_keywords/crypto_protocol/IPsec/IPsec 10 9
pdf_data/st_keywords/crypto_protocol/TLS
  • TLS:
    • TLS1.0: 1
    • TLS1.1: 1
    • TLS1.2: 1
  • SSL:
    • SSL: 4
  • TLS:
    • TLS: 9
    • TLS1.2: 2
    • TLS1.3: 2
pdf_data/st_keywords/crypto_protocol/TLS/TLS
  • TLS1.0: 1
  • TLS1.1: 1
  • TLS1.2: 1
  • TLS: 9
  • TLS1.2: 2
  • TLS1.3: 2
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS1.2 1 2
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 1 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 7
  • djb:
    • ChaCha:
      • ChaCha20: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 6 7
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata//Author RICOH 株式会社リコー
pdf_data/st_metadata//CreationDate D:20190910114908+09'00' D:20240119175134+09'00'
pdf_data/st_metadata//Creator Microsoft® Word for Office 365 Microsoft® Word for Microsoft 365
pdf_data/st_metadata//ModDate D:20190910114908+09'00' D:20240119175134+09'00'
pdf_data/st_metadata//Producer Microsoft® Word for Office 365 Microsoft® Word for Microsoft 365
pdf_data/st_metadata//Title RICOH IM 350, nashuatec IM 350, Rex Rotary IM 350, Gestetner IM 350 Security Target RICOH IM C4510/C4510A/C5510/C5510A/C6010, nashuatec IM C4510/C4510A/C5510/C5510A/C6010, Rex Rotary IM C4510/C4510A/C5510/C5510A/C6010, Gestetner IM C4510/C4510A/C5510/C5510A/C6010 with Fax Option Type M52 and HDD Option Type M52 320GB Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1409403 1361105
pdf_data/st_metadata/pdf_number_of_pages 81 98
dgst 35d094f28af1b3c1 89b5501c27f7233b