Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

MP 2553/3053/3353(Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) Version:E-1.00
JISEC-CC-CRP-C0423
MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec),SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.02
JISEC-CC-CRP-C0473
name MP 2553/3053/3353(Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) Version:E-1.00 MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec),SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.02
not_valid_before 2013-12-24 2015-05-19
not_valid_after 2017-01-24 2020-06-01
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0423_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0473_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0423_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0473_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/report/pdf_hash 617b13a18c1109af434683509792efc110b3cf9e6497a4a84c652c5b010b739f c77b4ae33e08a6e03a984aefe6d135cf18be8d15d6567f3923b7086687e66a0c
state/report/txt_hash 9f517bfd62cbfb8c80f8d0e9d1a01e611e6663133498f2e0719e2ac985c6f7ce 195b4a0faeeb96ffabdb2bdbf638488381b17056c7d0a8bb509d4ac38470426c
state/st/pdf_hash 6dc4d5da78e07d8935c6fa7136b123592c47a127cbf0faa48aab650657f21152 a7f827eb0060d7901827b9c87d9f7fb78512e4d5456ad30937682610b6268fa6
state/st/txt_hash 5b643f573488434c77ac11c486f1a7020fdee96bff4690c2ec30cc061ad23632 6d26e9c58e81d8f4c3935a1a3a017fbbb8a6990dce10784f2efbf19ba446a4ad
heuristics/cert_id JISEC-CC-CRP-C0423 JISEC-CC-CRP-C0473
heuristics/extracted_versions 1.00 1.02
heuristics/scheme_data/cert_id C0423 C0473
heuristics/scheme_data/certification_date 2013-12 2015-05
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP EAL2+ ALC_FLR.2 PP
heuristics/scheme_data/enhanced/assurance_level EAL3 Augmented with ALC_FLR.2 EAL2 Augmented with ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 3.1 Release3 3.1 Release4
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0423_eimg.pdf https://www.ipa.go.jp/en/security/c0473_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2013-12-24 2015-05-19
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/product MP 2553/3053/3353(Ricoh/Savin/Lanier/ nashuatec/Rex-Rotary/Gestetner/infotec) MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner)
heuristics/scheme_data/enhanced/protection_profile IEEE Std 2600.1-2009 U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0423_erpt.pdf https://www.ipa.go.jp/en/security/c0473_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0423_est.pdf https://www.ipa.go.jp/en/security/c0473_est.pdf
heuristics/scheme_data/enhanced/toe_version E-1.00 E-1.02
heuristics/scheme_data/expiration_date 2017-01 2020-06
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0423_it2436.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0473_it4493.html
heuristics/scheme_data/toe_overseas_name MP 2553/3053/3353 (Ricoh/Savin/Lanier/nashuatec /Rex-Rotary/Gestetner/infotec) E-1.00 MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec),SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.02
pdf_data/report_filename c0423_erpt.pdf c0473_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0423-01: 1
  • Certification No. C0423: 1
  • CRP-C0473-01: 1
  • Certification No. C0473: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 2
  • EAL2: 4
  • EAL2 augmented: 2
pdf_data/report_keywords/eval_facility/ECSEC/ECSEC Laboratory 3 4
pdf_data/report_keywords/standard_id/CC
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
pdf_data/report_metadata//CreationDate D:20140206103034+09'00' D:20150611112033+09'00'
pdf_data/report_metadata//ModDate D:20140206103106+09'00' D:20150611112355+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 371482 349188
pdf_data/report_metadata/pdf_number_of_pages 37 41
pdf_data/st_filename c0423_est.pdf c0473_est.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.STORAGE: 14
    • O.RCGATE: 13
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.STORAGE: 14
    • O.RCGATE: 13
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
pdf_data/st_keywords/cc_claims/T/T.DOC 10 14
pdf_data/st_keywords/cc_claims/T/T.FUNC 5 7
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
  • ALC_FLR.2: 3
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 1
  • EAL2: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP 8 5
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 1 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
      • TLS1.1: 1
      • TLS1.2: 1
  • IPsec:
    • IPsec: 10
pdf_data/st_keywords/crypto_protocol/TLS/TLS
  • TLS1.0: 2
  • TLS1.0: 2
  • TLS1.1: 1
  • TLS1.2: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 7
  • AES:
    • AES: 8
  • RC:
    • RC4: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 8
pdf_data/st_metadata//Author z00se00558 hanedach
pdf_data/st_metadata//CreationDate D:2014012109351409'00' D:20150421102939+09'00'
pdf_data/st_metadata//Creator PrimoPDF http://www.primopdf.com/ PScript5.dll Version 5.2.2
pdf_data/st_metadata//ModDate D:2014012109351409'00' D:20150421102939+09'00'
pdf_data/st_metadata//Producer PrimoPDF Acrobat Distiller 9.5.5 (Windows)
pdf_data/st_metadata//Title Microsoft Word - MP_3353_ST_EXP_1.00_jp_ENG.doc Microsoft Word - MP_401_ST_EXP_jp_1.00_ENG.doc
pdf_data/st_metadata/pdf_file_size_bytes 5613816 572968
pdf_data/st_metadata/pdf_number_of_pages 91 96
dgst 42cb01f6c2268978 c28c3697357e7c18