Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Ricoh Aficio MP 6002/7502/9002, Gestetner MP 6002/7502/9002, Lanier MP 6002/7502/9002, nashuatec MP 6002/7502/9002, Rex-Rotary MP 6002/7502/9002, infotec MP 6002/7502/9002, Savin MP 6002/7502/#x2f;9002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.3, Network Support 11.90, Fax 01.00.01, RemoteFax 01.00.00, NetworkDocBox 1.00.1, Web Support 1.00, Web Uapl 1.00, animation 1.00, Scanner 01.02, Printer 1.00, PCL 1.01, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-3(WW) 01.00.00, Engine 1.00:01, OpePanel 1.01, LANG0 1.01, LANG1 1.01 - Hardware: Ic Key 01020700, Ic Ctlr 03
JISEC-CC-CRP-C0373
RICOH Pro C5300SL, nashuatec Pro C5300SL, Rex Rotary Pro C5300SL, Gestetner Pro C5300SL, infotec Pro C5300SLE-1.00
JISEC-CC-CRP-C0722-01-2021
name Ricoh Aficio MP 6002/7502/9002, Gestetner MP 6002/7502/9002, Lanier MP 6002/7502/9002, nashuatec MP 6002/7502/9002, Rex-Rotary MP 6002/7502/9002, infotec MP 6002/7502/9002, Savin MP 6002/7502/#x2f;9002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.3, Network Support 11.90, Fax 01.00.01, RemoteFax 01.00.00, NetworkDocBox 1.00.1, Web Support 1.00, Web Uapl 1.00, animation 1.00, Scanner 01.02, Printer 1.00, PCL 1.01, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-3(WW) 01.00.00, Engine 1.00:01, OpePanel 1.01, LANG0 1.01, LANG1 1.01 - Hardware: Ic Key 01020700, Ic Ctlr 03 RICOH Pro C5300SL, nashuatec Pro C5300SL, Rex Rotary Pro C5300SL, Gestetner Pro C5300SL, infotec Pro C5300SLE-1.00
not_valid_before 2012-10-29 2021-05-11
not_valid_after 2017-02-07 2026-05-11
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0373_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0722_est.pdf
status archived active
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0373_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0722_erpt.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0722_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None 0b197b0bc26fd19e736a9ab1982ade5c955175d9970a590b40bb4a8e0d083617
state/cert/txt_hash None cdb8d744fb8b1bb51e05bf26f146effc1c61f1356ad7816074d41dab86473938
state/report/pdf_hash 0086b9488c1a5e37a916d112624e782a121210b347814c5872cd458adcb27dd8 ec72bac38d5285d6bf52d17ea2be5c5361e896bd5ce01a8748fbc834812d7815
state/report/txt_hash eef51100790a1d287c867d93530dc954b7b9bafc62e8b4459090b7a0561dc05e ec21d3c5cc2c90250d9e552c86cacdfbe67b97efb81e0aee4f4d406ae3903b61
state/st/pdf_hash 8bbd7de4faaf06fb43e993187a0f9bc292bc48ddcea8dfd2886f783f4f4953b1 3b45245083ffb2e31a9fb5b07c31870c3e323247bc62e73e229b87ac0219e7a8
state/st/txt_hash b4b960252d4ec58c4b536b8ca4e21216c71a9434c2b4e694675c1821edc6fcff 00cb49ed930abdb1ba038e16147c2a724ee3c3458c2e825d2766c17b5b5d6e39
heuristics/cert_id JISEC-CC-CRP-C0373 JISEC-CC-CRP-C0722-01-2021
heuristics/cpe_matches None cpe:2.3:h:ricoh:pro_c5300s:-:*:*:*:*:*:*:*
heuristics/scheme_data/cert_id C0373 C0722
heuristics/scheme_data/certification_date 2012-10 2021-05
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
heuristics/scheme_data/enhanced
  • product: Ricoh Aficio MP 6002/7502/9002, Gestetner MP 6002/7502/9002, Lanier MP 6002/7502/9002, nashuatec MP 6002/7502/9002, Rex-Rotary MP 6002/7502/9002, infotec MP 6002/7502/9002, Savin MP 6002/7502/9002 all of above with Printer/Scanner/Facsimile Functions
  • toe_version: -Software: System/Copy 1.00.3 Network Support 11.90 Fax 01.00.01 RemoteFax 01.00.00 NetworkDocBox 1.00.1 Web Support 1.00 Web Uapl 1.00 animation 1.00 Scanner 01.02 Printer 1.00 PCL 1.01 PCL Font 1.06 Data Erase Onb 1.01x GWFCU3.5-3(WW) 01.00.00 Engine 1.00:01 OpePanel 1.01 LANG0 1.01 LANG1 1.01 -Hardware: Ic Key 01020700 Ic Ctlr 03
  • product_type: Multi Function Product
  • certification_date: 2012-10-29
  • cc_version: 3.1
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1-2009
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0373_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0373_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0373_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: RICOH Pro C5300SL, nashuatec Pro C5300SL, Rex Rotary Pro C5300SL, Gestetner Pro C5300SL, infotec Pro C5300SL
  • toe_version: E-1.00
  • product_type: Multi Function Product
  • cert_id: JISEC-C0722
  • certification_date: 2021-05-11
  • cc_version: 3.1 Release5
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006ui-att/c0722_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006ui-att/c0722_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006ui-att/c0722_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/assurance_level EAL3 Augmented with ALC_FLR.2 EAL2 Augmented by ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 3.1 3.1 Release5
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0373_eimg.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006ui-att/c0722_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2012-10-29 2021-05-11
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/product Ricoh Aficio MP 6002/7502/9002, Gestetner MP 6002/7502/9002, Lanier MP 6002/7502/9002, nashuatec MP 6002/7502/9002, Rex-Rotary MP 6002/7502/9002, infotec MP 6002/7502/9002, Savin MP 6002/7502/9002 all of above with Printer/Scanner/Facsimile Functions RICOH Pro C5300SL, nashuatec Pro C5300SL, Rex Rotary Pro C5300SL, Gestetner Pro C5300SL, infotec Pro C5300SL
heuristics/scheme_data/enhanced/protection_profile IEEE Std 2600.1-2009 U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0373_erpt.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006ui-att/c0722_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0373_est.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006ui-att/c0722_est.pdf
heuristics/scheme_data/enhanced/toe_version -Software: System/Copy 1.00.3 Network Support 11.90 Fax 01.00.01 RemoteFax 01.00.00 NetworkDocBox 1.00.1 Web Support 1.00 Web Uapl 1.00 animation 1.00 Scanner 01.02 Printer 1.00 PCL 1.01 PCL Font 1.06 Data Erase Onb 1.01x GWFCU3.5-3(WW) 01.00.00 Engine 1.00:01 OpePanel 1.01 LANG0 1.01 LANG1 1.01 -Hardware: Ic Key 01020700 Ic Ctlr 03 E-1.00
heuristics/scheme_data/expiration_date 2017-02 None
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0373_it1377.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0722_it0767.html
heuristics/scheme_data/toe_overseas_name Ricoh Aficio MP 6002/7502/9002, Gestetner MP 6002/7502/9002, Lanier MP 6002/7502/9002, nashuatec MP 6002/7502/9002, Rex-Rotary MP 6002/7502/9002, infotec MP 6002/7502/9002, Savin MP 6002/7502/9002 all of above with Printer/Scanner/Facsimile Functions - Software: System/Copy 1.00.3, Network Support 11.90, Fax 01.00.01, RemoteFax 01.00.00, NetworkDocBox 1.00.1, Web Support 1.00, Web Uapl 1.00, animation 1.00, Scanner 01.02, Printer 1.00, PCL 1.01, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-3(WW) 01.00.00, < Cont. > RICOH Pro C5300SL, nashuatec Pro C5300SL, Rex Rotary Pro C5300SL, Gestetner Pro C5300SL, infotec Pro C5300SLE-1.00
pdf_data/cert_filename None c0722_eimg.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0722-01-2021: 1
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ECSEC:
      • ECSEC Laboratory: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 140712
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20210615100531+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210615100746+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_hyperlinks:
pdf_data/report_filename c0373_erpt.pdf c0722_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0373-01: 1
  • Certification No. C0373: 1
  • JISEC-CC-CRP-C0722-01-2021: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 1
  • EAL2: 4
  • EAL2 augmented: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 3
  • TLS:
    • TLS: 2
pdf_data/report_keywords/eval_facility/ECSEC/ECSEC Laboratory 3 4
pdf_data/report_keywords/standard_id/CC
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_metadata//CreationDate D:20121119142838+09'00' D:20210611122607+09'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 Microsoft® Word for Office 365
pdf_data/report_metadata//ModDate D:20121119142903+09'00' D:20210611140755+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Microsoft® Word for Office 365
pdf_data/report_metadata/pdf_file_size_bytes 394554 507733
pdf_data/st_filename c0373_est.pdf c0722_est.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.STORAGE: 14
    • O.RCGATE: 13
    • O.DOC: 16
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 18
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.STORAGE: 14
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 16
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_claims/O/O.DOC 16 18
pdf_data/st_keywords/cc_claims/OE/OE.USER 18 21
pdf_data/st_keywords/cc_claims/T/T.DOC 10 14
pdf_data/st_keywords/cc_claims/T/T.FUNC 5 7
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
  • ALC_FLR.2: 3
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 1
  • EAL2: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 30 31
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 10 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 31 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 39 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 7 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 5 6
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 15
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TST.1: 1
  • FTP_ITC.1.3: 4
  • FTP_ITC.1: 17
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 15 17
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 1 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
  • TLS:
    • TLS:
      • TLS1.2: 1
  • IPsec:
    • IPsec: 10
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL3.0: 1
  • TLS:
    • TLS1.0: 2
  • TLS:
    • TLS1.2: 1
pdf_data/st_keywords/crypto_protocol/TLS/TLS
  • TLS1.0: 2
  • TLS1.2: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 5 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 818691
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
  • /Creator: MP_6002_ST_EXP_1.00_jp_ENG_0.02.doc - Microsoft Word
  • /CreationDate: D:20121101112149
  • /Title: MP_6002_ST_EXP_1.00_jp_ENG_0.02.doc
  • /Author: p000266068
  • /Producer: Acrobat PDFWriter 5.0 Windows NT
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1220043
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 91
  • /Title: RICOH Pro C5300SL, nashuatec Pro C5300SL, Rex Rotary Pro C5300SL, Gestetner Pro C5300SL, infotec Pro C5300SL Security Target
  • /Author: RICOH
  • /Creator: Microsoft® Word for Microsoft 365
  • /CreationDate: D:20210610161448+09'00'
  • /ModDate: D:20210610161448+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_hyperlinks:
pdf_data/st_metadata//Author p000266068 RICOH
pdf_data/st_metadata//CreationDate D:20121101112149 D:20210610161448+09'00'
pdf_data/st_metadata//Creator MP_6002_ST_EXP_1.00_jp_ENG_0.02.doc - Microsoft Word Microsoft® Word for Microsoft 365
pdf_data/st_metadata//Producer Acrobat PDFWriter 5.0 Windows NT Microsoft® Word for Microsoft 365
pdf_data/st_metadata//Title MP_6002_ST_EXP_1.00_jp_ENG_0.02.doc RICOH Pro C5300SL, nashuatec Pro C5300SL, Rex Rotary Pro C5300SL, Gestetner Pro C5300SL, infotec Pro C5300SL Security Target
pdf_data/st_metadata/pdf_file_size_bytes 818691 1220043
pdf_data/st_metadata/pdf_number_of_pages 93 91
dgst 4463d4c3e9dc690a b610b6642d3ce0be