Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version: A0P00Y0-0100-GM0-24
JISEC-CC-CRP-C0312
RICOH IM 350F/430F/430Fb,SAVIN IM 350F/430F/430Fb,LANIER IM 350F/430F/430Fb,nashuatec IM 350F/430F,Rex Rotary IM 350F/430F,Gestetner IM 350F/430F E-1.00
JISEC-CC-CRP-C0643-01-2019
name bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software Version: A0P00Y0-0100-GM0-24 RICOH IM 350F/430F/430Fb,SAVIN IM 350F/430F/430Fb,LANIER IM 350F/430F/430Fb,nashuatec IM 350F/430F,Rex Rotary IM 350F/430F,Gestetner IM 350F/430F E-1.00
category Other Devices and Systems Multi-Function Devices
not_valid_after 01.09.2016 18.07.2024
not_valid_before 31.08.2011 18.07.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0643_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0312_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0643_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0312_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0643_est.pdf
manufacturer Konica Minolta Business Technologies, Inc Ricoh Company, Ltd.
manufacturer_web https://www.konicaminolta.com/ https://www.ricoh.com/
security_level EAL3 EAL2+, ALC_FLR.2
dgst 49e78f2ac0541c3b f2c6bd0f2a977d13
heuristics/cert_id JISEC-CC-CRP-C0312 JISEC-CC-CRP-C0643-01-2019
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 0100, 452, 552, 652, 24 1.00
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0312
  • certification_date: 01.08.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0312_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification and Authentication, and Access Control Function The function to identify and authenticate user, and to control access to highly confidential image data stored in MFP - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Safety transmitting and receiving function of image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese : bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Zentai Seigyo Software English : bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0312_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0312_est.pdf
    • toe_version: A0P00Y0-0100-GM0-24
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.09.2016
  • revalidations: [frozendict({'date': '2012-02', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0312_it1345_01.html'})]
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c Zentai Seigyo Software A0P00Y0-0100-GM0-24
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0312_it1345.html
  • toe_overseas_name: bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub C452 / ineo+ 652 / ineo+ 652DS / ineo+ 552 / ineo+ 452 / VarioLink 6522c / VarioLink 5522c / VarioLink 4522c / D700 / D701 / D705 / D706 Control Software A0P00Y0-0100-GM0-24
  • cert_id: JISEC-CC-CRP-C0643
  • certification_date: 01.07.2019
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0643
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000ksk-att/c0643_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH IM 350F/430F/430Fb, SAVIN IM 350F/430F/430Fb, LANIER IM 350F/430F/430Fb, nashuatec IM 350F/430F, Rex Rotary IM 350F/430F, Gestetner IM 350F/430F
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000ksk-att/c0643_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000ksk-att/c0643_est.pdf
    • toe_version: E-1.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.08.2024
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0643_it8667.html
  • toe_overseas_name: RICOH IM 350F/430F/430Fb, SAVIN IM 350F/430F/430Fb, LANIER IM 350F/430F/430Fb, nashuatec IM 350F/430F, Rex Rotary IM 350F/430F, Gestetner IM 350F/430FE-1.00
heuristics/protection_profiles {} 43ce79b420f23a00
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf
pdf_data/cert_filename c0643_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0643-01-2019: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20190826143237+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190826143955+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 167367
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename c0312_erpt.pdf c0643_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0312-01: 1
    • Certification No. C0312: 1
  • JP:
    • JISEC-CC-CRP-C0643-01-2019: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-B: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-B: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-P: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BRING-OUT-STORA: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRA: 1
    • T.UNEXPECTED-TRANSMISSION: 1
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
  • IPsec:
    • IPsec: 4
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD that is a medium to: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20111005174550+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20111013102822+09'00'
  • /Producer: Acrobat Distiller 8.2.0 (Windows)
  • /SourceModified: D:20111005032324
  • /Title: CRP-e
  • pdf_file_size_bytes: 743788
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 40
  • /CreationDate: D:20191001134509+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20191001134550+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 509668
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
pdf_data/st_filename c0312_est.pdf c0643_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 72
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 55
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 71
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 29
    • FIA_ATD.1.1: 1
    • FIA_MSA.3: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 44
    • FIA_SOS.1.1: 5
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 43
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 44
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 48
    • FIA_UID.2.1: 7
    • FIA_USB.1: 26
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 31
    • FMT_MOF.1.1: 3
    • FMT_MSA: 5
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 42
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 119
    • FMT_MTD.1.1: 13
    • FMT_SMF.1: 112
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 171
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 18
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 5
    • A.NETWORK: 6
    • A.SECRET: 3
    • A.SERVICE: 4
    • A.SETTING: 5
  • O:
    • O.AUTH: 2
    • O.AUTH-CAPABILITY: 5
    • O.CONFIG: 12
    • O.CRYPT: 4
    • O.CRYPTO: 4
    • O.CRYPTO-CAPABILITY: 5
    • O.CRYPTO-KEY: 2
    • O.CRYPTO-MAIL: 2
    • O.FAX: 2
    • O.FAX-CONTROL: 6
    • O.GROUP: 3
    • O.GROUP-BOX: 3
    • O.OVERWRITE: 3
    • O.OVERWRITE-ALL: 5
    • O.P: 2
    • O.PRIVATE: 1
    • O.PRIVATE-BOX: 3
    • O.PUBLIC: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED: 3
    • O.REGISTERED-USER: 12
    • O.SECURE: 4
    • O.SECURE-PRINT: 6
    • O.TRUSTED: 3
    • O.TRUSTED-PASS: 5
  • OE:
    • OE.ADMIN: 3
    • OE.FAX: 2
    • OE.FAX-UNIT: 2
    • OE.FEED: 2
    • OE.FEED-BACK: 9
    • OE.NETWORK: 4
    • OE.S: 1
    • OE.SECRET: 3
    • OE.SERVER: 5
    • OE.SERVICE: 3
    • OE.SESSION: 9
    • OE.SETTING: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS: 19
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.BACKUP: 3
    • T.BACKUP-RESTORE: 1
    • T.BRING: 3
    • T.DISCARD: 3
    • T.DISCARD-MFP: 1
    • T.UNEXPECTED: 2
    • T.UNEXPECTED-TRANSMISSION: 1
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS1.0: 1
      • TLS1.1: 1
      • TLS1.2: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186: 2
    • FIPS 186-2: 4
    • FIPS PUB 197: 2
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20111004144740+09'00'
  • /Creator: CubePDF
  • /Keywords:
  • /ModDate: D:20111004144745+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1155878
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 111
  • /Author: RICOH
  • /CreationDate: D:20190919100612+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20190919100612+09'00'
  • /Producer: Microsoft® Word for Office 365
  • /Title: RICOH IM 350F/430F/430Fb, SAVIN IM 350F/430F/430Fb, LANIER IM 350F/430F/430Fb, nashuatec IM 350F/430F, Rex Rotary IM 350F/430F, Gestetner IM 350F/430F Security Target
  • pdf_file_size_bytes: 1592468
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different