Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300 FCU: Fax Option Type C5000 MFP Software /Hardware Version : Software System/Copy 1.22 Network Support 8.27 Scanner 01.23 Printer 1.22 Fax 04.00.00 Web Support 1.10 Web Uapl 1.08 Network Doc Box 1.03 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-13(WW) 04.04.00
JISEC-CC-CRP-C0266
RICOH IM 370F/460F,nashuatec IM 370F/460F,Rex Rotary IM 370F/460F,Gestetner IM 370F/460FE-1.00
JISEC-CC-CRP-C0807-01-2024
name Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300 FCU: Fax Option Type C5000 MFP Software /Hardware Version : Software System/Copy 1.22 Network Support 8.27 Scanner 01.23 Printer 1.22 Fax 04.00.00 Web Support 1.10 Web Uapl 1.08 Network Doc Box 1.03 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-13(WW) 04.04.00 RICOH IM 370F/460F,nashuatec IM 370F/460F,Rex Rotary IM 370F/460F,Gestetner IM 370F/460FE-1.00
not_valid_before 2010-08-31 2024-03-04
not_valid_after 2015-09-01 2029-03-04
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0266_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0807_est.pdf
status archived active
security_level EAL3 EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0266_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0807_erpt.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0807_eimg.pdf
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None b472fb3b9c62d9fa70a1f4419087836f5966d9dc9b6f151db16c9cd361ec4159
state/cert/txt_hash None 6d57295eab5e1f5d75040fa77e767363a0b874555a1f2320a840398c66261e9f
state/report/pdf_hash 4a2725db8285c4280f1e18e1273122278ed97c7aa4bafd2877dbf4200557a88c 4d86432651874122b95397ef20f73a7fdeea2103ee6237e15601031c7bf7168c
state/report/txt_hash 37d11d7d44bb18cebb5ba8182d96ac3ffdeaefba5f77c33246c6320aa4d95f1f 9df9ca5b4fee8e04ec1a52802f72bc4720f2a2758fc3bf0dd1ef2e7f6eeae08a
state/st/pdf_hash 00eb8923e3de7e92705f4d9f86598c5d6c3110ad8d88995d7368d91611ab4345 c5bacd61ffd5e2c73fd3e9a73e54c89739d3c20e244c163c08cc493235595ca1
state/st/txt_hash 98830cf4fb98dba7b8104d47ab10f40cfcda2d6689fe75e56105e6bc646625b9 c8daac81663e55ff309b6c6735b62d2af8924e7377735c0715a793159a3126b3
heuristics/cert_id JISEC-CC-CRP-C0266 JISEC-CC-CRP-C0807-01-2024
heuristics/extracted_versions 1.08, 1.22, 1.03, 8.27, 04.00.00, 04.04.00, 1.10, 01.23 1.00
heuristics/scheme_data/cert_id C0266 C0807
heuristics/scheme_data/certification_date 2010-08 2024-03
heuristics/scheme_data/claim EAL3 EAL2
heuristics/scheme_data/enhanced
  • product: Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300 FCU: Fax Option Type C5000
  • toe_version: MFP Software /Hardware Version : Software System/Copy 1.22 Network Support 8.27 Scanner 01.23 Printer 1.22 Fax 04.00.00 Web Support 1.10 Web Uapl 1.08 Network Doc Box 1.03 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-13(WW) 04.04.00
  • product_type: Multi Function Product
  • certification_date: 2010-08-31
  • cc_version: 3.1
  • assurance_level: EAL3
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0266_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0266_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0266_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions. TOE security functionality The major security functions of the TOE are: - Audit, which creates audit logs of security events. - Identification and Authentication, which identifies and authenticates users. - Document Data Access Control, which controls each users operation of documents. - Stored Data Protection, which encrypts stored document data on hard disk. - Network Communication Data Protection, which encrypts network communications. - Security Management, which provides total management of the security function settings. - Service Mode Lock, which controls the maintenance functions. - Telephone Line Intrusion Protection, which permits fax only communication. - MFP Control Software Verification, which checks the integrity of the software.
  • product: RICOH IM 370F/460F, nashuatec IM 370F/460F, Rex Rotary IM 370F/460F, Gestetner IM 370F/460F
  • toe_version: E-1.00
  • product_type: Multifunction Product
  • cert_id: JISEC-C0807
  • certification_date: 2029-03-04
  • cc_version: 3.1 Release5
  • assurance_level: EAL2
  • protection_profile: none
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc., Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo000000y1r4-att/c0807_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo000000y1r4-att/c0807_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo000000y1r4-att/c0807_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions to prevent unauthorized disclosure and alteration of user data and security function setting data. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Network Protection Function: Enables the TOE to protect network communications using encryption. Stored Data Protection Function: Enables the TOE to protect the stored data using encryption. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
heuristics/scheme_data/enhanced/assurance_level EAL3 EAL2
heuristics/scheme_data/enhanced/cc_version 3.1 3.1 Release5
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0266_eimg.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo000000y1r4-att/c0807_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2010-08-31 2029-03-04
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions. TOE security functionality The major security functions of the TOE are: - Audit, which creates audit logs of security events. - Identification and Authentication, which identifies and authenticates users. - Document Data Access Control, which controls each users operation of documents. - Stored Data Protection, which encrypts stored document data on hard disk. - Network Communication Data Protection, which encrypts network communications. - Security Management, which provides total management of the security function settings. - Service Mode Lock, which controls the maintenance functions. - Telephone Line Intrusion Protection, which permits fax only communication. - MFP Control Software Verification, which checks the integrity of the software. PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions to prevent unauthorized disclosure and alteration of user data and security function setting data. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Network Protection Function: Enables the TOE to protect network communications using encryption. Stored Data Protection Function: Enables the TOE to protect the stored data using encryption. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Evaluation Department ECSEC Laboratory Inc., Evaluation Center
heuristics/scheme_data/enhanced/product Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300 FCU: Fax Option Type C5000 RICOH IM 370F/460F, nashuatec IM 370F/460F, Rex Rotary IM 370F/460F, Gestetner IM 370F/460F
heuristics/scheme_data/enhanced/product_type Multi Function Product Multifunction Product
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0266_erpt.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo000000y1r4-att/c0807_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0266_est.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo000000y1r4-att/c0807_est.pdf
heuristics/scheme_data/enhanced/toe_version MFP Software /Hardware Version : Software System/Copy 1.22 Network Support 8.27 Scanner 01.23 Printer 1.22 Fax 04.00.00 Web Support 1.10 Web Uapl 1.08 Network Doc Box 1.03 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-13(WW) 04.04.00 E-1.00
heuristics/scheme_data/expiration_date 2015-09 None
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0266_it0289.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0807_it3863.html
heuristics/scheme_data/toe_overseas_name Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300 FCU: Fax Option Type C5000 MFP Software /Hardware Version : < Cont. > RICOH IM 370F/460F, nashuatec IM 370F/460F, Rex Rotary IM 370F/460F, Gestetner IM 370F/460F E-1.00
pdf_data/cert_filename None c0807_eimg.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0807-01-2024: 1
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ECSEC:
      • ECSEC Laboratory: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 167844
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20240502113132+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20240502113319+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240502023112
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_filename c0266_erpt.pdf c0807_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0266-01: 1
  • Certification No. C0266: 1
  • JISEC-CC-CRP-C0807-01-2024: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 2
  • A.SUPERVISOR: 1
  • A.NETWORK: 1
  • A.PHYSICAL_PROTECTION: 1
  • A.NETWORK_PROTECTION: 1
  • A.USER: 1
  • A.ADMIN: 1
  • A.TRUSTED_ADMIN: 1
pdf_data/report_keywords/cc_claims/A/A.ADMIN 2 1
pdf_data/report_keywords/cc_claims/T
  • T.ILLEGAL_USE: 4
  • T.UNAUTH_ACCESS: 7
  • T.ABUSE_SEC_MNG: 3
  • T.SALVAGE: 3
  • T.TRANSIT: 3
  • T.FAX_LINE: 3
  • T.DOCUMENT_DATA_DIS: 2
  • T.DOCUMENT_DATA_ALT: 2
  • T.JOB_ALT: 2
  • T.PROTECT_DATA_ALT: 2
  • T.CONFIDENTIAL_DATA_DIS: 2
  • T.CONFIDENTIAL_DATA_ALT: 2
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL2: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • users, receives the document data from client computers which are connected via Network, stores the confidential document data into HDD of the TOE, and performs outputting by print and delivery. Therefore, the TOE is a: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 9
    • TLS:
      • TLS: 1
  • TLS:
    • TLS:
      • TLS: 6
      • TLS 1.2: 3
      • TLS 1.3: 3
  • IPsec:
    • IPsec: 6
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 9
  • TLS:
    • TLS: 1
  • TLS:
    • TLS: 6
    • TLS 1.2: 3
    • TLS 1.3: 3
pdf_data/report_keywords/crypto_protocol/TLS/TLS
  • TLS: 1
  • TLS: 6
  • TLS 1.2: 3
  • TLS 1.3: 3
pdf_data/report_keywords/crypto_protocol/TLS/TLS/TLS 1 6
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
  • BSI:
    • BSI-AIS 31: 2
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2006-09-001: 2
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2007-09-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 3 1
pdf_data/report_keywords/tee_name
  • other:
    • T6: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 519570
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 47
  • /CreationDate: D:20110216120931+09'00'
  • /Author:
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Producer: Acrobat Distiller 8.2.3 (Windows)
  • /ModDate: D:20110216120934+09'00'
  • /Title: CRP-e
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 592713
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 32
  • /Author:
  • /Company:
  • /CreationDate: D:20240513165510+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /Manager:
  • /ModDate: D:20240513165609+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240513073209
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20110216120931+09'00' D:20240513165510+09'00'
pdf_data/report_metadata//Creator Word 用 Acrobat PDFMaker 8.1 Word 用 Acrobat PDFMaker 17
pdf_data/report_metadata//ModDate D:20110216120934+09'00' D:20240513165609+09'00'
pdf_data/report_metadata//Producer Acrobat Distiller 8.2.3 (Windows) Adobe PDF Library 17.11.238
pdf_data/report_metadata//Title CRP-e
pdf_data/report_metadata/pdf_file_size_bytes 519570 592713
pdf_data/report_metadata/pdf_is_encrypted False True
pdf_data/report_metadata/pdf_number_of_pages 47 32
pdf_data/st_filename c0266_est.pdf c0807_est.pdf
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 5
  • A.SUPERVISOR: 4
  • A.NETWORK: 5
  • A.PHYSICAL_PROTECTION: 4
  • A.NETWORK_PROTECTION: 4
  • A.USER: 4
  • A.ADMIN: 4
  • A.TRUSTED_ADMIN: 4
pdf_data/st_keywords/cc_claims/A/A.ADMIN 5 4
pdf_data/st_keywords/cc_claims/O
  • O.AUDIT: 16
  • O.MANAGE: 11
  • O.MEM: 11
  • O.NET: 9
  • O.GENUINE: 9
  • O.LINE_PROTECT: 7
  • O.DOC_ACC: 8
  • O.LINE: 1
  • O.DOCUMENT_DATA_DIS: 16
  • O.DOCUMENT_DATA_ALT: 13
  • O.JOB_ALT: 16
  • O.PROTECT_DATA_ALT: 13
  • O.CONFIDENTIAL_DATA_DIS: 15
  • O.CONFIDENTIAL_DATA_ALT: 12
  • O.AUTHORIZATION: 28
  • O.FAX: 8
  • O.VALIDATION: 10
  • O.AUDIT: 12
  • O.EMMC_ENCRYPTION: 12
pdf_data/st_keywords/cc_claims/O/O.AUDIT 16 12
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 3
  • OE.SUPERVISOR: 3
  • OE.NETWORK: 3
  • OE.AUDIT: 4
  • OE.PHYSICAL_PROTECTION: 4
  • OE.NETWORK_PROTECTION: 3
  • OE.AUTHORIZED_USER: 16
  • OE.TRAINED_USER: 4
  • OE.TRAINED_ADMIN: 4
  • OE.TRUSTED_ADMIN: 3
  • OE.AUDIT_MANAGE: 3
pdf_data/st_keywords/cc_claims/T
  • T.ILLEGAL_USE: 4
  • T.UNAUTH_ACCESS: 3
  • T.ABUSE_SEC_MNG: 4
  • T.SALVAGE: 3
  • T.TRANSIT: 4
  • T.FAX_LINE: 3
  • T.DOCUMENT_DATA_DIS: 4
  • T.DOCUMENT_DATA_ALT: 4
  • T.PROTECT_DATA_ALT: 4
  • T.CONFIDENTIAL_DATA_DIS: 4
  • T.CONFIDENTIAL_DATA_ALT: 4
  • T.JOB_ALT: 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 6
  • EAL2: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.2: 9
    • FAU_STG.1: 8
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_COP.1: 9
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACF.1: 12
    • FDP_IFC.1: 12
    • FDP_IFF.1: 10
    • FDP_ITC.1: 1
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ADF.1: 1
    • FDP_ITC: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.2: 12
    • FIA_UAU.7: 9
    • FIA_UID.2: 10
    • FIA_USB.1: 10
    • FIA_UAU.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UID.1: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 12
    • FMT_MSA.3: 14
    • FMT_MTD.1: 17
    • FMT_SMF.1: 19
    • FMT_SMR.1: 19
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_TRP.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
    • FTP_TST.1: 1
  • FAU:
    • FAU_GEN.1: 13
    • FAU_GEN.2: 8
    • FAU_STG.1: 12
    • FAU_STG.4: 7
    • FAU_SAR.1: 11
    • FAU_SAR.2: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.4: 12
    • FCS_COP.1: 9
    • FCS_CKM.2: 2
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_FXS_EXP: 2
    • FDP_ACC.1: 16
    • FDP_ACF.1: 16
    • FDP_FXS_EXP.1: 12
    • FDP_FXS_EXP.1.1: 2
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL.1: 7
    • FIA_ATD.1: 9
    • FIA_SOS.1: 7
    • FIA_UAU.1: 14
    • FIA_UAU.7: 7
    • FIA_UID.1: 30
    • FIA_USB.1: 7
    • FIA_AFL: 1
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MSA.1: 14
    • FMT_MSA.3: 14
    • FMT_MTD.1: 22
    • FMT_SMF.1: 26
    • FMT_SMR.1: 30
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_TST_EXP: 2
    • FPT_STM.1: 10
    • FPT_TST_EXP.1: 12
    • FPT_TST_EXP.1.1: 2
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 11
  • FAU_SAR.2: 9
  • FAU_STG.1: 8
  • FAU_STG.4: 8
  • FAU_GEN.1.2: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_GEN.1: 13
  • FAU_GEN.2: 8
  • FAU_STG.1: 12
  • FAU_STG.4: 7
  • FAU_SAR.1: 11
  • FAU_SAR.2: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 12 13
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 9 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 8 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 7
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 10
  • FCS_COP.1: 9
  • FCS_CKM.2: 2
  • FCS_CKM.4: 7
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.1: 12
  • FCS_CKM.4: 12
  • FCS_COP.1: 9
  • FCS_CKM.2: 2
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 10 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 7 12
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 16
  • FDP_ACF.1: 12
  • FDP_IFC.1: 12
  • FDP_IFF.1: 10
  • FDP_ITC.1: 1
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_ADF.1: 1
  • FDP_ITC: 1
  • FDP_FXS_EXP: 2
  • FDP_ACC.1: 16
  • FDP_ACF.1: 16
  • FDP_FXS_EXP.1: 12
  • FDP_FXS_EXP.1.1: 2
  • FDP_ITC.1: 4
  • FDP_ITC.2: 4
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 12 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 12 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 1 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 2 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 10
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.2: 12
  • FIA_UAU.7: 9
  • FIA_UID.2: 10
  • FIA_USB.1: 10
  • FIA_UAU.1: 6
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UID.1: 8
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 7
  • FIA_ATD.1: 9
  • FIA_SOS.1: 7
  • FIA_UAU.1: 14
  • FIA_UAU.7: 7
  • FIA_UID.1: 30
  • FIA_USB.1: 7
  • FIA_AFL: 1
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 10 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 11 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 6 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 9 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 8 30
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 10 7
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 12
  • FMT_MSA.3: 14
  • FMT_MTD.1: 17
  • FMT_SMF.1: 19
  • FMT_SMR.1: 19
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MOF.1: 7
  • FMT_MSA.1: 14
  • FMT_MSA.3: 14
  • FMT_MTD.1: 22
  • FMT_SMF.1: 26
  • FMT_SMR.1: 30
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 12 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 17 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 19 26
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 19 30
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 10
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_TST_EXP: 2
  • FPT_STM.1: 10
  • FPT_TST_EXP.1: 12
  • FPT_TST_EXP.1.1: 2
  • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 8
  • FTP_TRP.1: 10
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 2
  • FTP_TRP.1.3: 2
  • FTP_TST.1: 1
  • FTP_ITC.1: 18
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 8 18
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 9
  • TLS:
    • SSL:
      • SSL: 4
    • TLS:
      • TLS: 9
      • TLS1.2: 2
      • TLS1.3: 2
  • IPsec:
    • IPsec: 9
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 9
  • SSL:
    • SSL: 4
  • TLS:
    • TLS: 9
    • TLS1.2: 2
    • TLS1.3: 2
pdf_data/st_keywords/crypto_protocol/TLS/SSL/SSL 9 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 3
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 3
  • BSI:
    • BSI-AIS31: 3
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-0004: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2006-09-001: 1
  • CCMB-2007-09-002: 1
  • CCMB-2007-09-003: 1
  • CCMB-2007-09-0004: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS197 3 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • AES_competition:
    • AES:
      • AES-128: 2
      • AES: 9
  • djb:
    • ChaCha:
      • ChaCha20: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES
  • AES: 3
  • AES-128: 2
  • AES: 9
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 3 9
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 1778215
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 80
  • /Creator: MP_C2800_ST_Eng.doc - Microsoft Word
  • /CreationDate: D:20110105172042
  • /Title: MP_C2800_ST_Eng.doc
  • /Author: p000266068
  • /Producer: Acrobat PDFWriter 5.0 Windows NT
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1241817
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /Title: RICOH IM 370F/460F, nashuatec IM 370F/460F, Rex Rotary IM 370F/460F, Gestetner IM 370F/460F Security Target
  • /Author: 株式会社リコー
  • /Creator: Microsoft® Word for Microsoft 365
  • /CreationDate: D:20240501142445+09'00'
  • /ModDate: D:20240501142445+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_hyperlinks:
pdf_data/st_metadata//Author p000266068 株式会社リコー
pdf_data/st_metadata//CreationDate D:20110105172042 D:20240501142445+09'00'
pdf_data/st_metadata//Creator MP_C2800_ST_Eng.doc - Microsoft Word Microsoft® Word for Microsoft 365
pdf_data/st_metadata//Producer Acrobat PDFWriter 5.0 Windows NT Microsoft® Word for Microsoft 365
pdf_data/st_metadata//Title MP_C2800_ST_Eng.doc RICOH IM 370F/460F, nashuatec IM 370F/460F, Rex Rotary IM 370F/460F, Gestetner IM 370F/460F Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1778215 1241817
pdf_data/st_metadata/pdf_number_of_pages 80 90
dgst 5723efcbb184b84c 414ff3829b0ff6ce