name |
Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300 FCU: Fax Option Type C5000 MFP Software /Hardware Version : Software System/Copy 1.22 Network Support 8.27 Scanner 01.23 Printer 1.22 Fax 04.00.00 Web Support 1.10 Web Uapl 1.08 Network Doc Box 1.03 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-13(WW) 04.04.00
|
RICOH IM 7000/8000/9000,SAVIN IM 7000/8000/9000,LANIER IM 7000/8000/9000,nashuatec IM 7000/8000/9000,Rex Rotary IM 7000/8000/9000,Gestetner IM 7000/8000/9000E-2.00
|
category |
Multi-Function Devices
|
Multi-Function Devices
|
not_valid_before |
2010-08-31
|
2024-01-31
|
not_valid_after |
2015-09-01
|
2029-01-31
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0266_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0805_est.pdf
|
status |
archived
|
active
|
manufacturer |
Ricoh Company, Ltd.
|
Ricoh Company, Ltd.
|
manufacturer_web |
https://www.ricoh.com/
|
https://www.ricoh.com/
|
security_level |
EAL3 |
ALC_FLR.2, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0266_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0805_erpt.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0805_eimg.pdf
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
2f559f0bac63e6c17f6d0ae4ac986b954868629198cc30955d7c036bd19721c5
|
state/cert/txt_hash |
None
|
99262f650349c34f0279418cf40d18118b917684b7c8ce94fee68a4fc96236ad
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
4a2725db8285c4280f1e18e1273122278ed97c7aa4bafd2877dbf4200557a88c
|
e207343958a59d284b3f0d9c6e790f86584b6118b98e288315ee15a9a368224e
|
state/report/txt_hash |
37d11d7d44bb18cebb5ba8182d96ac3ffdeaefba5f77c33246c6320aa4d95f1f
|
d0db7d0da0a6686475cb8945e6fd28b79e88d9f13e3f481b077181ef7d2f5365
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
00eb8923e3de7e92705f4d9f86598c5d6c3110ad8d88995d7368d91611ab4345
|
fd4ab2023a641da46e05ad38b6b5875290c7631c7d8cd98b6a00c4ac375a9ef9
|
state/st/txt_hash |
98830cf4fb98dba7b8104d47ab10f40cfcda2d6689fe75e56105e6bc646625b9
|
16723958b986771607b763b69ba149e9fc4e7eddbe725a99e61ced92bfc951f4
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0266
|
JISEC-CC-CRP-C0805-01-2024
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.08, 1.22, 1.03, 8.27, 04.00.00, 04.04.00, 1.10, 01.23 |
2.00 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data/cert_id |
C0266
|
C0805
|
heuristics/scheme_data/certification_date |
2010-08
|
2024-01
|
heuristics/scheme_data/claim |
EAL3
|
PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
|
heuristics/scheme_data/enhanced |
- product:
Following MFP with FCU(Fax Option Type C5000)
MFP:
Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300
FCU:
Fax Option Type C5000
- toe_version:
MFP Software /Hardware Version :
Software
System/Copy 1.22
Network Support 8.27
Scanner 01.23
Printer 1.22
Fax 04.00.00
Web Support 1.10
Web Uapl 1.08
Network Doc Box 1.03
Hardware
Ic Key 1100
Ic Ctlr 03
FCU Version : GWFCU3-13(WW) 04.04.00
- product_type:
Multi Function Product
- certification_date:
2010-08-31
- cc_version:
3.1
- assurance_level:
EAL3
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Information Technology Security Center Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0266_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0266_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0266_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions.
TOE security functionality
The major security functions of the TOE are:
-
Audit, which creates audit logs of security events.
-
Identification and Authentication, which identifies and authenticates users.
-
Document Data Access Control, which controls each users operation of documents.
-
Stored Data Protection, which encrypts stored document data on hard disk.
-
Network Communication Data Protection, which encrypts network communications.
-
Security Management, which provides total management of the security function settings.
-
Service Mode Lock, which controls the maintenance functions.
-
Telephone Line Intrusion Protection, which permits fax only communication.
-
MFP Control Software Verification, which checks the integrity of the software.
|
- product:
RICOH IM 7000/8000/9000,
SAVIN IM 7000/8000/9000,
LANIER IM 7000/8000/9000,
nashuatec IM 7000/8000/9000,
Rex Rotary IM 7000/8000/9000,
Gestetner IM 7000/8000/9000
- toe_version:
E-2.00
- product_type:
Multifunction Product
- cert_id: JISEC-C0805
- certification_date:
2029-01-31
- cc_version:
3.1 Release5
- assurance_level:
EAL2 Augmented by ALC_FLR.2
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
ECSEC Laboratory Inc., Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pyo-att/c0805_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pyo-att/c0805_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pyo-att/c0805_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices.
TOE security functionality
The major security functions of this TOE are as follows:
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
Network Protection Function: Enables the TOE to protect network communications using encryption.
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
Security Management Function: Enables the TOE administrator to control security functions.
Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software.
Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL3
|
EAL2 Augmented by ALC_FLR.2
|
heuristics/scheme_data/enhanced/cc_version |
3.1
|
3.1 Release5
|
heuristics/scheme_data/enhanced/cert_link |
https://www.ipa.go.jp/en/security/c0266_eimg.pdf
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pyo-att/c0805_eimg.pdf
|
heuristics/scheme_data/enhanced/certification_date |
2010-08-31
|
2029-01-31
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions.
TOE security functionality
The major security functions of the TOE are:
-
Audit, which creates audit logs of security events.
-
Identification and Authentication, which identifies and authenticates users.
-
Document Data Access Control, which controls each users operation of documents.
-
Stored Data Protection, which encrypts stored document data on hard disk.
-
Network Communication Data Protection, which encrypts network communications.
-
Security Management, which provides total management of the security function settings.
-
Service Mode Lock, which controls the maintenance functions.
-
Telephone Line Intrusion Protection, which permits fax only communication.
-
MFP Control Software Verification, which checks the integrity of the software.
|
PRODUCT DESCRIPTION
Description of TOE
The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices.
TOE security functionality
The major security functions of this TOE are as follows:
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
Network Protection Function: Enables the TOE to protect network communications using encryption.
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
Security Management Function: Enables the TOE administrator to control security functions.
Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software.
Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Information Technology Security Center Evaluation Department
|
ECSEC Laboratory Inc., Evaluation Center
|
heuristics/scheme_data/enhanced/product |
Following MFP with FCU(Fax Option Type C5000)
MFP:
Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300
FCU:
Fax Option Type C5000
|
RICOH IM 7000/8000/9000,
SAVIN IM 7000/8000/9000,
LANIER IM 7000/8000/9000,
nashuatec IM 7000/8000/9000,
Rex Rotary IM 7000/8000/9000,
Gestetner IM 7000/8000/9000
|
heuristics/scheme_data/enhanced/product_type |
Multi Function Product
|
Multifunction Product
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0266_erpt.pdf
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pyo-att/c0805_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0266_est.pdf
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pyo-att/c0805_est.pdf
|
heuristics/scheme_data/enhanced/toe_version |
MFP Software /Hardware Version :
Software
System/Copy 1.22
Network Support 8.27
Scanner 01.23
Printer 1.22
Fax 04.00.00
Web Support 1.10
Web Uapl 1.08
Network Doc Box 1.03
Hardware
Ic Key 1100
Ic Ctlr 03
FCU Version : GWFCU3-13(WW) 04.04.00
|
E-2.00
|
heuristics/scheme_data/enhanced/vendor |
RICOH COMPANY, LTD.
|
RICOH COMPANY, LTD.
|
heuristics/scheme_data/expiration_date |
2015-09
|
None
|
heuristics/scheme_data/supplier |
RICOH COMPANY, LTD.
|
RICOH COMPANY, LTD.
|
heuristics/scheme_data/toe_japan_name |
-----
|
-----
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0266_it0289.html
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0805_it3852.html
|
heuristics/scheme_data/toe_overseas_name |
Following MFP with FCU(Fax Option Type C5000)
MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300
FCU: Fax Option Type C5000
MFP Software /Hardware Version : < Cont. >
|
RICOH IM 7000/8000/9000,
SAVIN IM 7000/8000/9000,
LANIER IM 7000/8000/9000,
nashuatec IM 7000/8000/9000,
Rex Rotary IM 7000/8000/9000,
Gestetner IM 7000/8000/9000
E-2.00
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
c0805_eimg.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- JP:
- JISEC-CC-CRP-C0805-01-2024:
1
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
236653
- pdf_is_encrypted:
True
- pdf_number_of_pages:
2
- /Author:
- /CreationDate:
D:20240328140816+09'00'
- /Creator:
Word 用 Acrobat PDFMaker 17
- /Keywords:
- /ModDate:
D:20240328140912+09'00'
- /Producer:
Adobe PDF Library 17.11.238
- /SourceModified:
D:20240328050752
- /Subject:
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_filename |
c0266_erpt.pdf
|
c0805_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0266-01:
1
- Certification No. C0266:
1
|
- JISEC-CC-CRP-C0805-01-2024:
1
|
pdf_data/report_keywords/cc_claims/A |
- A.ADMIN:
2
- A.SUPERVISOR: 1
- A.NETWORK: 1
|
- A.ACCESS: 1
- A.USER: 1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_claims/A/A.ADMIN |
2
|
2
|
pdf_data/report_keywords/cc_claims/T |
- T.ILLEGAL_USE:
4
- T.UNAUTH_ACCESS:
7
- T.ABUSE_SEC_MNG:
3
- T.SALVAGE:
3
- T.TRANSIT:
3
- T.FAX_LINE:
3
|
- T.DOC:
3
- T.FUNC:
2
- T.PROT:
2
- T.CONF:
4
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
- EAL2:
4
- EAL2 augmented:
2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- users, receives the document data from client computers which are connected via Network, stores the confidential document data into HDD of the TOE, and performs outputting by print and delivery. Therefore, the TOE is a:
1
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- TLS:
- TLS:
- TLS:
6
- TLS 1.2:
3
- TLS 1.3:
3
- IPsec:
|
pdf_data/report_keywords/crypto_protocol/TLS |
|
- TLS:
- TLS:
6
- TLS 1.2:
3
- TLS 1.3:
3
|
pdf_data/report_keywords/crypto_protocol/TLS/TLS |
|
- TLS:
6
- TLS 1.2: 3
- TLS 1.3: 3
|
pdf_data/report_keywords/crypto_protocol/TLS/TLS/TLS |
1
|
6
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center:
3
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- BSI:
- CC:
- CCMB-2006-09-001:
2
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2007-09-004:
2
|
- CC:
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
2
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2006-09-001:
2
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2007-09-004:
2
|
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
519570
- pdf_is_encrypted:
False
- pdf_number_of_pages:
47
- /CreationDate:
D:20110216120931+09'00'
- /Author:
- /Creator:
Word 用 Acrobat PDFMaker 8.1
- /Producer:
Acrobat Distiller 8.2.3 (Windows)
- /ModDate:
D:20110216120934+09'00'
- /Title:
CRP-e
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
599759
- pdf_is_encrypted:
True
- pdf_number_of_pages:
35
- /Author:
- /Company:
- /CreationDate:
D:20240328145815+09'00'
- /Creator:
Word 用 Acrobat PDFMaker 17
- /Keywords:
- /Manager:
- /ModDate:
D:20240328145904+09'00'
- /Producer:
Adobe PDF Library 17.11.238
- /SourceModified: D:20240327021932
- /Subject:
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
|
|
pdf_data/report_metadata//CreationDate |
D:20110216120931+09'00'
|
D:20240328145815+09'00'
|
pdf_data/report_metadata//Creator |
Word 用 Acrobat PDFMaker 8.1
|
Word 用 Acrobat PDFMaker 17
|
pdf_data/report_metadata//ModDate |
D:20110216120934+09'00'
|
D:20240328145904+09'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 8.2.3 (Windows)
|
Adobe PDF Library 17.11.238
|
pdf_data/report_metadata//Title |
CRP-e
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
519570
|
599759
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
47
|
35
|
pdf_data/st_filename |
c0266_est.pdf
|
c0805_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AUDIT:
16
- O.MANAGE:
11
- O.MEM:
11
- O.NET:
9
- O.GENUINE:
9
- O.LINE_PROTECT:
7
- O.DOC_ACC:
8
- O.LINE:
1
- T:
- T.ILLEGAL_USE:
4
- T.UNAUTH_ACCESS:
3
- T.ABUSE_SEC_MNG:
4
- T.SALVAGE:
3
- T.TRANSIT:
4
- T.FAX_LINE:
3
- A:
- A.ADMIN:
5
- A.SUPERVISOR:
4
- A.NETWORK:
5
- OE:
- OE.ADMIN:
3
- OE.SUPERVISOR:
3
- OE.NETWORK:
3
|
- D:
- D.DOC:
19
- D.FUNC:
13
- D.PROT:
4
- D.CONF:
4
- O:
- O.PROT:
10
- O.DOC:
18
- O.FUNC:
9
- O.CONF:
18
- O.USER:
21
- O.INTERFACE:
9
- O.SOFTWARE:
9
- O.AUDIT:
9
- T:
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
- A:
- A.ACCESS:
5
- A.USER:
5
- A.ADMIN:
10
- OE:
- OE.AUDIT_STORAGE:
4
- OE.AUDIT_ACCESS:
3
- OE.INTERFACE:
4
- OE.PHYSICAL:
4
- OE.USER:
20
- OE.ADMIN:
8
- OE.AUDIT:
3
- OE.AUDIT_ACCESS_AUTHORIZED:
1
|
pdf_data/st_keywords/cc_claims/A |
- A.ADMIN:
5
- A.SUPERVISOR: 4
- A.NETWORK: 5
|
- A.ACCESS: 5
- A.USER: 5
- A.ADMIN:
10
|
pdf_data/st_keywords/cc_claims/A/A.ADMIN |
5
|
10
|
pdf_data/st_keywords/cc_claims/O |
- O.AUDIT:
16
- O.MANAGE: 11
- O.MEM: 11
- O.NET: 9
- O.GENUINE: 9
- O.LINE_PROTECT: 7
- O.DOC_ACC: 8
- O.LINE: 1
|
- O.PROT: 10
- O.DOC: 18
- O.FUNC: 9
- O.CONF: 18
- O.USER: 21
- O.INTERFACE: 9
- O.SOFTWARE: 9
- O.AUDIT:
9
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT |
16
|
9
|
pdf_data/st_keywords/cc_claims/OE |
- OE.ADMIN:
3
- OE.SUPERVISOR: 3
- OE.NETWORK: 3
|
- OE.AUDIT_STORAGE: 4
- OE.AUDIT_ACCESS: 3
- OE.INTERFACE: 4
- OE.PHYSICAL: 4
- OE.USER: 20
- OE.ADMIN:
8
- OE.AUDIT: 3
- OE.AUDIT_ACCESS_AUTHORIZED: 1
|
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN |
3
|
8
|
pdf_data/st_keywords/cc_claims/T |
- T.ILLEGAL_USE:
4
- T.UNAUTH_ACCESS:
3
- T.ABUSE_SEC_MNG:
4
- T.SALVAGE:
3
- T.TRANSIT:
4
- T.FAX_LINE:
3
|
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
|
- ADV_ARC.1:
1
- ADV_FSP.2: 1
- ADV_TDS.1: 2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 2
- ALC_LCD.1: 1
|
- ALC_FLR.2: 4
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_SAR.1:
11
- FAU_SAR.2:
9
- FAU_STG.1:
8
- FAU_STG.4:
8
- FAU_GEN.1.2:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FCS:
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
- FDP:
- FDP_ACC.1:
16
- FDP_ACF.1:
12
- FDP_IFC.1:
12
- FDP_IFF.1:
10
- FDP_ITC.1:
1
- FDP_ITC.2:
2
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1.1:
1
- FDP_IFF.1.1:
1
- FDP_IFF.1.2:
1
- FDP_IFF.1.3:
1
- FDP_IFF.1.4:
1
- FDP_IFF.1.5:
1
- FDP_ADF.1:
1
- FDP_ITC:
1
- FIA:
- FIA_AFL.1:
10
- FIA_ATD.1:
11
- FIA_SOS.1:
8
- FIA_UAU.2:
12
- FIA_UAU.7:
9
- FIA_UID.2:
10
- FIA_USB.1:
10
- FIA_UAU.1:
6
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UID.1:
8
- FIA_UAU.2.1:
1
- FIA_UAU.7.1:
1
- FIA_UID.2.1:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_MSA.1:
12
- FMT_MSA.3:
14
- FMT_MTD.1:
17
- FMT_SMF.1:
19
- FMT_SMR.1:
19
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_STM.1:
10
- FPT_TST.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC.1:
8
- FTP_TRP.1:
10
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
2
- FTP_TRP.1.3:
2
- FTP_TST.1:
1
|
- FAU:
- FAU_GEN.1:
13
- FAU_GEN.2:
7
- FAU_STG.1:
11
- FAU_STG.4:
8
- FAU_SAR.1:
12
- FAU_SAR.2:
10
- FAU_GEN:
1
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FDP:
- FDP_ACC.1:
30
- FDP_ACF.1:
28
- FDP_RIP.1:
5
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_ACC.1.1:
2
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_RIP:
1
- FDP_RIP.1.1:
1
- FDP_IFC.1:
4
- FIA:
- FIA_AFL.1:
9
- FIA_ATD.1:
7
- FIA_SOS.1:
8
- FIA_UAU.1:
15
- FIA_UAU.7:
8
- FIA_UID.1:
24
- FIA_USB.1:
6
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD:
1
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_MOF.1:
9
- FMT_MSA.1:
28
- FMT_MSA.3:
25
- FMT_MTD.1:
18
- FMT_SMF.1:
26
- FMT_SMR.1:
32
- FMT_MOF.1.1:
1
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_FDI_EXP.1:
11
- FPT_FDI_EXP.1.1:
2
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTA:
- FTA_SSL.3:
8
- FTA_SSL.3.1:
1
- FTP:
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_SAR.1:
11
- FAU_SAR.2:
9
- FAU_STG.1:
8
- FAU_STG.4:
8
- FAU_GEN.1.2:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG: 1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
|
- FAU_GEN.1:
13
- FAU_GEN.2: 7
- FAU_STG.1:
11
- FAU_STG.4:
8
- FAU_SAR.1:
12
- FAU_SAR.2:
10
- FAU_GEN: 1
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1: 1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
12
|
13
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 |
11
|
12
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 |
9
|
10
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 |
8
|
11
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
16
- FDP_ACF.1:
12
- FDP_IFC.1:
12
- FDP_IFF.1: 10
- FDP_ITC.1: 1
- FDP_ITC.2: 2
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1.1: 1
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ADF.1: 1
- FDP_ITC: 1
|
- FDP_ACC.1:
30
- FDP_ACF.1:
28
- FDP_RIP.1: 5
- FDP_IFF: 1
- FDP_IFC: 1
- FDP_ACC.1.1:
2
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_RIP: 1
- FDP_RIP.1.1: 1
- FDP_IFC.1:
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
16
|
30
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
12
|
28
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
12
|
4
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1:
10
- FIA_ATD.1:
11
- FIA_SOS.1:
8
- FIA_UAU.2: 12
- FIA_UAU.7:
9
- FIA_UID.2: 10
- FIA_USB.1:
10
- FIA_UAU.1:
6
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UID.1:
8
- FIA_UAU.2.1: 1
- FIA_UAU.7.1:
1
- FIA_UID.2.1: 1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
|
- FIA_AFL.1:
9
- FIA_ATD.1:
7
- FIA_SOS.1:
8
- FIA_UAU.1:
15
- FIA_UAU.7:
8
- FIA_UID.1:
24
- FIA_USB.1:
6
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD: 1
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7.1:
1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
10
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
11
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
6
|
15
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 |
9
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
8
|
24
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 |
10
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.1:
12
- FMT_MSA.3:
14
- FMT_MTD.1:
17
- FMT_SMF.1:
19
- FMT_SMR.1:
19
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_MOF.1: 9
- FMT_MSA.1:
28
- FMT_MSA.3:
25
- FMT_MTD.1:
18
- FMT_SMF.1:
26
- FMT_SMR.1:
32
- FMT_MOF.1.1: 1
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
12
|
28
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
14
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
17
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
19
|
26
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
19
|
32
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_STM.1:
10
- FPT_TST.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
- FPT_FDI_EXP: 3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
10
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
9
|
6
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
8
- FTP_TRP.1: 10
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
- FTP_TST.1: 1
|
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
8
|
12
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- TLS:
- SSL:
- TLS:
- TLS:
9
- TLS1.2:
2
- TLS1.3:
2
- IPsec:
|
pdf_data/st_keywords/crypto_protocol/TLS |
|
- SSL:
- TLS:
- TLS:
9
- TLS1.2:
2
- TLS1.3:
2
|
pdf_data/st_keywords/crypto_protocol/TLS/SSL/SSL |
9
|
4
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- BSI:
- CC:
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
- CCMB-2007-09-0004:
1
|
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
- CCMB-2007-09-0004:
1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
3
|
7
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1778215
- pdf_is_encrypted:
False
- pdf_number_of_pages:
80
- /Creator:
MP_C2800_ST_Eng.doc - Microsoft Word
- /CreationDate:
D:20110105172042
- /Title:
MP_C2800_ST_Eng.doc
- /Author:
p000266068
- /Producer:
Acrobat PDFWriter 5.0 Windows NT
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1321388
- pdf_is_encrypted:
False
- pdf_number_of_pages:
97
- /Title:
RICOH IM 7000/8000/9000,SAVIN IM 7000/8000/9000,LANIER IM 7000/8000/9000,nashuatec IM 7000/8000/9000,Rex Rotary IM 7000/8000/9000,Gestetner IM 7000/8000/9000 Security Target
- /Author:
株式会社リコー
- /Creator:
Microsoft® Word for Microsoft 365
- /CreationDate:
D:20240311165832+09'00'
- /ModDate: D:20240311165832+09'00'
- /Producer:
Microsoft® Word for Microsoft 365
- pdf_hyperlinks:
https://support.ricoh.com/services/device/ccmanual/IM_7000_8000_9000-re/en/Guidance_aa.zip
|
pdf_data/st_metadata//Author |
p000266068
|
株式会社リコー
|
pdf_data/st_metadata//CreationDate |
D:20110105172042
|
D:20240311165832+09'00'
|
pdf_data/st_metadata//Creator |
MP_C2800_ST_Eng.doc - Microsoft Word
|
Microsoft® Word for Microsoft 365
|
pdf_data/st_metadata//Producer |
Acrobat PDFWriter 5.0 Windows NT
|
Microsoft® Word for Microsoft 365
|
pdf_data/st_metadata//Title |
MP_C2800_ST_Eng.doc
|
RICOH IM 7000/8000/9000,SAVIN IM 7000/8000/9000,LANIER IM 7000/8000/9000,nashuatec IM 7000/8000/9000,Rex Rotary IM 7000/8000/9000,Gestetner IM 7000/8000/9000 Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
1778215
|
1321388
|
pdf_data/st_metadata/pdf_hyperlinks |
|
https://support.ricoh.com/services/device/ccmanual/IM_7000_8000_9000-re/en/Guidance_aa.zip |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
80
|
97
|
dgst |
5723efcbb184b84c
|
ee2b1332440ad337
|