Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

MP C3004/C3504 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) E-1.00
JISEC-CC-CRP-C0526
RICOH IM C530F/C530FB, SAVIN IM C530FB, LANIER IM C530FB, nashuatec IM C530F/C530FB, Rex Rotary IM C530F/C530FB, Gestetner IM C530F/C530FB E-1.00
JISEC-CC-CRP-C0754-01-2022
name MP C3004/C3504 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) E-1.00 RICOH IM C530F/C530FB, SAVIN IM C530FB, LANIER IM C530FB, nashuatec IM C530F/C530FB, Rex Rotary IM C530F/C530FB, Gestetner IM C530F/C530FB E-1.00
not_valid_before 2016-10-27 2022-07-26
not_valid_after 2021-10-27 2027-07-26
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0526_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0754_est.pdf
status archived active
security_level ALC_FLR.2, EAL2+ EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0526_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0754_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0526_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0754_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/cert/pdf_hash dcdb1d5af16ecb8903409e61575c813a779ef65e167e2077dba988cdc25aa047 1057f168d126643f3a12b61693d35b93b1018ff7c016fe6df51ef3f60c823bb3
state/cert/txt_hash 4cc78c60ecfd875eeac5c1e31f5d9b8eb2f6f1da8d7e9c96edd7a6605399332d bc6da80240465ecdd0cb9c61156e88d79682f495b9521c9082c93438f3baf500
state/report/pdf_hash 5e8f591fc96f5bdc517556f9b5e8328688a527f353b71e1d5df5ccf650482f17 1899121bcb5ce11f811ff0641eb4358dbbbdc580c65a8218c7a02cd870e8ee67
state/report/txt_hash 08ddd8355d9fbec544f9cdcba38a703bcab52b26b6b8c70538e443d231ce1b8d bdfbd453d5b12eed7e32f6f33d977c38a258f11cf944a54dba77ea2d05746353
state/st/pdf_hash 6ac32c0fea06baed42a45682ad91023828811bfa82c36ad0cf8810bb47669e64 abfe1d4911718d7ae119338cc53faabe4e797911b565d32a4a62888c03e951e2
state/st/txt_hash 4eca2b7324d9deae97c33719f3aa109684ad9f668abc9724c504fee90b9d9117 20bf9f96d4be12ae9f8e3c89e4e4a1b4d38085433edbb6fab8392babc0c5692e
heuristics/cert_id JISEC-CC-CRP-C0526 JISEC-CC-CRP-C0754-01-2022
heuristics/cpe_matches cpe:2.3:h:ricoh:mp_c3504:-:*:*:*:*:*:*:*, cpe:2.3:h:ricoh:mp_c3004:-:*:*:*:*:*:*:* None
heuristics/scheme_data/cert_id C0526 C0754
heuristics/scheme_data/certification_date 2016-10 2022-07
heuristics/scheme_data/claim EAL2+ALC_FLR.2PP EAL2
heuristics/scheme_data/enhanced
  • product: MP C3004/C3504 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec)
  • toe_version: E-1.00
  • product_type: Multi Function Product
  • certification_date: 2016-10-27
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented with ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0526_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0526_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0526_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: RICOH IM C530F/C530FB, SAVIN IM C530FB, LANIER IM C530FB, nashuatec IM C530F/C530FB, Rex Rotary IM C530F/C530FB, Gestetner IM C530F/C530FB
  • toe_version: E-1.00
  • product_type: Multifunction Product
  • cert_id: JISEC-C0754
  • certification_date: 2022-07-26
  • cc_version: 3.1 Release5
  • assurance_level: EAL2
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000hci-att/c0754_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000hci-att/c0754_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000hci-att/c0754_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, and Fax functions. The TOE provides security functions to prevent unauthorized disclosure and alteration of user data and security function setting data. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Network Protection Function: Enables the TOE to protect network communications using encryption. Stored Data Protection Function: Enables the TOE to protect the stored data using encryption. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
heuristics/scheme_data/enhanced/assurance_level EAL2 Augmented with ALC_FLR.2 EAL2
heuristics/scheme_data/enhanced/cc_version 3.1 Release4 3.1 Release5
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0526_eimg.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000hci-att/c0754_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2016-10-27 2022-07-26
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, and Fax functions. The TOE provides security functions to prevent unauthorized disclosure and alteration of user data and security function setting data. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Network Protection Function: Enables the TOE to protect network communications using encryption. Stored Data Protection Function: Enables the TOE to protect the stored data using encryption. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
heuristics/scheme_data/enhanced/product MP C3004/C3504 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) RICOH IM C530F/C530FB, SAVIN IM C530FB, LANIER IM C530FB, nashuatec IM C530F/C530FB, Rex Rotary IM C530F/C530FB, Gestetner IM C530F/C530FB
heuristics/scheme_data/enhanced/product_type Multi Function Product Multifunction Product
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0526_erpt.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000hci-att/c0754_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0526_est.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000hci-att/c0754_est.pdf
heuristics/scheme_data/expiration_date 2021-11 None
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0526_it5578.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0754_it1790.html
heuristics/scheme_data/toe_overseas_name MP C3004/C3504 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) E-1.00 RICOH IM C530F/C530FB, SAVIN IM C530FB, LANIER IM C530FB, nashuatec IM C530F/C530FB, Rex Rotary IM C530F/C530FB, Gestetner IM C530F/C530FBE-1.00
pdf_data/cert_filename c0526_eimg.pdf c0754_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0754-01-2022: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_metadata//CreationDate D:20170710170410+09'00' D:20220905155837+09'00'
pdf_data/cert_metadata//Creator Microsoft® Word 2010 Microsoft® Word 2019
pdf_data/cert_metadata//ModDate D:20170710170523+09'00' D:20220909134631+09'00'
pdf_data/cert_metadata//Producer Microsoft® Word 2010 Microsoft® Word 2019
pdf_data/cert_metadata/pdf_file_size_bytes 477895 89115
pdf_data/cert_metadata/pdf_number_of_pages 1 2
pdf_data/report_filename c0526_erpt.pdf c0754_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0526-01: 1
  • Certification No. C0526: 1
  • JISEC-CC-CRP-C0754-01-2022: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.PHYSICAL_PROTECTION: 1
  • A.NETWORK_PROTECTION: 1
  • A.USER: 1
  • A.ADMIN: 1
  • A.TRUSTED_ADMIN: 1
pdf_data/report_keywords/cc_claims/A/A.ADMIN 2 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 2
  • T.FUNC: 1
  • T.PROT: 1
  • T.CONF: 2
  • T.DOCUMENT_DATA_DIS: 2
  • T.DOCUMENT_DATA_ALT: 1
  • T.JOB_ALT: 2
  • T.PROTECT_DATA_ALT: 2
  • T.CONFIDENTIAL_DATA_DIS: 2
  • T.CONFIDENTIAL_DATA_ALT: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2 augmented: 2
  • EAL2: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • IPsec:
    • IPsec: 4
  • TLS:
    • TLS:
      • TLS: 9
      • TLS 1.2: 1
pdf_data/report_keywords/crypto_protocol/TLS/TLS
  • TLS: 2
  • TLS: 9
  • TLS 1.2: 1
pdf_data/report_keywords/crypto_protocol/TLS/TLS/TLS 2 9
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 478093
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
  • /Author:
  • /CreationDate: D:20170104112801+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /Keywords:
  • /ModDate: D:20170104112851+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 518669
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 32
  • /CreationDate: D:20220929092554+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20220929092926+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20170104112801+09'00' D:20220929092554+09'00'
pdf_data/report_metadata//Creator Word 用 Acrobat PDFMaker 11 Microsoft® Word 2019
pdf_data/report_metadata//ModDate D:20170104112851+09'00' D:20220929092926+09'00'
pdf_data/report_metadata//Producer Adobe PDF Library 11.0 Microsoft® Word 2019
pdf_data/report_metadata/pdf_file_size_bytes 478093 518669
pdf_data/report_metadata/pdf_number_of_pages 38 32
pdf_data/st_filename c0526_est.pdf c0754_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.STORAGE: 14
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • O:
    • O.DOCUMENT_DATA_DIS: 16
    • O.DOCUMENT_DATA_ALT: 13
    • O.JOB_ALT: 16
    • O.PROTECT_DATA_ALT: 13
    • O.CONFIDENTIAL_DATA_DIS: 15
    • O.CONFIDENTIAL_DATA_ALT: 12
    • O.AUTHORIZATION: 28
    • O.FAX: 8
    • O.VALIDATION: 10
    • O.AUDIT: 12
    • O.EMMC_ENCRYPTION: 12
  • T:
    • T.DOCUMENT_DATA_DIS: 4
    • T.DOCUMENT_DATA_ALT: 4
    • T.PROTECT_DATA_ALT: 4
    • T.CONFIDENTIAL_DATA_DIS: 4
    • T.CONFIDENTIAL_DATA_ALT: 4
    • T.JOB_ALT: 2
    • T.APPLICATIONS_ALT: 1
  • A:
    • A.PHYSICAL_PROTECTION: 4
    • A.NETWORK_PROTECTION: 4
    • A.USER: 4
    • A.ADMIN: 4
    • A.TRUSTED_ADMIN: 4
  • OE:
    • OE.AUDIT: 4
    • OE.PHYSICAL_PROTECTION: 4
    • OE.NETWORK_PROTECTION: 3
    • OE.AUTHORIZED_USER: 16
    • OE.TRAINED_USER: 4
    • OE.TRAINED_ADMIN: 4
    • OE.TRUSTED_ADMIN: 3
    • OE.AUDIT_MANAGE: 3
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 5
  • A.USER: 4
  • A.ADMIN: 10
  • A.PHYSICAL_PROTECTION: 4
  • A.NETWORK_PROTECTION: 4
  • A.USER: 4
  • A.ADMIN: 4
  • A.TRUSTED_ADMIN: 4
pdf_data/st_keywords/cc_claims/A/A.ADMIN 10 4
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.DOCUMENT_DATA_DIS: 16
  • O.DOCUMENT_DATA_ALT: 13
  • O.JOB_ALT: 16
  • O.PROTECT_DATA_ALT: 13
  • O.CONFIDENTIAL_DATA_DIS: 15
  • O.CONFIDENTIAL_DATA_ALT: 12
  • O.AUTHORIZATION: 28
  • O.FAX: 8
  • O.VALIDATION: 10
  • O.AUDIT: 12
  • O.EMMC_ENCRYPTION: 12
pdf_data/st_keywords/cc_claims/O/O.AUDIT 9 12
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 3
  • OE.AUDIT_ACCESS: 2
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 4
  • OE.USER: 21
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • OE.AUDIT: 4
  • OE.PHYSICAL_PROTECTION: 4
  • OE.NETWORK_PROTECTION: 3
  • OE.AUTHORIZED_USER: 16
  • OE.TRAINED_USER: 4
  • OE.TRAINED_ADMIN: 4
  • OE.TRUSTED_ADMIN: 3
  • OE.AUDIT_MANAGE: 3
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT 3 4
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 14
  • T.FUNC: 7
  • T.PROT: 5
  • T.CONF: 10
  • T.DOCUMENT_DATA_DIS: 4
  • T.DOCUMENT_DATA_ALT: 4
  • T.PROTECT_DATA_ALT: 4
  • T.CONFIDENTIAL_DATA_DIS: 4
  • T.CONFIDENTIAL_DATA_ALT: 4
  • T.JOB_ALT: 2
  • T.APPLICATIONS_ALT: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL2 1 5
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 12 13
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 6 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 11
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 8 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 9 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 7
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 11
  • FCS_COP.1: 10
  • FCS_CKM.2: 2
  • FCS_CKM.4: 7
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.1: 12
  • FCS_CKM.4: 12
  • FCS_COP.1: 9
  • FCS_CKM.2: 2
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 11 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 7 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 10 9
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF.1: 31
  • FDP_ACF.1.1: 3
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 3
  • FDP_ACC.1: 31
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 2
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
  • FDP_FXS_EXP: 2
  • FDP_ACC.1: 16
  • FDP_ACF.1: 16
  • FDP_FXS_EXP.1: 12
  • FDP_FXS_EXP.1.1: 2
  • FDP_ITC.1: 4
  • FDP_ITC.2: 4
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 31 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 31 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 2 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 2 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 7
  • FIA_ATD.1: 9
  • FIA_SOS.1: 7
  • FIA_UAU.1: 14
  • FIA_UAU.7: 7
  • FIA_UID.1: 30
  • FIA_USB.1: 8
  • FIA_AFL: 1
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 9 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 8 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 8 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 18 30
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 6 8
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMF.1: 23
  • FMT_SMR.1: 29
  • FMT_MSA.3: 22
  • FMT_MSA.1: 20
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MOF.1: 7
  • FMT_MSA.1: 14
  • FMT_MSA.3: 14
  • FMT_MTD.1: 25
  • FMT_SMF.1: 25
  • FMT_SMR.1: 30
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 12 25
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 23 25
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 29 30
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 5
  • FPT_FDI_EXP.1: 11
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1: 6
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_TST_EXP: 2
  • FPT_STM.1: 9
  • FPT_TST_EXP.1: 12
  • FPT_TST_EXP.1.1: 2
  • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 17 18
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 4 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS1.0: 1
      • TLS1.1: 1
      • TLS1.2: 1
  • IPsec:
    • IPsec: 10
  • TLS:
    • SSL:
      • SSL: 5
    • TLS:
      • TLS: 8
      • TLS1.2: 3
pdf_data/st_keywords/crypto_protocol/TLS
  • TLS:
    • TLS1.0: 1
    • TLS1.1: 1
    • TLS1.2: 1
  • SSL:
    • SSL: 5
  • TLS:
    • TLS: 8
    • TLS1.2: 3
pdf_data/st_keywords/crypto_protocol/TLS/TLS
  • TLS1.0: 1
  • TLS1.1: 1
  • TLS1.2: 1
  • TLS: 8
  • TLS1.2: 3
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS1.2 1 3
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 1
  • SHA2:
    • SHA256: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
pdf_data/st_keywords/standard_id/NIST
  • NIST SP 800-90: 2
  • NIST SP 800-90A: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 4
  • AES_competition:
    • AES:
      • AES: 5
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 6 5
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata//Author RICOH 株式会社リコー
pdf_data/st_metadata//CreationDate D:20161117135522+09'00' D:20220927151612+09'00'
pdf_data/st_metadata//Creator Microsoft® Word 2013 Microsoft® Word for Microsoft 365
pdf_data/st_metadata//ModDate D:20161117135522+09'00' D:20220927151612+09'00'
pdf_data/st_metadata//Producer Microsoft® Word 2013 Microsoft® Word for Microsoft 365
pdf_data/st_metadata//Title MP C3004/C3504 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) Security Target RICOH IM C530F/C530FB, SAVIN IM C530FB, LANIER IM C530FB, nashuatec IM C530F/C530FB, Rex Rotary IM C530F/C530FB, Gestetner IM C530F/C530FB Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1554569 1101447
pdf_data/st_metadata/pdf_number_of_pages 87 79
dgst 596462f665795d0d 7b007e541d1e3686