Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Dell C7765dn Color Multifunction Printer Version: Controller ROM Ver. 2.205.5 IOT ROM Ver. 41.1.0 ADF ROM Ver. 12.5.0
JISEC-CC-CRP-C0438
Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, RPCS 3.12.18, RPCS Font 1.03, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01
JISEC-CC-CRP-C0346
name Dell C7765dn Color Multifunction Printer Version: Controller ROM Ver. 2.205.5 IOT ROM Ver. 41.1.0 ADF ROM Ver. 12.5.0 Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, RPCS 3.12.18, RPCS Font 1.03, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01
not_valid_before 2014-09-25 2012-04-26
not_valid_after 2019-10-03 2017-02-07
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0438_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0346_est.pdf
manufacturer Dell, Inc. Ricoh Company, Ltd.
manufacturer_web https://www.dell.com https://www.ricoh.com/
security_level EAL3 ALC_FLR.2, EAL3+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0438_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0346_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})})
state/report/pdf_hash 6e5c988511138b986065e70033a0ba59e1be5c6a9e72afdf7fa176317d433f33 4fdb1c22896cb61d84e1d905a9dd483cdb1b0f01fa43308a8c25e5e38288edff
state/report/txt_hash 5cdbde88f8de8f00231b4d3fad02a9971e503b38c63b1e85e4732decf6c4ff05 83dce21933dd325ca3df6f4c1db2beaf8b5c797bb789218970cdcd46a94a4796
state/st/pdf_hash 4f860044b6d04d7228c2c1e8f9f0a3cdcae33b88cb2a13e5962177373af5f538 bfa267c1c830830a6f2147163ab9c01a487b15ea1a218fbd28687a358d91f2ed
state/st/txt_hash 5e9d60562562d31983fb68075c00e8e0b26b47b3fd9e65179d176496c558ef18 c7c1c4ffdcc26c41852f8eea6eec03a0114905ae9b1aba7e6e892b689c24b8bf
heuristics/cert_id JISEC-CC-CRP-C0438 JISEC-CC-CRP-C0346
heuristics/extracted_versions 2.205.5, 12.5.0, 41.1.0 1.00.2, 1.02, 3.12.18, 11.75, 1.03, 3.5, 01.00.01, 1.00.1, 01.04, 01.01.00, 1.00
heuristics/scheme_data
  • cert_id: C0438
  • supplier: Dell Inc.
  • toe_overseas_name: Dell C7765dn Color Multifunction PrinterController ROM Ver. 2.205.5, IOT ROM Ver. 41.1.0, ADF ROM Ver. 12.5.0
  • expiration_date: 2019-10
  • claim: EAL3
  • certification_date: 2014-09
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0438_it3446.html
  • toe_japan_name: Dell C7765dn Color Multifunction PrinterController ROM Ver. 2.205.5, IOT ROM Ver. 41.1.0, ADF ROM Ver. 12.5.0
  • enhanced:
    • product: Dell C7765dn Color Multifunction Printer
    • toe_version: Controller ROM Ver. 2.205.5 IOT ROM Ver. 41.1.0 ADF ROM Ver. 12.5.0
    • product_type: Multi Function Device
    • certification_date: 2014-09-25
    • cc_version: 3.1 Release4
    • assurance_level: EAL3
    • vendor: Dell Inc.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/c0438_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0438_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0438_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security - Self Test
  • cert_id: C0346
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: -----
  • expiration_date: 2017-02
  • claim: EAL3+ ALC_FLR.2 PP
  • certification_date: 2012-04
  • toe_overseas_link: None
  • toe_japan_name: Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support, 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, RPCS 3.12.18, RPCS Font 1.03, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0346_it1363.html
  • enhanced:
    • product: Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions
    • toe_version: -Software: System/Copy 1.00.2 Network Support 11.75 Fax 01.01.00 RemoteFax 01.01.00 NetworkDocBox 1.00.1 Web Support 1.03 Web Uapl 1.02 animation 1.00 Scanner 01.04 Printer 1.00.1 RPCS 3.12.18 RPCS Font 1.03 Data Erase Onb 1.03m GWFCU3.5-2(WW) 01.00.01 Engine 1.00:03 OpePanel 1.02 LANG0 1.02 LANG1 1.02 -Hardware: Ic Key 01020714 Ic Hdd 01
    • product_type: Multi Function Product
    • certification_date: 2012-04-26
    • cc_version: 3.1
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • protection_profile: IEEE Std 2600.1-2009
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0346_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0346_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0346_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/cert_id C0438 C0346
heuristics/scheme_data/certification_date 2014-09 2012-04
heuristics/scheme_data/claim EAL3 EAL3+ ALC_FLR.2 PP
heuristics/scheme_data/enhanced
  • product: Dell C7765dn Color Multifunction Printer
  • toe_version: Controller ROM Ver. 2.205.5 IOT ROM Ver. 41.1.0 ADF ROM Ver. 12.5.0
  • product_type: Multi Function Device
  • certification_date: 2014-09-25
  • cc_version: 3.1 Release4
  • assurance_level: EAL3
  • vendor: Dell Inc.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0438_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0438_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0438_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security - Self Test
  • product: Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions
  • toe_version: -Software: System/Copy 1.00.2 Network Support 11.75 Fax 01.01.00 RemoteFax 01.01.00 NetworkDocBox 1.00.1 Web Support 1.03 Web Uapl 1.02 animation 1.00 Scanner 01.04 Printer 1.00.1 RPCS 3.12.18 RPCS Font 1.03 Data Erase Onb 1.03m GWFCU3.5-2(WW) 01.00.01 Engine 1.00:03 OpePanel 1.02 LANG0 1.02 LANG1 1.02 -Hardware: Ic Key 01020714 Ic Hdd 01
  • product_type: Multi Function Product
  • certification_date: 2012-04-26
  • cc_version: 3.1
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1-2009
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0346_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0346_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0346_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/assurance_level EAL3 EAL3 Augmented with ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 3.1 Release4 3.1
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0438_eimg.pdf https://www.ipa.go.jp/en/security/c0346_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2014-09-25 2012-04-26
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security - Self Test PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/evaluation_facility Information Technology Security Center Evaluation Department Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
heuristics/scheme_data/enhanced/product Dell C7765dn Color Multifunction Printer Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions
heuristics/scheme_data/enhanced/product_type Multi Function Device Multi Function Product
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0438_erpt.pdf https://www.ipa.go.jp/en/security/c0346_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0438_est.pdf https://www.ipa.go.jp/en/security/c0346_est.pdf
heuristics/scheme_data/enhanced/toe_version Controller ROM Ver. 2.205.5 IOT ROM Ver. 41.1.0 ADF ROM Ver. 12.5.0 -Software: System/Copy 1.00.2 Network Support 11.75 Fax 01.01.00 RemoteFax 01.01.00 NetworkDocBox 1.00.1 Web Support 1.03 Web Uapl 1.02 animation 1.00 Scanner 01.04 Printer 1.00.1 RPCS 3.12.18 RPCS Font 1.03 Data Erase Onb 1.03m GWFCU3.5-2(WW) 01.00.01 Engine 1.00:03 OpePanel 1.02 LANG0 1.02 LANG1 1.02 -Hardware: Ic Key 01020714 Ic Hdd 01
heuristics/scheme_data/enhanced/vendor Dell Inc. RICOH COMPANY, LTD.
heuristics/scheme_data/expiration_date 2019-10 2017-02
heuristics/scheme_data/supplier Dell Inc. RICOH COMPANY, LTD.
heuristics/scheme_data/toe_japan_name Dell C7765dn Color Multifunction PrinterController ROM Ver. 2.205.5, IOT ROM Ver. 41.1.0, ADF ROM Ver. 12.5.0 Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support, 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, RPCS 3.12.18, RPCS Font 1.03, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0438_it3446.html None
heuristics/scheme_data/toe_overseas_name Dell C7765dn Color Multifunction PrinterController ROM Ver. 2.205.5, IOT ROM Ver. 41.1.0, ADF ROM Ver. 12.5.0 -----
pdf_data/report_filename c0438_erpt.pdf c0346_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0438-01: 1
  • Certification No. C0438: 1
  • CRP-C0346-01: 1
  • Certification No. C0346: 1
pdf_data/report_keywords/cc_claims/A
  • A.ADMIN: 1
  • A.USER: 1
  • A.SECMODE: 1
  • A.ACCESS: 1
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
pdf_data/report_keywords/cc_claims/A/A.ADMIN 1 2
pdf_data/report_keywords/cc_claims/T
  • T.CONSUME: 2
  • T.DATA_SEC: 2
  • T.CONFDATA: 2
  • T.RECOVER: 2
  • T.COMM_TAP: 2
  • T.DOC: 2
  • T.FUNC: 1
  • T.PROT: 1
  • T.CONF: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3: 4
  • EAL3 augmented: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL 3.0: 1
      • SSL: 1
    • TLS:
      • TLS 1.0: 1
      • TLS 1.2: 1
  • TLS:
    • SSL:
      • SSL: 3
  • IPsec:
    • IPsec: 4
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL 3.0: 1
    • SSL: 1
  • TLS:
    • TLS 1.0: 1
    • TLS 1.2: 1
  • SSL:
    • SSL: 3
pdf_data/report_keywords/crypto_protocol/TLS/SSL
  • SSL 3.0: 1
  • SSL: 1
  • SSL: 3
pdf_data/report_keywords/crypto_protocol/TLS/SSL/SSL 1 3
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 5
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 11
pdf_data/report_metadata
  • pdf_file_size_bytes: 346820
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
  • /CreationDate: D:20141112134616+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20141112134721+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 288448
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
  • /Author:
  • /CreationDate: D:20120522165506+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20120522170807+09'00'
  • /Producer: Acrobat Distiller 9.5.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20141112134616+09'00' D:20120522165506+09'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 PScript5.dll Version 5.2.2
pdf_data/report_metadata//ModDate D:20141112134721+09'00' D:20120522170807+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 9.5.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 346820 288448
pdf_data/st_filename c0438_est.pdf c0346_est.pdf
pdf_data/st_keywords/cc_claims/A
  • A.ADMIN: 5
  • A.USER: 3
  • A.SECMODE: 5
  • A.ACCESS: 3
  • A.ACCESS: 5
  • A.USER: 4
  • A.ADMIN: 10
pdf_data/st_keywords/cc_claims/A/A.ACCESS 3 5
pdf_data/st_keywords/cc_claims/A/A.ADMIN 5 10
pdf_data/st_keywords/cc_claims/A/A.USER 3 4
pdf_data/st_keywords/cc_claims/O
  • O.AUDITS: 8
  • O.CIPHER: 6
  • O.COMM_SEC: 7
  • O.FAX_SEC: 5
  • O.MANAGE: 9
  • O.RESIDUAL: 4
  • O.USER: 7
  • O.RESTRICT: 7
  • O.VERIFY: 4
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_claims/O/O.USER 7 21
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 3
  • OE.USER: 3
  • OE.SEC: 9
  • OE.PHYSICAL: 3
  • OE.AUDIT_STORAGE: 3
  • OE.AUDIT_ACCESS: 2
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 4
  • OE.USER: 21
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 3 8
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL 3 4
pdf_data/st_keywords/cc_claims/OE/OE.USER 3 21
pdf_data/st_keywords/cc_claims/T
  • T.RECOVER: 5
  • T.CONFDATA: 3
  • T.DATA_SEC: 3
  • T.COMM_TAP: 5
  • T.CONSUME: 5
  • T.DOC: 10
  • T.FUNC: 5
  • T.PROT: 5
  • T.CONF: 10
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.2 1 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 1 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 1 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 6
  • EAL 3: 1
  • EAL3: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL3 6 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.2: 8
    • FAU_STG.1: 10
    • FAU_STG.4: 8
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_STG: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACF.1: 10
    • FDP_IFC.1: 11
    • FDP_IFF.1: 10
    • FDP_RIP.1: 8
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 1
    • FDP_IFF: 1
  • FIA:
    • FIA_AFL.1: 30
    • FIA_ATD.1: 9
    • FIA_SOS.1: 6
    • FIA_UAU.1: 19
    • FIA_UAU.7: 9
    • FIA_UID.1: 15
    • FIA_USB.1: 8
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_UIA.1: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 11
    • FMT_MSA.3: 11
    • FMT_MTD.1: 11
    • FMT_SMF.1: 17
    • FMT_SMR.1: 15
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 2
  • FPT:
    • FPT_STM.1: 10
    • FPT_TST.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_STG.1: 9
    • FAU_STG.4: 8
    • FAU_SAR.1: 10
    • FAU_SAR.2: 8
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_ACC.1: 31
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 9
    • FIA_UAU.7: 8
    • FIA_SOS.1: 10
    • FIA_UAU.1: 31
    • FIA_UID.1: 39
    • FIA_UAU.2: 12
    • FIA_UID.2: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMF.1: 22
    • FMT_SMR.1: 29
    • FMT_MSA.3: 23
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TST.1: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 9
  • FAU_SAR.2: 8
  • FAU_STG.1: 10
  • FAU_STG.4: 8
  • FAU_GEN.1.2: 1
  • FAU_SAR: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 2
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_STG: 1
  • FAU_STG.1: 9
  • FAU_STG.4: 8
  • FAU_SAR.1: 10
  • FAU_SAR.2: 8
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 9 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 2 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 10 9
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 11
  • FCS_COP.1: 10
  • FCS_CKM.2: 1
  • FCS_CKM.4: 3
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM: 1
  • FCS_CKM.1: 11
  • FCS_COP.1: 10
  • FCS_CKM.2: 2
  • FCS_CKM.4: 7
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 1 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 3 7
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 12
  • FDP_ACF.1: 10
  • FDP_IFC.1: 11
  • FDP_IFF.1: 10
  • FDP_RIP.1: 8
  • FDP_ITC.1: 1
  • FDP_ITC.2: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_RIP.1.1: 1
  • FDP_IFF: 1
  • FDP_ACF.1: 31
  • FDP_ACF.1.1: 3
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 3
  • FDP_ACC.1: 31
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 2
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 12 31
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 10 31
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 1 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 1 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 1 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 1 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 11 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 1 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 30
  • FIA_ATD.1: 9
  • FIA_SOS.1: 6
  • FIA_UAU.1: 19
  • FIA_UAU.7: 9
  • FIA_UID.1: 15
  • FIA_USB.1: 8
  • FIA_AFL.1.1: 4
  • FIA_AFL.1.2: 4
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UIA.1: 1
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 30 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 4 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 4 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 9 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 6 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 19 31
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 9 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 15 39
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 8 7
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MOF.1: 9
  • FMT_MSA.1: 11
  • FMT_MSA.3: 11
  • FMT_MTD.1: 11
  • FMT_SMF.1: 17
  • FMT_SMR.1: 15
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 2
  • FMT_SMF.1: 22
  • FMT_SMR.1: 29
  • FMT_MSA.3: 23
  • FMT_MSA.1: 20
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 11 20
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 23
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 11 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 17 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 15 29
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 10
  • FPT_TST.1: 8
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_FDI_EXP: 5
  • FPT_FDI_EXP.1: 11
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1: 5
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 10 9
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 8 5
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_TRP.1: 8
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 1
  • FTP_TRP.1.3: 1
  • FTP_ITC.1: 21
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TST.1: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 4
      • SHA-1: 8
    • SHA2:
      • SHA256: 3
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/side_channel_analysis
  • other:
    • cold boot: 1
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • X509:
    • X.509: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 197: 1
  • FIPS197: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
    • RC:
      • RC4: 1
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • Triple-DES: 2
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3DES: 6
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 12
  • RC:
    • RC4: 1
  • AES:
    • AES: 7
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 12 7
pdf_data/st_keywords/symmetric_crypto/DES
  • DES:
    • DES: 1
  • 3DES:
    • Triple-DES: 2
  • 3DES:
    • 3DES: 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 2
  • 3DES: 6
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_metadata//Author rskak1200296
pdf_data/st_metadata//CreationDate D:20141014111149+09'00' D:20120413143029+09'00'
pdf_data/st_metadata//ModDate D:20141014111149+09'00' D:20120413143029+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 10.1.12 (Windows) Acrobat Distiller 7.0.5 (Windows)
pdf_data/st_metadata//Title Microsoft Word - MP_5002_ST_DOM_1.00_ENG_0.02.doc
pdf_data/st_metadata/pdf_file_size_bytes 500834 559869
pdf_data/st_metadata/pdf_number_of_pages 95 91
dgst 61a92cc272926e40 f4d6197758691b89