Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RICOH IM C300 J-1.00
JISEC-CC-CRP-C0687-01-2020
genuscreen 4.0
BSI-DSZ-CC-0823-2014
name RICOH IM C300 J-1.00 genuscreen 4.0
category Multi-Function Devices Boundary Protection Devices and Systems
scheme JP DE
status active archived
not_valid_after 16.10.2025 30.10.2019
not_valid_before 16.10.2020 29.10.2014
report_link https://www.commoncriteriaportal.org/files/epfiles/c0687_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0823a_pdf.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/c0687_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0823b_pdf.pdf
manufacturer Ricoh Company, Ltd. GeNUA mbH
manufacturer_web https://www.genua.de/
security_level EAL2+, ALC_FLR.2 ASE_TSS.2, AVA_VAN.4, ALC_FLR.2, EAL4+
dgst 75d37bed42139156 4577a1ed977931d9
heuristics/cert_id JISEC-CC-CRP-C0687-01-2020 BSI-DSZ-CC-0823-2014
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, AVA_VAN.4, ADV_TAT.1, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 1.00 4.0
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0966-2015
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0565-2009
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0966-2015
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0382-2007, BSI-DSZ-CC-0565-2009
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0687
  • certification_date: 01.10.2020
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0687
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000131j-att/c0687_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH IM C300
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000131j-att/c0687_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000131j-att/c0687_est.pdf
    • toe_version: J-1.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date:
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0687_it9723.html
  • toe_japan_name: RICOH IM C300J-1.00
  • toe_overseas_link: None
  • toe_overseas_name: -----
protection_profile_links {} {}
pdf_data/report_filename c0687_erpt.pdf 0823a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, ASE_TSS.2, AVA_VAN.4 SOGIS Recognition Agreement for components up to EAL 4
    • cc_version: Product specific Security Target Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0823-2014
    • cert_item: genuscreen 4.0
    • cert_lab: BSI
    • developer: genua mbh
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0687-01-2020: 1
  • DE:
    • BSI-DSZ-CC-0565-2009: 3
    • BSI-DSZ-CC-0823: 1
    • BSI-DSZ-CC-0823-2014: 18
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 17
    • EAL 4 augmented: 3
    • EAL 5: 9
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 6
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 7
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 7
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
  • A:
    • A.ADMIN: 3
    • A.HANET: 3
    • A.INIT: 3
    • A.NOEVIL: 3
    • A.PHYSEC: 4
    • A.RANDOM: 4
    • A.SINGEN: 3
    • A.TIMESTMP: 2
  • OE:
    • OE.ADMIN: 1
    • OE.HANET: 1
    • OE.INIT: 1
    • OE.NOEVIL: 1
    • OE.PHYSEC: 1
    • OE.RANDOM: 1
    • OE.SINGEN: 1
    • OE.TIMESTMP: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • secuvera:
    • secuvera: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
    • SHA2:
      • SHA256: 2
      • SHA512: 2
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • TLS:
      • TLS: 2
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 10
  • SSH:
    • SSH: 15
  • VPN:
    • VPN: 6
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • BSI:
    • AIS 32: 1
    • AIS 34: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Evaluation Technical Report BSI-DSZ-CC-0823 for genuscreen 4.0 from genua mbH of secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch: 1
  • OutOfScope:
    • The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a: 1
    • or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6: 1
    • out of scope: 2
pdf_data/report_metadata
  • /CreationDate: D:20210120164632+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20210120164710+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 529921
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
pdf_data/st_filename c0687_est.pdf 0823b_pdf.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL4: 3
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 4
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_IMP: 1
    • ADV_IMP.1: 3
    • ADV_INT: 2
    • ADV_SPM: 2
    • ADV_TAT.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 3
    • AGD_PRE: 1
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_FLR: 1
    • ALC_FLR.2: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 2
    • ALC_TAT: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 3
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 1
    • ASE_REQ.1: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 4
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 2
    • ATE_FUN: 1
    • ATE_FUN.1: 4
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.4: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 18
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_GEN: 20
    • FAU_GEN.1: 5
    • FAU_GEN.2: 1
    • FAU_SAR: 12
    • FAU_SAR.1: 3
    • FAU_SAR.3: 1
  • FCS:
    • FCS_CKM: 143
    • FCS_CKM.1: 29
    • FCS_CKM.4: 31
    • FCS_COP: 100
    • FCS_COP.1: 29
  • FDP:
    • FDP_IFC: 53
    • FDP_IFC.1: 33
    • FDP_IFF: 43
    • FDP_IFF.1: 37
    • FDP_ITT: 32
    • FDP_ITT.1: 4
  • FIA:
    • FIA_ATD: 6
    • FIA_ATD.1: 1
    • FIA_SOS: 6
    • FIA_SOS.1: 1
    • FIA_UAU: 12
    • FIA_UAU.2: 1
    • FIA_UAU.6: 1
    • FIA_UID: 6
    • FIA_UID.1: 3
    • FIA_UID.2: 2
  • FMT:
    • FMT_IFC.2: 2
    • FMT_MOF: 6
    • FMT_MOF.1: 1
    • FMT_MSA: 166
    • FMT_MSA.1: 26
    • FMT_MSA.2: 4
    • FMT_MSA.3: 18
    • FMT_SMF: 49
    • FMT_SMF.1: 22
    • FMT_SMR: 8
    • FMT_SMR.1: 26
  • FPT:
    • FPT_ITT: 8
    • FPT_ITT.1: 3
    • FPT_STM.1: 3
    • FPT_TEE: 8
    • FPT_TEE.1: 2
    • FPT_TRC: 6
    • FPT_TRC.1: 1
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTP:
    • FTP_STM.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
  • A:
    • A.ADMIN: 4
    • A.HANET: 5
    • A.INIT: 4
    • A.NOEVIL: 4
    • A.PHYSEC: 4
    • A.RANDOM: 4
    • A.SINGEN: 5
    • A.TIMESTMP: 4
  • O:
    • O.AUDREC: 5
    • O.AUTH: 12
    • O.AVAIL: 5
    • O.CONFID: 13
    • O.INTEG: 9
    • O.MEDIAT: 4
    • O.NOREPLAY: 13
    • O.RS: 11
  • OE:
    • OE.ADMIN: 2
    • OE.HANET: 5
    • OE.INIT: 7
    • OE.NOEVIL: 3
    • OE.PHYSEC: 4
    • OE.RANDOM: 3
    • OE.SINGEN: 4
    • OE.TIMESTMP: 5
  • T:
    • T.MEDIAT: 4
    • T.MMODIFY: 4
    • T.MODIFY: 4
    • T.MSNIFF: 4
    • T.NOAUTH: 4
    • T.SELPRO: 4
    • T.SNIFF: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 18
  • constructions:
    • MAC:
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-256: 1
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • KEX:
    • Key Exchange: 4
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS1.2: 1
  • IKE:
    • IKE: 90
    • IKEv1: 3
  • IPsec:
    • IPsec: 34
  • SSH:
    • SSH: 136
  • VPN:
    • VPN: 17
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CTR:
    • CTR: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • secp256r1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
  • BSI:
    • AIS20: 4
    • AIS31: 4
  • FIPS:
    • FIPS180-4: 2
  • PKCS:
    • PKCS #1: 7
    • PKCS#1: 6
  • RFC:
    • RFC2104: 7
    • RFC2409: 9
    • RFC2460: 2
    • RFC2617: 1
    • RFC2965: 1
    • RFC3502: 1
    • RFC3526: 5
    • RFC3602: 1
    • RFC4253: 6
    • RFC4301: 1
    • RFC4344: 1
    • RFC4418: 7
    • RFC4432: 1
    • RFC5656: 7
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware: 1
    • out of scope: 4
    • the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and: 1
    • to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration: 1
    • when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP: 1
pdf_data/st_metadata
  • /Author: RICOH
  • /CreationDate: D:20210119110846+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20210119110846+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: RICOH IM C300 Security Target
  • pdf_file_size_bytes: 1176783
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 87
  • /Author: Roland Meister
  • /CreationDate: D:20141023133113+02'00'
  • /Creator: Writer
  • /Keywords: CC 3.1
  • /Producer: LibreOffice 4.1
  • /Subject: Common Criteria
  • /Title: genucreen 4.0 Security Target
  • pdf_file_size_bytes: 657632
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 72
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different