Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RICOH IM C300 J-1.00
JISEC-CC-CRP-C0687-01-2020
McAfee Data Loss Prevention Endpoint 9.4 and ePolicy Orchestrator 5.1.3
383-4-342
name RICOH IM C300 J-1.00 McAfee Data Loss Prevention Endpoint 9.4 and ePolicy Orchestrator 5.1.3
category Multi-Function Devices Data Protection
scheme JP CA
status active archived
not_valid_after 16.10.2025 07.12.2020
not_valid_before 16.10.2020 07.12.2015
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-342%20CT%20v1.0e.docx
report_link https://www.commoncriteriaportal.org/files/epfiles/c0687_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-342%20CR%20v1.0e.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/c0687_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-342%20MFE%20DLPe%209-4%20ST.pdf
manufacturer Ricoh Company, Ltd. Intel Corporation
manufacturer_web https://www.intel.com
dgst 75d37bed42139156 7a4b19b2dffe8008
heuristics/cert_id JISEC-CC-CRP-C0687-01-2020 383-4-342
heuristics/cert_lab [] CANADA
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1
heuristics/extracted_versions 1.00 5.1.3, 9.4
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0687
  • certification_date: 01.10.2020
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0687
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000131j-att/c0687_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH IM C300
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000131j-att/c0687_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000131j-att/c0687_est.pdf
    • toe_version: J-1.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date:
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0687_it9723.html
  • toe_japan_name: RICOH IM C300J-1.00
  • toe_overseas_link: None
  • toe_overseas_name: -----
maintenance_updates
protection_profile_links {} {}
pdf_data/cert_filename 383-4-342 CT v1.0e.docx
pdf_data/report_filename c0687_erpt.pdf 383-4-342 CR v1.0e.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
    • cert_id: 383-4-342-CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0687-01-2020: 1
  • CA:
    • 383-4-342-CR: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 2+: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ALC:
    • ALC_FLR.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
  • OpenSSL:
    • OpenSSL: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /CreationDate: D:20210120164632+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20210120164710+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 529921
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /Author: White, Debra E.
  • /CR version: 1.0
  • /Company: CSEC-CSTC
  • /CreationDate: D:20160119103055-05'00'
  • /Creator: Acrobat PDFMaker 11 for Word
  • /Developer name: Intel Corporation
  • /Document number: 383-4-342-CR
  • /ETR title, version, date: McAfee Data Loss Prevention Endpoint 9.4 and ePolicy Orchestrator 5.1.3 Common Criteria EAL 2+ Evaluation Technical Report, Version 1.2, December 7, 2015
  • /Evaluation completion date: 07 December 2015
  • /ModDate: D:20160119103059-05'00'
  • /Producer: Adobe PDF Library 11.0
  • /ST Title: McAfee Data Loss Prevention Endpoint 9.4 and ePolicy Orchestrator 5.1.3 Security Target, Version 1.0, November 24, 2015
  • /SourceModified: D:20160119123603
  • /TOE name and version: McAfee Data Loss Prevention Endpoint 9.4 and ePolicy Orchestrator 5.1.3
  • /TOE short name: McAfee DLPe v9.4 with ePO v5.1.3
  • /Title: 383-4-XXX CR vxe
  • pdf_file_size_bytes: 129891
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename c0687_est.pdf 383-4-342 MFE DLPe 9-4 ST.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL2: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 1
    • ALC_CMS: 1
    • ALC_CMS.2: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 3
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 18
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.3: 2
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 1
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
  • A:
    • A.ACCESS: 3
    • A.ASCOPE: 3
    • A.DATABASE: 3
    • A.DYNMIC: 3
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.NOEVIL: 3
    • A.PROTCT: 3
  • O:
    • O.ACCESS: 12
    • O.AUDITS: 6
    • O.AUDIT_PROTECT: 4
    • O.AUDIT_REVIEW: 5
    • O.EADMIN: 7
    • O.IDENTIFY: 21
    • O.IMPORT: 4
    • O.INTEGRITY: 5
    • O.PROTECT_DATA: 8
    • O.SENSITIVE_DATA: 6
  • OE:
    • OE.CREDEN: 5
    • OE.DATABASE: 5
    • OE.IDAUTH: 11
    • OE.INSTALL: 6
    • OE.INTEROP: 6
    • OE.PERSON: 5
    • OE.PHYCAL: 5
    • OE.PROTECT: 4
    • OE.SD_PROTECTION: 4
    • OE.STORAGE: 5
    • OE.TIME: 5
  • T:
    • T.COMDIS: 3
    • T.COMINT: 3
    • T.IMPCON: 3
    • T.LOSSOF: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
    • T.SENSITIVE_: 1
    • T.SENSITIVE_DATA: 1
    • T.SENSITVE_DATA: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Microsoft:
    • Microsoft: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA2:
      • SHA-384: 2
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS1.2: 1
  • TLS:
    • TLS:
      • TLS: 2
      • TLS 1.2: 1
      • TLS v1.1: 1
      • TLS v1.2: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 3
    • FIPS 180-3: 2
    • FIPS 197: 2
  • ISO:
    • ISO/IEC 15408: 2
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • for the subject and information attributes and has a block reaction. 4 This refers to a set of confidential documents that are manually selected by DLP administrators and uploaded to the DLP management console in: 1
    • to all DLP endpoint clients, and allow DLP endpoint client to detect fragments of text from these confidential documents and block (or report) the copy or transmission of content from these files by FTP, email or: 1
pdf_data/st_metadata
  • /Author: RICOH
  • /CreationDate: D:20210119110846+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20210119110846+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: RICOH IM C300 Security Target
  • pdf_file_size_bytes: 1176783
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 87
  • /Author: Primasec
  • /Client: McAfee
  • /Company: Microsoft
  • /CreationDate: D:20151124155043+01'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /DocVersion: 1.0
  • /ModDate: D:20151124155058+01'00'
  • /Producer: Adobe PDF Library 9.0
  • /SourceModified: D:20151124144949
  • /Subject: Data Loss Prevention Endpoint 9.4 and ePolicy Orchestrator 5.1.3
  • /Telephone number: 1.0
  • /Title: Security Target
  • pdf_file_size_bytes: 580448
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 59
state/cert/convert_garbage False True
state/cert/download_ok False True
state/cert/pdf_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different