Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RICOH IM C300 J-1.00
JISEC-CC-CRP-C0687-01-2020
IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71
OCSI/CERT/SYS/08/2016/RC
name RICOH IM C300 J-1.00 IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP IT
not_valid_after 16.10.2025 28.10.2025
not_valid_before 16.10.2020 28.10.2020
report_link https://www.commoncriteriaportal.org/files/epfiles/c0687_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_idapplet34_eidas_v1.0_en.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/c0687_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_idapplet34_eidas_v1.02.pdf
manufacturer Ricoh Company, Ltd. ID&Trust Ltd.
manufacturer_web https://www.idandtrust.com/
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL4+, ATE_DPT.2, AVA_VAN.5
dgst 75d37bed42139156 85a46d5f66760cd3
heuristics/cert_id JISEC-CC-CRP-C0687-01-2020 OCSI/CERT/SYS/08/2016/RC
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 AVA_COMP.1, ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ADV_COMP.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_TSS.2, ASE_REQ.2, ATE_COMP.1, ALC_COMP.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 1.00 3.4
heuristics/report_references/directly_referenced_by {} OCSI/CERT/CCL/11/2022/RC
heuristics/report_references/indirectly_referenced_by {} OCSI/CERT/CCL/11/2022/RC
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0687
  • certification_date: 01.10.2020
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0687
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000131j-att/c0687_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH IM C300
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000131j-att/c0687_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000131j-att/c0687_est.pdf
    • toe_version: J-1.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date:
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0687_it9723.html
  • toe_japan_name: RICOH IM C300J-1.00
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles {} 002505d0c2b4718a, b380aabf93b29692, d918b28fd7bb5d79, a33327d40f253f46, 64065d44659bf9ef
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0086b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0087b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf
pdf_data/report_filename c0687_erpt.pdf cr_idapplet34_eidas_v1.0_en.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0687-01-2020: 1
  • DE:
    • BSI-DSZ-CC-1040-2019-MA-01: 1
  • IT:
    • OCSI/CERT/SYS/08/2016/RC: 35
  • NL:
    • NSCIB-CC-180212-CR2: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0087: 1
    • BSI-CC-PP-0056-V2-2012: 3
    • BSI-CC-PP-0059-2009-MA-: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 3
    • BSI-CC-PP-0086: 3
    • BSI-CC-PP-0087: 6
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL2: 4
    • EAL4: 11
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL6: 2
    • EAL6 augmented: 2
    • EAL6+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_COMP.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_COMP.1: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 2
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_COMP.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COMP: 1
    • ATE_COMP.1: 1
    • ATE_COV.2: 1
    • ATE_DPT.2: 7
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_COMP: 1
    • AVA_COMP.1: 1
    • AVA_VAN.5: 8
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_RND.1: 1
  • FIA:
    • FIA_API.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
  • FPT:
    • FPT_EMS.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • NXP:
    • NXP: 18
    • NXP Semiconductors: 4
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • CCLab:
    • CCLab Software Laboratory: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 6
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • TLS:
      • TLS: 2
  • PACE:
    • PACE: 21
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX3: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL-COMP: 7
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-03105: 2
    • BSI TR-03110: 4
    • BSI TR-03110-1: 1
    • BSI TR-03110-2: 1
    • BSI TR-03110-3: 1
    • BSI TR-03110-4: 1
    • BSI TR-03117: 2
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 3: 2
    • JCOP 4: 14
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ICAO:
    • ICAO: 9
  • ISO:
    • ISO/IEC 15408: 6
pdf_data/report_metadata
  • /CreationDate: D:20210120164632+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20210120164710+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 529921
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /Author: OCSI
  • /CreationDate: D:20201030125144+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20201030125144+00'00'
  • /Title: Certification Report "IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71"
  • pdf_file_size_bytes: 583739
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
pdf_data/st_filename c0687_est.pdf st_idapplet34_eidas_v1.02.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1040-2019-MA-01: 1
  • NL:
    • NSCIB-CC-180212-CR2: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0056-: 2
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0068-: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0086: 1
    • BSI-CC-PP-0086-2015: 1
    • BSI-CC-PP-0087: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 4: 2
    • EAL 6: 2
    • EAL 6+: 1
    • EAL4: 18
    • EAL4 augmented: 8
    • EAL4+: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC.1: 5
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_SPM.1: 1
    • ADV_TDS.3: 4
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 4
  • ALC:
    • ALC_DEL.1: 2
    • ALC_DVS.2: 11
    • ALC_FLR.1: 3
  • ASE:
    • ASE_TSS.2: 3
  • ATE:
    • ATE_DPT.1: 1
    • ATE_DPT.2: 12
    • ATE_FUN.1: 2
  • AVA:
    • AVA_VAN.5: 12
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 18
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_ARP.1: 2
    • FAU_SAS: 18
    • FAU_SAS.1: 4
  • FCO:
    • FCO_NRO.2: 1
  • FCS:
    • FCS_CKM: 148
    • FCS_CKM.1: 25
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 10
    • FCS_CKM.4: 24
    • FCS_COP: 124
    • FCS_COP.1: 42
    • FCS_COP.1.1: 25
    • FCS_RND: 21
    • FCS_RND.1: 3
    • FCS_RNG.1: 5
  • FDP:
    • FDP_ACC: 56
    • FDP_ACC.1: 16
    • FDP_ACC.2: 4
    • FDP_ACF: 66
    • FDP_ACF.1: 50
    • FDP_IFC.1: 4
    • FDP_IFC.2: 3
    • FDP_IFF.1: 5
    • FDP_ITC.1: 13
    • FDP_ITC.2: 15
    • FDP_RIP: 32
    • FDP_RIP.1: 13
    • FDP_ROL.1: 2
    • FDP_SDI: 16
    • FDP_SDI.1: 2
    • FDP_SDI.2: 9
    • FDP_UCT: 20
    • FDP_UCT.1: 1
    • FDP_UIT: 20
    • FDP_UIT.1: 3
  • FIA:
    • FIA_AFL: 54
    • FIA_AFL.1: 12
    • FIA_API: 63
    • FIA_API.1: 8
    • FIA_ATD.1: 2
    • FIA_UAU: 158
    • FIA_UAU.1: 15
    • FIA_UAU.4: 4
    • FIA_UAU.5: 11
    • FIA_UAU.6: 3
    • FIA_UID: 54
    • FIA_UID.1: 19
    • FIA_UID.2: 1
    • FIA_USB.1: 2
  • FMT:
    • FMT_LIM: 63
    • FMT_LIM.1: 7
    • FMT_LIM.2: 7
    • FMT_MOF: 9
    • FMT_MOF.1: 1
    • FMT_MSA: 50
    • FMT_MSA.1: 15
    • FMT_MSA.2: 2
    • FMT_MSA.3: 17
    • FMT_MTD: 256
    • FMT_MTD.1: 24
    • FMT_MTD.3: 3
    • FMT_SMF: 51
    • FMT_SMF.1: 36
    • FMT_SMR: 39
    • FMT_SMR.1: 50
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 39
    • FPT_EMS.1: 13
    • FPT_FLS: 25
    • FPT_FLS.1: 8
    • FPT_ITC: 2
    • FPT_PHP: 36
    • FPT_PHP.1: 2
    • FPT_PHP.3: 3
    • FPT_RCV.3: 1
    • FPT_TDC.1: 1
    • FPT_TST: 33
    • FPT_TST.1: 5
  • FTP:
    • FTP_ITC: 34
    • FTP_ITC.1: 13
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
  • A:
    • A.CGA: 1
    • A.SCA: 1
  • OE:
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
    • OE.HID_VAD: 2
    • OE.KEY-CHANGE: 1
    • OE.PROCESS_SEC_IC: 1
    • OE.SECURITY-: 1
    • OE.USE_DIAG: 1
    • OE.USE_KEYS: 1
    • OE.VERIFICATION: 1
    • OE.VERIFICATION-: 1
  • OSP:
    • OSP.KEY-CHANGE: 1
    • OSP.PROCESS-TOE: 1
    • OSP.SECURE-BOX: 1
    • OSP.SECURITY-DOMAINS: 1
    • OSP.VERIFICATION: 1
  • OT:
    • OT.ALARM: 1
    • OT.APPLI-AUTH: 1
    • OT.ATTACK-COUNTER: 1
    • OT.CARD-CONFIGURATION: 1
    • OT.CARD-MANAGEMENT: 1
    • OT.CIPHER: 1
    • OT.COMM_AUTH: 2
    • OT.COMM_CONFIDENTIALITY: 1
    • OT.COMM_INTEGRITY: 1
    • OT.DOMAIN-RIGHTS: 1
    • OT.EXT-MEM: 1
    • OT.FIREWALL: 1
    • OT.GLOBAL_ARRAYS_CONFID: 1
    • OT.IDENTIFICATION: 1
    • OT.KEY-MNGT: 1
    • OT.NATIVE: 1
    • OT.OBJ-DELETION: 1
    • OT.OPERATE: 1
    • OT.PIN-MNGT: 1
    • OT.REALLOCATION: 1
    • OT.RESOURCES: 1
    • OT.RESTRICTED-MODE: 1
    • OT.RND: 1
    • OT.RNG: 1
    • OT.SCP: 3
    • OT.SEC_BOX_FW: 1
    • OT.SENSITIVE_RESULT_INTEG: 1
    • OT.SID: 1
    • OT.SID_MODULE: 1
    • OT.TRANSACTION: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Infineon:
    • Infineon Technologies AG: 1
  • NXP:
    • NXP: 6
    • NXP Semiconductors: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 35
      • AES128: 1
  • DES:
    • 3DES:
      • 3DES: 8
      • TDES: 3
      • Triple-DES: 8
      • TripleDES: 5
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 4
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 13
  • RSA:
    • RSA 2048: 1
    • RSA-CRT: 3
    • RSA-PSS: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-224: 3
      • SHA-256: 7
      • SHA-384: 2
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS1.2: 1
  • PACE:
    • PACE: 185
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 4
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX3: 1
pdf_data/st_keywords/crypto_library
  • Generic:
    • Crypto Library 296: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • Malfunction: 1
    • malfunction: 1
    • physical tampering: 3
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 582: 1
    • BSI TR-03110: 5
    • BSI TR-03117: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 4: 9
    • JCOP4: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.ChipSecurity: 1
    • EF.DG14: 1
    • EF.DG15: 1
    • EF.SOD: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • ICAO:
    • ICAO: 15
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 18013: 2
  • PKCS:
    • PKCS#3: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 737 • OT.SEC_BOX_FW 738 • OT.SENSITIVE_RESULT_INTEG 739 cannot be mapped because these are out of scope. 740 The objectives for the operational environment can be mapped as follows: 741 Objective from: 1
    • none common user data EAC2 protected data EAC2 protected data Other terminals than the above are out of scope of this ST. In particular, terminals using Basic 246 Access Control (BAC) may be functionally: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: RICOH
  • /CreationDate: D:20210119110846+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20210119110846+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: RICOH IM C300 Security Target
  • pdf_file_size_bytes: 1176783
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 87
  • /Author: David Lovasz
  • /CreationDate: D:20201019125719+02'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20201019125719+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: IDENTITY APPLET V3.4/EIDAS - SECURITY TARGET
  • pdf_file_size_bytes: 1688422
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 191
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different