Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
CCEVS-VR-VID-10380-2012
AR-FR12M Version M.20
JISEC-CC-CRP-C0022-01
name RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9 AR-FR12M Version M.20
scheme US JP
not_valid_after 31.12.2014 07.10.2013
not_valid_before 21.12.2012 11.03.2005
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_est.pdf
manufacturer RIOREY Incorporated Sharp Corporation
manufacturer_web https://www.riorey.com/ https://sharp-world.com/
security_level EAL4+, ALC_FLR.1 ADV_SPM.1, EAL3+
dgst 7f09c099abfb5dbf 8a35a1a0f9dabc51
heuristics/cert_id CCEVS-VR-VID-10380-2012 JISEC-CC-CRP-C0022-01
heuristics/cert_lab US []
heuristics/extracted_sars ALC_LCD.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AGD_OPE.1, ATE_COV.2, ALC_CMS.4, ALC_CMC.4, ALC_FLR.1, ADV_IMP.1, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ALC_DVS.1 AVA_MCU.1, AVA_VLA.1, ADV_FSP.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_FUN.1, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ADV_SPM.1, ALC_DVS.1
heuristics/extracted_versions 5.0.12 20
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10380/
  • categories: ['Miscellaneous']
  • category: Miscellaneous
  • certification_date: 21.12.2012
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date: 21.12.2014
  • id: CCEVS-VR-VID10380
  • product: RioRey™ Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10380
  • vendor: RioRey, Inc.
  • cert_id: JISEC-CC-CRP-C0022
  • certification_date: 01.03.2005
  • claim: EAL3+ ADV_SPM.1
  • enhanced:
    • assurance_level: EAL3 + ADV_SPM.1
    • cert_link: https://www.ipa.go.jp/en/security/c0022_eimg.pdf
    • description: PRODUCT DESCRIPTION TOE is a firmware that aims to prevent disclosure of real image data stored temporarily in Mass Storage Device (hereafter referred to as MSD), which are specified for every functional unit configuration of Multi Function Device (hereafter referred to as MFD). TOE is provided as a kit of upgrading firmware of MFD. TOE executes encryption before the real image data are spooled in MSD, when the MFD functions like PCFAX, FAX transmission or FAX receiving are performed. It also clears spool data area in MSD after the jobs like copying, printing, SCAN transmission, PCFAX, FAX transmission or FAX receiving are completed. These encryption function and data erasing function ensure the confidentiality of real image data that are stored temporarily in MSD and counter fraudulent readout of them.
    • evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology security center (JEITA ITSC)
    • product: AR-FR12M
    • product_type: product (Data protection function inside digital MFD)
    • report_link: https://www.ipa.go.jp/en/security/c0022_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0022_est.pdf
    • toe_version: VERSION M.20
    • vendor: Sharp Corporation
  • expiration_date: 01.10.2013
  • supplier: Sharp Corporation
  • toe_japan_name: AR-FR12M VERSION M.20
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0022_it4028.html
  • toe_overseas_name: AR-FR12M VERSION M.20
pdf_data/report_filename st_vid10380-vr.pdf c0022_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10380-2012
    • cert_item: RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG) with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10380-2012: 1
  • JP:
    • CRP-C0022-01: 1
    • Certification No. C0022: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 8
    • EAL 4 augmented: 1
  • EAL:
    • EAL3: 2
    • EAL3 augmented: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 3
  • AVA:
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
  • ADV:
    • ADV_SPM: 1
    • ADV_SPM.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • A:
    • A.OPERATOR: 1
  • T:
    • T.RECOVER: 1
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
    • Rijndael:
      • Rijndael: 2
pdf_data/report_keywords/standard_id
  • RFC:
    • RFC 1858: 1
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20050518144032+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /Manager: IPA
  • /ModDate: D:20050518144205+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /SourceModified: D:20050518054022
  • /Title: CRP-C0022-01_e
  • pdf_file_size_bytes: 213209
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
pdf_data/st_filename st_vid10380-st.pdf c0022_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL3: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_CAP.3: 4
    • ACM_SCP.1: 4
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 12
    • ADV_HLD.1: 3
    • ADV_HLD.2: 1
    • ADV_RCR.1: 4
    • ADV_SPM.1: 12
  • AGD:
    • AGD_ADM.1: 7
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 4
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 4
    • ATE_IND.2: 3
  • AVA:
    • AVA_MCU.1: 1
    • AVA_MSU.1: 2
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 14
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 13
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 6
    • FCS_COP.1: 15
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 5
    • FDP_IFC.1: 1
    • FDP_RIP.1: 13
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_SOS.1: 16
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 20
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 15
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 16
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.2: 17
    • FMT_MSA.2.1: 1
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 1
    • FMT_RVM.1: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 17
    • FPT_RVM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 5
    • O.TRANSMISSION: 1
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • A:
    • A.OPERATOR: 5
  • O:
    • O.REMOVE: 6
    • O.RESIDUAL: 8
  • OE:
    • OE.ERASEALL: 3
    • OE.OPERATE: 3
  • T:
    • T.RECOVER: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 4
    • Rijndael:
      • Rijndael: 4
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • FIPS:
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /CreationDate: D:20130115104027
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130115104027
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1295508
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
  • /Author: SHARP Corporation
  • /Company: SHARP Corporation
  • /CreationDate: D:20050518145955+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /ModDate: D:20050518150808+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Subject: C0022
  • /Title: ST
  • pdf_file_size_bytes: 664695
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different