Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
FiberHome Enhanced Optical Transport Equipment Manager including UNM2000 EMS Server version V3R2, UNM2000 EMS Client version V3R2, FONST 5000 COTP version RP0100, FONST 5000 U10E version RP0101, FONST 5000 U20E version RP0101, FONST 1000 D2 version RP0100, FONST 5000 N32 version RP0101
21.0.03/TSE-CCCS-77
RICOH IM C2000/C2000G/C2500/C2500G/C3000/C3000G/C3500/C3500G, SAVIN IM C2000/C2000G/C2500/C2500G/C3000/C3000G/C3500/C3500G, LANIER IM C2000/C2000G/C2500/C2500G/C3000/C3000G/C3500/C3500G, nashuatec IM C2000/C2500/C3000/C3500, Rex Rotary IM C2000/C2500/C3000/C3500, Gestetner IM C2000/C2500/C3000/C3500Version: E-1.01
JISEC-CC-CRP-C0638-01-2019
name FiberHome Enhanced Optical Transport Equipment Manager including UNM2000 EMS Server version V3R2, UNM2000 EMS Client version V3R2, FONST 5000 COTP version RP0100, FONST 5000 U10E version RP0101, FONST 5000 U20E version RP0101, FONST 1000 D2 version RP0100, FONST 5000 N32 version RP0101 RICOH IM C2000/C2000G/C2500/C2500G/C3000/C3000G/C3500/C3500G, SAVIN IM C2000/C2000G/C2500/C2500G/C3000/C3000G/C3500/C3500G, LANIER IM C2000/C2000G/C2500/C2500G/C3000/C3000G/C3500/C3500G, nashuatec IM C2000/C2500/C3000/C3500, Rex Rotary IM C2000/C2500/C3000/C3500, Gestetner IM C2000/C2500/C3000/C3500Version: E-1.01
category Network and Network-Related Devices and Systems Multi-Function Devices
scheme TR JP
not_valid_after 02.11.2024 08.04.2024
not_valid_before 02.11.2021 08.04.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/131-CC.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0638_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/131-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0638_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/131-ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0638_est.pdf
manufacturer FiberHome Telecommunication Technologies Co., Ltd. Ricoh Company, Ltd.
manufacturer_web https://www.fiberhome.com/default.aspx https://www.ricoh.com/
dgst 7fa613000e2b0217 a0ec957074665f64
heuristics/cert_id 21.0.03/TSE-CCCS-77 JISEC-CC-CRP-C0638-01-2019
heuristics/cpe_matches {} cpe:2.3:h:ricoh:m_c2000:-:*:*:*:*:*:*:*
heuristics/extracted_versions 5000, 1000 1.01
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0638
  • certification_date: 01.04.2019
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0638
    • cert_link: https://www.ipa.go.jp/en/security/c0638_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH IM C2000/C2000G/C2500/ C2500G/C3000/C3000G/C3500/C3500G, SAVIN IM C2000/C2000G/C2500/ C2500G/C3000/C3000G/C3500/C3500G, LANIER IM C2000/C2000G/C2500/ C2500G/C3000/C3000G/C3500/C3500G, nashuatec IM C2000/C2500/C3000/C3500, Rex Rotary IM C2000/C2500/C3000/C3500, Gestetner IM C2000/C2500/C3000/C3500
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0638_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0638_est.pdf
    • toe_version: E-1.01
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.05.2024
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0638_it8682.html
  • toe_overseas_name: RICOH IM C2000/C2000G/C2500/C2500G/C3000/C3000G/C3500/C3500G, SAVIN IM C2000/ C2000G/C2500/C2500G/C3000/C3000G/C3500/C3500G, LANIER IM C2000/C2000G/C2500/ C2500G/C3000/C3000G/C3500/C3500G, nashuatec IM C2000/C2500/C3000/C3500, Rex Rotary IM C2000/C2500/C3000/C3500, Gestetner IM C2000/C2500/C3000/C3500 E-1.01
heuristics/protection_profiles {} 43ce79b420f23a00
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf
pdf_data/cert_filename 131-CC.pdf c0638_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • TR:
    • 21.0.03/TSE-CCCS-77: 1
  • JP:
    • JISEC-CC-CRP-C0638-01-2019: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
pdf_data/cert_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 1
  • ECSEC:
    • ECSEC Laboratory: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
pdf_data/cert_metadata
  • /CreationDate: D:20190510145815+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190510150001+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 157464
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename 131-CR.pdf c0638_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • TR:
    • 21.0.03/TSE-CCCS-77: 2
  • JP:
    • JISEC-CC-CRP-C0638-01-2019: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2+: 1
    • EAL4: 1
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.TIME_SYNC: 1
    • A.TRUSTED_NETWORK: 1
    • A.U: 4
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 4
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the security functionality of the TOE relies on software and firmware only and thus the hardware is out of scope, although the databases that contain the user credential and the logs are located in the UNM2000: 1
pdf_data/report_metadata
  • /Author: TSE KSDB
  • /CreationDate: D:20211105101105+03'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20211105101105+03'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 856457
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /CreationDate: D:20190612110013+09'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords:
  • /ModDate: D:20190612110104+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 510295
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 42
pdf_data/st_filename 131-ST.pdf c0638_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
  • EAL:
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 4
    • FAU_GEN.2: 3
    • FAU_GEN.3: 14
    • FAU_GEN.3.1: 3
    • FAU_GEN.3.2: 2
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.2: 11
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID: 2
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 3
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 1
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_MCS.1: 8
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 18
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 3
    • A.TIME_SYNC: 3
    • A.TRUSTED_NETWORK: 3
  • O:
    • O.ACCESS: 2
    • O.AUDITING: 5
    • O.AUTHENTICATE: 2
    • O.AUTHORISE: 4
    • O.MANAGE: 3
    • O.S: 1
  • OE:
    • OE.CLIENT_SECURITY: 2
    • OE.NO_GENERAL_PURPOSE: 3
    • OE.SERVER_SECURITY: 3
    • OE.TIME: 6
    • OE.TRUSTED_NETWORK: 1
    • OE.TRUSTED_NETWORKS: 1
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/st_keywords/crypto_protocol
  • VPN:
    • VPN: 3
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS1.0: 1
      • TLS1.1: 1
      • TLS1.2: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
pdf_data/st_metadata
  • /Author: RICOH
  • /CreationDate: D:20190405103139+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20190405103139+09'00'
  • /Producer: Microsoft® Word for Office 365
  • /Title: RICOH IM C2000/C2000G/C2500/C2500G/C3000/C3000G/C3500/C3500G, SAVIN IM C2000/C2000G/C2500/C2500G/C3000/C3000G/C3500/C3500G, LANIER IM C2000/C2000G/C2500/C2500G/C3000/C3000G/C3500/C3500G, nashuatec IM C2000/C2500/C3000/C3500, Rex Rotary IM C2000/C2500/C3000/C3500, Gestetner IM C2000/C2500/C3000/C3500 Security Target
  • pdf_file_size_bytes: 1109027
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 89
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different