name |
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU: Fax Option Type 3351 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I, HDD Encryption Unit: HDD Encryption Unit Type A Version: Software System/Copy 1.02 Network Support 7.34 Scanner 01.12 Printer 1.02 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.05 Web Uapl 1.03 Network DocBox 1.00 animation 1.1 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.10 LANG0 1.09 LANG1 1.09 Hardware Ic Key 1100 Ic Hdd 01 Options Data Erase Opt 1.01m GWFCU3-20(WW) 02.00.00
|
RICOH Pro 8300S/8310S/8320S, SAVIN Pro 8300S/8310S/8320S, LANIER Pro 8300S/8310S/8320S, nashuatec Pro 8300S/8310S/8320S, Rex Rotary Pro 8300S/8310S/8320S, Gestetner Pro 8300S/8310S/8320S E-1.01
|
category |
Multi-Function Devices
|
Multi-Function Devices
|
not_valid_before |
2011-03-29
|
2020-02-13
|
not_valid_after |
2016-04-08
|
2025-02-13
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0286_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0666_est.pdf
|
status |
archived
|
active
|
manufacturer |
Ricoh Company, Ltd.
|
Ricoh Company, Ltd.
|
manufacturer_web |
https://www.ricoh.com/
|
https://www.ricoh.com/
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0286_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0666_erpt.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0666_eimg.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
d2e66e31bda8f7d8f9d703b7b5f95502e5dc39fd1678e8228a4ae4872690fe10
|
state/cert/txt_hash |
None
|
4a9e24bc4a434b90ccfe336d9f9a73625f45a7977e26eedb63085a0ae6dcf0a1
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
12a4883778391bcdf4eda63a578cbe5a9aa160158be18b2e24d398394c5a47ce
|
9a85661afb3be960137d6fac9090e100726c2ecf94d3e1bb594036ae5bf9a27e
|
state/report/txt_hash |
c96fc9f591da46027c15119973c4416ff440f848b3ac9502857149bd7f2c7f9c
|
af95dfb47a9ca8d9d358b1953e37c20d77c61582b74a195f1832858550180a59
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
f590cacd6cb82566f6ebc69a0f8b42521e875f175bf35d15a7ca3e841b43a579
|
7bec5541eb12950f96e1bcdffff6027eb7436e58d841aad77772e02d6e6df0e2
|
state/st/txt_hash |
a88ef8d5a4bc65ec2d90a6d92df76468db5c3727a258261414da47b8cd3d11a7
|
614d4ac93ac8dff6473d0afbf692c558b2647417e0a6b3f8f59d75e3ba78f5a0
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0286
|
JISEC-CC-CRP-C0666-01-2020
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data/cert_id |
C0286
|
C0666
|
heuristics/scheme_data/certification_date |
2011-03
|
2020-02
|
heuristics/scheme_data/claim |
EAL3+
ALC_FLR.2
PP
|
PP(U.S. Government Protection Profile for
Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
|
heuristics/scheme_data/enhanced |
- product:
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:
Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351
FCU:
Fax Option Type 3351
DataOverwriteSecurity Unit:
DataOverwriteSecurity Unit Type I
HDD Encryption Unit:
HDD Encryption Unit Type A
- toe_version:
-Software
System/Copy 1.02
Network Support 7.34
Scanner 01.12
Printer 1.02
Fax 02.00.00
RemoteFax 02.00.00
Web Support 1.05
Web Uapl 1.03
Network DocBox 1.00
animation 1.1
Option PCL 1.03
OptionPCLFont 1.01
Engine 1.00:01
OpePanel 1.10
LANG0 1.09
LANG1 1.09
-Hardware
Ic Key 1100
Ic Hdd 01
-Options
Data Erase Opt 1.01m
GWFCU3-20(WW) 02.00.00
- product_type:
Multi Function Product
- certification_date:
2011-03-29
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0286_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0286_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0286_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
-
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
-
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
-
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
-
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
-
Network Protection Function: Enables the TOE to protect network communications using encryption.
-
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
-
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
-
Security Management Function: Enables the TOE administrator to control security functions.
-
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
-
Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
|
- product:
RICOH Pro 8300S/8310S/8320S,
SAVIN Pro 8300S/8310S/8320S,
LANIER Pro 8300S/8310S/8320S,
nashuatec Pro 8300S/8310S/8320S,
Rex Rotary Pro 8300S/8310S/8320S,
Gestetner Pro 8300S/8310S/8320S
- toe_version:
E-1.01
- product_type:
Multi Function Product
- cert_id: JISEC-C0666
- certification_date:
2020-02-13
- cc_version:
3.1 Release5
- assurance_level:
EAL2 Augmented by ALC_FLR.2
- protection_profile:
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000rxc-att/c0666_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000rxc-att/c0666_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000rxc-att/c0666_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
Network Protection Function: Enables the TOE to protect network communications using encryption.
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
Security Management Function: Enables the TOE administrator to control security functions.
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL3 Augmented with ALC_FLR.2
|
EAL2 Augmented by ALC_FLR.2
|
heuristics/scheme_data/enhanced/cc_version |
3.1
|
3.1 Release5
|
heuristics/scheme_data/enhanced/cert_link |
https://www.ipa.go.jp/en/security/c0286_eimg.pdf
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000rxc-att/c0666_eimg.pdf
|
heuristics/scheme_data/enhanced/certification_date |
2011-03-29
|
2020-02-13
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
-
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
-
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
-
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
-
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
-
Network Protection Function: Enables the TOE to protect network communications using encryption.
-
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
-
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
-
Security Management Function: Enables the TOE administrator to control security functions.
-
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
-
Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
|
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
Network Protection Function: Enables the TOE to protect network communications using encryption.
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
Security Management Function: Enables the TOE administrator to control security functions.
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
|
ECSEC Laboratory Inc.
Evaluation Center
|
heuristics/scheme_data/enhanced/product |
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:
Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351
FCU:
Fax Option Type 3351
DataOverwriteSecurity Unit:
DataOverwriteSecurity Unit Type I
HDD Encryption Unit:
HDD Encryption Unit Type A
|
RICOH Pro 8300S/8310S/8320S,
SAVIN Pro 8300S/8310S/8320S,
LANIER Pro 8300S/8310S/8320S,
nashuatec Pro 8300S/8310S/8320S,
Rex Rotary Pro 8300S/8310S/8320S,
Gestetner Pro 8300S/8310S/8320S
|
heuristics/scheme_data/enhanced/product_type |
Multi Function Product
|
Multi Function Product
|
heuristics/scheme_data/enhanced/protection_profile |
IEEE Std 2600.1-2009
|
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0286_erpt.pdf
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000rxc-att/c0666_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0286_est.pdf
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000rxc-att/c0666_est.pdf
|
heuristics/scheme_data/enhanced/toe_version |
-Software
System/Copy 1.02
Network Support 7.34
Scanner 01.12
Printer 1.02
Fax 02.00.00
RemoteFax 02.00.00
Web Support 1.05
Web Uapl 1.03
Network DocBox 1.00
animation 1.1
Option PCL 1.03
OptionPCLFont 1.01
Engine 1.00:01
OpePanel 1.10
LANG0 1.09
LANG1 1.09
-Hardware
Ic Key 1100
Ic Hdd 01
-Options
Data Erase Opt 1.01m
GWFCU3-20(WW) 02.00.00
|
E-1.01
|
heuristics/scheme_data/enhanced/vendor |
RICOH COMPANY, LTD.
|
RICOH COMPANY, LTD.
|
heuristics/scheme_data/expiration_date |
2016-04
|
None
|
heuristics/scheme_data/supplier |
RICOH COMPANY, LTD.
|
RICOH COMPANY, LTD.
|
heuristics/scheme_data/toe_japan_name |
-----
|
-----
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0286_it0300.html
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0666_it8686.html
|
heuristics/scheme_data/toe_overseas_name |
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351
FCU:Fax Option Type 3351
DataOverwriteSecurity Unit:DataOverwriteSecurity Unit Type I
HDD Encryption Unit:HDD Encryption Unit Type A < Cont. >
|
RICOH Pro 8300S/8310S/8320S,
SAVIN Pro 8300S/8310S/8320S,
LANIER Pro 8300S/8310S/8320S,
nashuatec Pro 8300S/8310S/8320S,
Rex Rotary Pro 8300S/8310S/8320S,
Gestetner Pro 8300S/8310S/8320SE-1.01
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
c0666_eimg.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- JP:
- JISEC-CC-CRP-C0666-01-2020:
1
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
131327
- pdf_is_encrypted:
True
- pdf_number_of_pages:
2
- /CreationDate:
D:20200430155849+09'00'
- /Creator:
Microsoft® Word 2019
- /ModDate:
D:20200430160035+09'00'
- /Producer:
Microsoft® Word 2019
- pdf_hyperlinks:
|
pdf_data/report_filename |
c0286_erpt.pdf
|
c0666_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0286-01:
1
- Certification No. C0286:
1
|
- JISEC-CC-CRP-C0666-01-2020:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL3:
4
- EAL3 augmented:
1
|
- EAL2:
4
- EAL2 augmented:
2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol/IPsec/IPsec |
3
|
4
|
pdf_data/report_keywords/crypto_protocol/TLS |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
577395
- pdf_is_encrypted:
True
- pdf_number_of_pages:
38
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate:
D:20110726170118+09'00'
- /Creator:
Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate:
D:20110726170221+09'00'
- /Producer:
Acrobat Distiller 8.3.0 (Windows)
- /Title: CRP-e
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
505839
- pdf_is_encrypted:
True
- pdf_number_of_pages:
38
- /CreationDate:
D:20200619093405+09'00'
- /Creator:
Microsoft® Word 2019
- /ModDate:
D:20200619093515+09'00'
- /Producer:
Microsoft® Word 2019
- pdf_hyperlinks:
|
pdf_data/report_metadata//CreationDate |
D:20110726170118+09'00'
|
D:20200619093405+09'00'
|
pdf_data/report_metadata//Creator |
Word 用 Acrobat PDFMaker 8.1
|
Microsoft® Word 2019
|
pdf_data/report_metadata//ModDate |
D:20110726170221+09'00'
|
D:20200619093515+09'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 8.3.0 (Windows)
|
Microsoft® Word 2019
|
pdf_data/report_metadata/pdf_file_size_bytes |
577395
|
505839
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
38
|
38
|
pdf_data/st_filename |
c0286_est.pdf
|
c0666_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.ACCESS:
5
- A.USER:
4
- A.ADMIN:
10
|
- A.ACCESS:
5
- A.USER:
4
- A.ADMIN:
10
|
pdf_data/st_keywords/cc_claims/D |
|
|
pdf_data/st_keywords/cc_claims/D/D.DOC |
2
|
6
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT |
9
|
9
|
pdf_data/st_keywords/cc_claims/O/O.CONF |
16
|
18
|
pdf_data/st_keywords/cc_claims/O/O.DOC |
14
|
18
|
pdf_data/st_keywords/cc_claims/O/O.FUNC |
8
|
9
|
pdf_data/st_keywords/cc_claims/O/O.INTERFACE |
8
|
9
|
pdf_data/st_keywords/cc_claims/O/O.PROT |
8
|
9
|
pdf_data/st_keywords/cc_claims/O/O.SOFTWARE |
8
|
9
|
pdf_data/st_keywords/cc_claims/O/O.STORAGE |
9
|
14
|
pdf_data/st_keywords/cc_claims/O/O.USER |
20
|
21
|
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN |
8
|
8
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT |
3
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_ACCESS |
2
|
2
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_ACCESS_AUTHORIZED |
1
|
1
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_STORAGE |
3
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.INTERFACE |
4
|
4
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL |
5
|
4
|
pdf_data/st_keywords/cc_claims/OE/OE.USER |
18
|
21
|
pdf_data/st_keywords/cc_claims/T/T.CONF |
10
|
10
|
pdf_data/st_keywords/cc_claims/T/T.DOC |
10
|
14
|
pdf_data/st_keywords/cc_claims/T/T.FUNC |
5
|
7
|
pdf_data/st_keywords/cc_claims/T/T.PROT |
5
|
5
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
|
- ADV_ARC.1:
1
- ADV_FSP.2: 1
- ADV_TDS.1: 2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.2:
3
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 2
- ALC_LCD.1: 1
|
- ALC_FLR.2:
3
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 |
3
|
3
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 |
9
|
10
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 |
7
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 |
7
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
10
|
11
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
10
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
32
|
31
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
30
|
31
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
6
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
7
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 |
7
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
13
|
14
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 |
7
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
16
|
18
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
20
|
20
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
22
|
23
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
22
|
22
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
28
|
29
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP |
4
|
5
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
5
|
6
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_SSL.3:
9
- FTA_SSL.3.1:
1
|
- FTA_SSL.3:
9
- FTA_SSL.3.1:
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1: 1
|
- FTP_ITC.1.3:
4
- FTP_ITC.1:
17
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
12
|
17
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
4
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- TLS:
- TLS:
- TLS1.0:
1
- TLS1.1:
1
- TLS1.2:
1
- IPsec:
|
pdf_data/st_keywords/crypto_protocol/TLS |
|
- TLS:
- TLS1.0:
1
- TLS1.1:
1
- TLS1.2:
1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- BSI:
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
|
- FIPS:
- NIST:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
2
|
6
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
789628
- pdf_is_encrypted:
False
- pdf_number_of_pages:
88
- /Creator: MP_2851_P2600_ST_1.00_ENG20110520.doc - Microsoft Word
- /CreationDate:
D:20110601142541
- /Title:
MP_2851_P2600_ST_1.00_ENG20110520.doc
- /Author:
p000266068
- /Producer:
Acrobat PDFWriter 5.0 Windows NT
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1656431
- pdf_is_encrypted:
False
- pdf_number_of_pages:
88
- /Author:
kkita263
- /CreationDate:
D:20200402100705+09'00'
- /ModDate: D:20200402100705+09'00'
- /Producer:
Microsoft: Print To PDF
- /Title:
Microsoft Word - Pro_8300S_ST_EXP_1.01_jp_ENG.doc
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
p000266068
|
kkita263
|
pdf_data/st_metadata//CreationDate |
D:20110601142541
|
D:20200402100705+09'00'
|
pdf_data/st_metadata//Producer |
Acrobat PDFWriter 5.0 Windows NT
|
Microsoft: Print To PDF
|
pdf_data/st_metadata//Title |
MP_2851_P2600_ST_1.00_ENG20110520.doc
|
Microsoft Word - Pro_8300S_ST_EXP_1.01_jp_ENG.doc
|
pdf_data/st_metadata/pdf_file_size_bytes |
789628
|
1656431
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
88
|
88
|
dgst |
8a8d0f5b96ee95fb
|
4abd258f8045edf7
|