Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU: Fax Option Type 3351 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I, HDD Encryption Unit: HDD Encryption Unit Type A Version: Software System/Copy 1.02 Network Support 7.34 Scanner 01.12 Printer 1.02 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.05 Web Uapl 1.03 Network DocBox 1.00 animation 1.1 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.10 LANG0 1.09 LANG1 1.09 Hardware Ic Key 1100 Ic Hdd 01 Options Data Erase Opt 1.01m GWFCU3-20(WW) 02.00.00
JISEC-CC-CRP-C0286
Following MFP with FCU (Fax Option Type 5001). MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001 Version: MFP Software/Hardware Version: Software System/Copy 1.00, Network Support 7.29.3, Scanner 01.24, Printer 1.00, Fax 01.00.00, Web Support 1.00.1, Web Uapl 1.02, Network Doc Box 1.00, Hardware Ic Key 1100, Ic Hdd 01, FCU Version: GWFCU3-19(WW) 01.00.00
JISEC-CC-CRP-C0262
name Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU: Fax Option Type 3351 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I, HDD Encryption Unit: HDD Encryption Unit Type A Version: Software System/Copy 1.02 Network Support 7.34 Scanner 01.12 Printer 1.02 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.05 Web Uapl 1.03 Network DocBox 1.00 animation 1.1 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.10 LANG0 1.09 LANG1 1.09 Hardware Ic Key 1100 Ic Hdd 01 Options Data Erase Opt 1.01m GWFCU3-20(WW) 02.00.00 Following MFP with FCU (Fax Option Type 5001). MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001 Version: MFP Software/Hardware Version: Software System/Copy 1.00, Network Support 7.29.3, Scanner 01.24, Printer 1.00, Fax 01.00.00, Web Support 1.00.1, Web Uapl 1.02, Network Doc Box 1.00, Hardware Ic Key 1100, Ic Hdd 01, FCU Version: GWFCU3-19(WW) 01.00.00
not_valid_before 2011-03-29 2010-07-30
not_valid_after 2016-04-08 2015-08-02
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0286_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0262_est.pdf
security_level ALC_FLR.2, EAL3+ EAL3
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0286_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0262_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None})
state/report/pdf_hash 12a4883778391bcdf4eda63a578cbe5a9aa160158be18b2e24d398394c5a47ce 0e2306ab2b3aca0bc6c72a1bfa1ce1494292dba510843155997da5737cf04869
state/report/txt_hash c96fc9f591da46027c15119973c4416ff440f848b3ac9502857149bd7f2c7f9c 6adff1619de198792e303cdc1713f8c174661fef9bf5c9cf83a866f4a1ae7972
state/st/pdf_hash f590cacd6cb82566f6ebc69a0f8b42521e875f175bf35d15a7ca3e841b43a579 5cef3af2440f411becfcf412e33c668f123b77bd53e74cbca17bc317407d6cf2
state/st/txt_hash a88ef8d5a4bc65ec2d90a6d92df76468db5c3727a258261414da47b8cd3d11a7 e4ccfad71e16fc4807471a5b4dbede6dc59940fe1e3a5d0cc454f03620c4e597
heuristics/cert_id JISEC-CC-CRP-C0286 JISEC-CC-CRP-C0262
heuristics/scheme_data
  • cert_id: C0286
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP:Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU:Fax Option Type 3351 DataOverwriteSecurity Unit:DataOverwriteSecurity Unit Type I HDD Encryption Unit:HDD Encryption Unit Type A < Cont. >
  • expiration_date: 2016-04
  • claim: EAL3+ ALC_FLR.2 PP
  • certification_date: 2011-03
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0286_it0300.html
  • toe_japan_name: -----
  • enhanced:
    • product: Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU: Fax Option Type 3351 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I HDD Encryption Unit: HDD Encryption Unit Type A
    • toe_version: -Software System/Copy 1.02 Network Support 7.34 Scanner 01.12 Printer 1.02 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.05 Web Uapl 1.03 Network DocBox 1.00 animation 1.1 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.10 LANG0 1.09 LANG1 1.09 -Hardware Ic Key 1100 Ic Hdd 01 -Options Data Erase Opt 1.01m GWFCU3-20(WW) 02.00.00
    • product_type: Multi Function Product
    • certification_date: 2011-03-29
    • cc_version: 3.1
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • protection_profile: IEEE Std 2600.1-2009
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0286_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0286_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0286_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • cert_id: C0262
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: Following MFP with FCU(Fax Option Type 5001) MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001 < Cont. >
  • expiration_date: 2015-08
  • claim: EAL3
  • revalidations: frozendict({'date': '2011-02', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0262_it0290_01.html'})
  • certification_date: 2010-07
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0262_it0290.html
  • toe_japan_name: -----
  • enhanced:
    • product: Following MFP with FCU(Fax Option Type 5001) MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001
    • toe_version: MFP Software /Hardware Version : Software System/Copy 1.00 Network Support 7.29.3 Scanner 01.24 Printer 1.00 Fax 01.00.00 Web Support 1.00.1 Web Uapl 1.02 Network Doc Box 1.00 Ic Key 1100 Hardware Ic Hdd 01 FCU Version : GWFCU3-19(WW) 01.00.00
    • product_type: Multi Function Product
    • certification_date: 2010-07-30
    • cc_version: 3.1
    • assurance_level: EAL3
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/c0262_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0262_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0262_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions. TOE security functionality The major security functions of the TOE are: - Audit, which creates audit logs of security events. - Identification and Authentication, which identifies and authenticates users. - Document Data Access Control, which controls each users operation of documents. - Stored Data Protection, which encrypts stored document data on hard disk. - Network Communication Data Protection, which encrypts network communications. - Security Management, which provides total management of the security function settings. - Service Mode Lock, which controls the maintenance functions. - Telephone Line Intrusion Protection, which permits fax only communication. - MFP Control Software Verification, which checks the integrity of the software.
heuristics/scheme_data/cert_id C0286 C0262
heuristics/scheme_data/certification_date 2011-03 2010-07
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP EAL3
heuristics/scheme_data/enhanced
  • product: Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU: Fax Option Type 3351 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I HDD Encryption Unit: HDD Encryption Unit Type A
  • toe_version: -Software System/Copy 1.02 Network Support 7.34 Scanner 01.12 Printer 1.02 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.05 Web Uapl 1.03 Network DocBox 1.00 animation 1.1 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.10 LANG0 1.09 LANG1 1.09 -Hardware Ic Key 1100 Ic Hdd 01 -Options Data Erase Opt 1.01m GWFCU3-20(WW) 02.00.00
  • product_type: Multi Function Product
  • certification_date: 2011-03-29
  • cc_version: 3.1
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1-2009
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0286_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0286_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0286_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: Following MFP with FCU(Fax Option Type 5001) MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001
  • toe_version: MFP Software /Hardware Version : Software System/Copy 1.00 Network Support 7.29.3 Scanner 01.24 Printer 1.00 Fax 01.00.00 Web Support 1.00.1 Web Uapl 1.02 Network Doc Box 1.00 Ic Key 1100 Hardware Ic Hdd 01 FCU Version : GWFCU3-19(WW) 01.00.00
  • product_type: Multi Function Product
  • certification_date: 2010-07-30
  • cc_version: 3.1
  • assurance_level: EAL3
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0262_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0262_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0262_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions. TOE security functionality The major security functions of the TOE are: - Audit, which creates audit logs of security events. - Identification and Authentication, which identifies and authenticates users. - Document Data Access Control, which controls each users operation of documents. - Stored Data Protection, which encrypts stored document data on hard disk. - Network Communication Data Protection, which encrypts network communications. - Security Management, which provides total management of the security function settings. - Service Mode Lock, which controls the maintenance functions. - Telephone Line Intrusion Protection, which permits fax only communication. - MFP Control Software Verification, which checks the integrity of the software.
heuristics/scheme_data/enhanced/assurance_level EAL3 Augmented with ALC_FLR.2 EAL3
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0286_eimg.pdf https://www.ipa.go.jp/en/security/c0262_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2011-03-29 2010-07-30
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions. TOE security functionality The major security functions of the TOE are: - Audit, which creates audit logs of security events. - Identification and Authentication, which identifies and authenticates users. - Document Data Access Control, which controls each users operation of documents. - Stored Data Protection, which encrypts stored document data on hard disk. - Network Communication Data Protection, which encrypts network communications. - Security Management, which provides total management of the security function settings. - Service Mode Lock, which controls the maintenance functions. - Telephone Line Intrusion Protection, which permits fax only communication. - MFP Control Software Verification, which checks the integrity of the software.
heuristics/scheme_data/enhanced/evaluation_facility Electronic Commerce Security Technology Laboratory Inc. Evaluation Center Information Technology Security Center Evaluation Department
heuristics/scheme_data/enhanced/product Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU: Fax Option Type 3351 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I HDD Encryption Unit: HDD Encryption Unit Type A Following MFP with FCU(Fax Option Type 5001) MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0286_erpt.pdf https://www.ipa.go.jp/en/security/c0262_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0286_est.pdf https://www.ipa.go.jp/en/security/c0262_est.pdf
heuristics/scheme_data/enhanced/toe_version -Software System/Copy 1.02 Network Support 7.34 Scanner 01.12 Printer 1.02 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.05 Web Uapl 1.03 Network DocBox 1.00 animation 1.1 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.10 LANG0 1.09 LANG1 1.09 -Hardware Ic Key 1100 Ic Hdd 01 -Options Data Erase Opt 1.01m GWFCU3-20(WW) 02.00.00 MFP Software /Hardware Version : Software System/Copy 1.00 Network Support 7.29.3 Scanner 01.24 Printer 1.00 Fax 01.00.00 Web Support 1.00.1 Web Uapl 1.02 Network Doc Box 1.00 Ic Key 1100 Hardware Ic Hdd 01 FCU Version : GWFCU3-19(WW) 01.00.00
heuristics/scheme_data/expiration_date 2016-04 2015-08
heuristics/scheme_data/supplier RICOH COMPANY, LTD. RICOH COMPANY, LTD.
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0286_it0300.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0262_it0290.html
heuristics/scheme_data/toe_overseas_name Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP:Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU:Fax Option Type 3351 DataOverwriteSecurity Unit:DataOverwriteSecurity Unit Type I HDD Encryption Unit:HDD Encryption Unit Type A < Cont. > Following MFP with FCU(Fax Option Type 5001) MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001 < Cont. >
pdf_data/report_filename c0286_erpt.pdf c0262_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0286-01: 1
  • Certification No. C0286: 1
  • CRP-C0262-01: 1
  • Certification No. C0262: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.ADMIN: 2
  • A.SUPERVISOR: 1
  • A.NETWORK: 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 2
  • T.FUNC: 1
  • T.PROT: 1
  • T.CONF: 2
  • T.ILLEGAL_USE: 4
  • T.UNAUTH_ACCESS: 7
  • T.ABUSE_SEC_MNG: 3
  • T.SALVAGE: 3
  • T.TRANSIT: 3
  • T.FAX_LINE: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 1
  • EAL3: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • users, receives the document data from client computers which are connected via Network, stores the confidential document data into HDD of the TOE, and performs outputting by print and delivery. Therefore, the TOE is a: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
  • IPsec:
    • IPsec: 3
  • TLS:
    • SSL:
      • SSL: 9
    • TLS:
      • TLS: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 2
  • SSL:
    • SSL: 9
  • TLS:
    • TLS: 1
pdf_data/report_keywords/crypto_protocol/TLS/SSL/SSL 2 9
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 2
  • BSI:
    • BSI-AIS 31: 2
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
  • CCMB-2006-09-001: 2
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2007-09-004: 2
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 1 3
pdf_data/report_keywords/tee_name
  • other:
    • T6: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 577395
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110726170118+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110726170221+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 327868
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
  • /CreationDate: D:20110114141833+09'00'
  • /Author:
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Producer: Acrobat Distiller 8.2.3 (Windows)
  • /ModDate: D:20110114141838+09'00'
  • /Title: CRP-e
  • pdf_hyperlinks:
pdf_data/report_metadata//Author IPA/JISEC
pdf_data/report_metadata//CreationDate D:20110726170118+09'00' D:20110114141833+09'00'
pdf_data/report_metadata//ModDate D:20110726170221+09'00' D:20110114141838+09'00'
pdf_data/report_metadata//Producer Acrobat Distiller 8.3.0 (Windows) Acrobat Distiller 8.2.3 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 577395 327868
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 38 50
pdf_data/st_filename c0286_est.pdf c0262_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.DOC: 2
  • O:
    • O.STORAGE: 9
    • O.DOC: 14
    • O.FUNC: 8
    • O.PROT: 8
    • O.CONF: 16
    • O.USER: 20
    • O.INTERFACE: 8
    • O.SOFTWARE: 8
    • O.AUDIT: 9
  • T:
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 5
    • OE.USER: 18
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • O:
    • O.AUDIT: 16
    • O.MEM: 10
    • O.GENUINE: 9
    • O.LINE_PROTECT: 7
    • O.DOC_ACC: 8
    • O.MANAGE: 10
    • O.NET: 9
    • O.LINE: 2
  • T:
    • T.ILLEGAL_USE: 4
    • T.UNAUTH_ACCESS: 3
    • T.ABUSE_SEC_MNG: 4
    • T.SALVAGE: 3
    • T.TRANSIT: 4
    • T.FAX_LINE: 3
  • A:
    • A.ADMIN: 5
    • A.SUPERVISOR: 4
    • A.NETWORK: 5
  • OE:
    • OE.ADMIN: 3
    • OE.SUPERVISOR: 3
    • OE.NETWORK: 3
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 5
  • A.USER: 4
  • A.ADMIN: 10
  • A.ADMIN: 5
  • A.SUPERVISOR: 4
  • A.NETWORK: 5
pdf_data/st_keywords/cc_claims/A/A.ADMIN 10 5
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 9
  • O.DOC: 14
  • O.FUNC: 8
  • O.PROT: 8
  • O.CONF: 16
  • O.USER: 20
  • O.INTERFACE: 8
  • O.SOFTWARE: 8
  • O.AUDIT: 9
  • O.AUDIT: 16
  • O.MEM: 10
  • O.GENUINE: 9
  • O.LINE_PROTECT: 7
  • O.DOC_ACC: 8
  • O.MANAGE: 10
  • O.NET: 9
  • O.LINE: 2
pdf_data/st_keywords/cc_claims/O/O.AUDIT 9 16
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 3
  • OE.AUDIT_ACCESS: 2
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 5
  • OE.USER: 18
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • OE.ADMIN: 3
  • OE.SUPERVISOR: 3
  • OE.NETWORK: 3
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 8 3
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 10
  • T.FUNC: 5
  • T.PROT: 5
  • T.CONF: 10
  • T.ILLEGAL_USE: 4
  • T.UNAUTH_ACCESS: 3
  • T.ABUSE_SEC_MNG: 4
  • T.SALVAGE: 3
  • T.TRANSIT: 4
  • T.FAX_LINE: 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL3 1 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_STG.1: 9
    • FAU_STG.4: 7
    • FAU_SAR.1: 9
    • FAU_SAR.2: 7
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_COP.1: 9
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 32
    • FDP_ACF.1: 30
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.4: 3
    • FDP_ACF.1.3: 6
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 7
    • FIA_UAU.7: 7
    • FIA_SOS.1: 7
    • FIA_UID.1: 16
    • FIA_UAU.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMF.1: 22
    • FMT_SMR.1: 28
    • FMT_MSA.3: 22
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 4
    • FPT_FDI_EXP.1: 10
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TST.1: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.2: 9
    • FAU_STG.1: 9
    • FAU_STG.4: 9
    • FAU_GEN.1.2: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_COP.1: 8
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACF.1: 12
    • FDP_IFC.1: 12
    • FDP_IFF.1: 10
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ADF.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_ATD.1: 11
    • FIA_SOS.1: 8
    • FIA_UAU.2: 12
    • FIA_UAU.7: 9
    • FIA_UID.2: 10
    • FIA_USB.1: 10
    • FIA_UAU.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UID.1: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 12
    • FMT_MSA.3: 14
    • FMT_MTD.1: 18
    • FMT_SMF.1: 19
    • FMT_SMR.1: 19
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_TST.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_TRP.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
    • FTP_TST.1: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.1: 9
  • FAU_STG.4: 7
  • FAU_SAR.1: 9
  • FAU_SAR.2: 7
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 11
  • FAU_SAR.2: 9
  • FAU_STG.1: 9
  • FAU_STG.4: 9
  • FAU_GEN.1.2: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 9 11
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 7 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 7 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 9 8
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 32
  • FDP_ACF.1: 30
  • FDP_ACF.1.1: 3
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.4: 3
  • FDP_ACF.1.3: 6
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 2
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
  • FDP_ACC.1: 16
  • FDP_ACF.1: 12
  • FDP_IFC.1: 12
  • FDP_IFF.1: 10
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_ADF.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 32 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 30 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 4 12
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 7
  • FIA_UAU.7: 7
  • FIA_SOS.1: 7
  • FIA_UID.1: 16
  • FIA_UAU.1: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 10
  • FIA_ATD.1: 11
  • FIA_SOS.1: 8
  • FIA_UAU.2: 12
  • FIA_UAU.7: 9
  • FIA_UID.2: 10
  • FIA_USB.1: 10
  • FIA_UAU.1: 6
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UID.1: 8
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 7 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 8 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 7 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 13 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 7 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 16 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 6 10
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMF.1: 22
  • FMT_SMR.1: 28
  • FMT_MSA.3: 22
  • FMT_MSA.1: 20
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1: 12
  • FMT_MSA.3: 14
  • FMT_MTD.1: 18
  • FMT_SMF.1: 19
  • FMT_SMR.1: 19
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 12 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 28 19
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 4
  • FPT_FDI_EXP.1: 10
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1: 5
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1: 10
  • FPT_TST.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 9 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 5 9
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 12
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TST.1: 1
  • FTP_ITC.1: 8
  • FTP_TRP.1: 10
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 2
  • FTP_TRP.1.3: 2
  • FTP_TST.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 12 8
pdf_data/st_keywords/crypto_protocol/TLS/SSL/SSL 1 9
pdf_data/st_keywords/randomness/TRNG/TRNG 2 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id/BSI/BSI-AIS31 2 3
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2006-09-002: 1
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2006-09-001: 1
  • CCMB-2007-09-0004: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS197 2 3
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 2 3
pdf_data/st_metadata//CreationDate D:20110601142541 D:20110105171644
pdf_data/st_metadata//Creator MP_2851_P2600_ST_1.00_ENG20110520.doc - Microsoft Word MP_4001_ST_jp.doc - Microsoft Word
pdf_data/st_metadata//Title MP_2851_P2600_ST_1.00_ENG20110520.doc MP_4001_ST_jp.doc
pdf_data/st_metadata/pdf_file_size_bytes 789628 2064056
pdf_data/st_metadata/pdf_number_of_pages 88 81
dgst 8a8d0f5b96ee95fb b3e6ff57f68f0387