Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

MP C6503/C8003 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) E-1.01
JISEC-CC-CRP-C0558
RICOH IM C530F/C530FB, SAVIN IM C530FB, LANIER IM C530FB, nashuatec IM C530F/C530FB, Rex Rotary IM C530F/C530FB, Gestetner IM C530F/C530FB E-1.00
JISEC-CC-CRP-C0754-01-2022
name MP C6503/C8003 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) E-1.01 RICOH IM C530F/C530FB, SAVIN IM C530FB, LANIER IM C530FB, nashuatec IM C530F/C530FB, Rex Rotary IM C530F/C530FB, Gestetner IM C530F/C530FB E-1.00
not_valid_before 2017-06-22 2022-07-26
not_valid_after 2022-06-22 2027-07-26
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0558_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0754_est.pdf
status archived active
security_level ALC_FLR.2, EAL2+ EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0558_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0754_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0558_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0754_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/cert/pdf_hash 3b5acacc3ed6d41205a6c74801bb73a966dfcad6c2125c338d0896cb26c500b0 1057f168d126643f3a12b61693d35b93b1018ff7c016fe6df51ef3f60c823bb3
state/cert/txt_hash f6e390ff459e5fc158273c74881bca68d82f0a2a4a019faaa2609516be57ae5c bc6da80240465ecdd0cb9c61156e88d79682f495b9521c9082c93438f3baf500
state/report/pdf_hash 6af431fccb1ed860f7a38c2b497de4722e9c13e66bda092ec961fc7e540b5f1b 1899121bcb5ce11f811ff0641eb4358dbbbdc580c65a8218c7a02cd870e8ee67
state/report/txt_hash 33c5c64502a88ac8d050ec4223af075cb0392ed7876d5f4d4c75d4493bb5c01d bdfbd453d5b12eed7e32f6f33d977c38a258f11cf944a54dba77ea2d05746353
state/st/pdf_hash 569c1b90282f9b1e77b386c0f6918b9528b8f0bae56c78ce172c765032620a61 abfe1d4911718d7ae119338cc53faabe4e797911b565d32a4a62888c03e951e2
state/st/txt_hash 460c9d8a3b9a8c203f9c6c80bf949fcb690e925bf918bd8f3e33e0b6cf00500a 20bf9f96d4be12ae9f8e3c89e4e4a1b4d38085433edbb6fab8392babc0c5692e
heuristics/cert_id JISEC-CC-CRP-C0558 JISEC-CC-CRP-C0754-01-2022
heuristics/cpe_matches cpe:2.3:h:ricoh:mp_c6503:-:*:*:*:*:*:*:* None
heuristics/extracted_versions 1.01 1.00
heuristics/scheme_data/cert_id C0558 C0754
heuristics/scheme_data/certification_date 2017-06 2022-07
heuristics/scheme_data/claim EAL2+ALC_FLR.2PP EAL2
heuristics/scheme_data/enhanced
  • product: MP C6503/C8003 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec)
  • toe_version: E-1.01
  • product_type: Multi Function Product
  • certification_date: 2017-06-22
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented with ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0558_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0558_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0558_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: RICOH IM C530F/C530FB, SAVIN IM C530FB, LANIER IM C530FB, nashuatec IM C530F/C530FB, Rex Rotary IM C530F/C530FB, Gestetner IM C530F/C530FB
  • toe_version: E-1.00
  • product_type: Multifunction Product
  • cert_id: JISEC-C0754
  • certification_date: 2022-07-26
  • cc_version: 3.1 Release5
  • assurance_level: EAL2
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000hci-att/c0754_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000hci-att/c0754_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000hci-att/c0754_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, and Fax functions. The TOE provides security functions to prevent unauthorized disclosure and alteration of user data and security function setting data. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Network Protection Function: Enables the TOE to protect network communications using encryption. Stored Data Protection Function: Enables the TOE to protect the stored data using encryption. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
heuristics/scheme_data/enhanced/assurance_level EAL2 Augmented with ALC_FLR.2 EAL2
heuristics/scheme_data/enhanced/cc_version 3.1 Release4 3.1 Release5
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0558_eimg.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000hci-att/c0754_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2017-06-22 2022-07-26
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, and Fax functions. The TOE provides security functions to prevent unauthorized disclosure and alteration of user data and security function setting data. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Network Protection Function: Enables the TOE to protect network communications using encryption. Stored Data Protection Function: Enables the TOE to protect the stored data using encryption. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
heuristics/scheme_data/enhanced/product MP C6503/C8003 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) RICOH IM C530F/C530FB, SAVIN IM C530FB, LANIER IM C530FB, nashuatec IM C530F/C530FB, Rex Rotary IM C530F/C530FB, Gestetner IM C530F/C530FB
heuristics/scheme_data/enhanced/product_type Multi Function Product Multifunction Product
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0558_erpt.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000hci-att/c0754_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0558_est.pdf https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000hci-att/c0754_est.pdf
heuristics/scheme_data/enhanced/toe_version E-1.01 E-1.00
heuristics/scheme_data/expiration_date 2022-07 None
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0558_it6595.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0754_it1790.html
heuristics/scheme_data/toe_overseas_name MP C6503/C8003 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) E-1.01 RICOH IM C530F/C530FB, SAVIN IM C530FB, LANIER IM C530FB, nashuatec IM C530F/C530FB, Rex Rotary IM C530F/C530FB, Gestetner IM C530F/C530FBE-1.00
pdf_data/cert_filename c0558_eimg.pdf c0754_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0754-01-2022: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_metadata
  • pdf_file_size_bytes: 453529
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
  • /CreationDate: D:20170727104310+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /Keywords:
  • /ModDate: D:20170727104408+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 89115
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20220905155837+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20220909134631+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_hyperlinks:
pdf_data/cert_metadata//CreationDate D:20170727104310+09'00' D:20220905155837+09'00'
pdf_data/cert_metadata//Creator Word 用 Acrobat PDFMaker 11 Microsoft® Word 2019
pdf_data/cert_metadata//ModDate D:20170727104408+09'00' D:20220909134631+09'00'
pdf_data/cert_metadata//Producer Adobe PDF Library 11.0 Microsoft® Word 2019
pdf_data/cert_metadata/pdf_file_size_bytes 453529 89115
pdf_data/cert_metadata/pdf_number_of_pages 1 2
pdf_data/report_filename c0558_erpt.pdf c0754_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0558-01: 1
  • Certification No. C0558: 1
  • JISEC-CC-CRP-C0754-01-2022: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.PHYSICAL_PROTECTION: 1
  • A.NETWORK_PROTECTION: 1
  • A.USER: 1
  • A.ADMIN: 1
  • A.TRUSTED_ADMIN: 1
pdf_data/report_keywords/cc_claims/A/A.ADMIN 2 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 2
  • T.FUNC: 1
  • T.PROT: 1
  • T.CONF: 2
  • T.DOCUMENT_DATA_DIS: 2
  • T.DOCUMENT_DATA_ALT: 1
  • T.JOB_ALT: 2
  • T.PROTECT_DATA_ALT: 2
  • T.CONFIDENTIAL_DATA_DIS: 2
  • T.CONFIDENTIAL_DATA_ALT: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2 augmented: 2
  • EAL2: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • IPsec:
    • IPsec: 4
  • TLS:
    • TLS:
      • TLS: 9
      • TLS 1.2: 1
pdf_data/report_keywords/crypto_protocol/TLS/TLS
  • TLS: 2
  • TLS: 9
  • TLS 1.2: 1
pdf_data/report_keywords/crypto_protocol/TLS/TLS/TLS 2 9
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_metadata//CreationDate D:20170919121516+09'00' D:20220929092554+09'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 Microsoft® Word 2019
pdf_data/report_metadata//ModDate D:20170919121801+09'00' D:20220929092926+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Microsoft® Word 2019
pdf_data/report_metadata/pdf_file_size_bytes 312337 518669
pdf_data/report_metadata/pdf_number_of_pages 38 32
pdf_data/st_filename c0558_est.pdf c0754_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.STORAGE: 14
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • O:
    • O.DOCUMENT_DATA_DIS: 16
    • O.DOCUMENT_DATA_ALT: 13
    • O.JOB_ALT: 16
    • O.PROTECT_DATA_ALT: 13
    • O.CONFIDENTIAL_DATA_DIS: 15
    • O.CONFIDENTIAL_DATA_ALT: 12
    • O.AUTHORIZATION: 28
    • O.FAX: 8
    • O.VALIDATION: 10
    • O.AUDIT: 12
    • O.EMMC_ENCRYPTION: 12
  • T:
    • T.DOCUMENT_DATA_DIS: 4
    • T.DOCUMENT_DATA_ALT: 4
    • T.PROTECT_DATA_ALT: 4
    • T.CONFIDENTIAL_DATA_DIS: 4
    • T.CONFIDENTIAL_DATA_ALT: 4
    • T.JOB_ALT: 2
    • T.APPLICATIONS_ALT: 1
  • A:
    • A.PHYSICAL_PROTECTION: 4
    • A.NETWORK_PROTECTION: 4
    • A.USER: 4
    • A.ADMIN: 4
    • A.TRUSTED_ADMIN: 4
  • OE:
    • OE.AUDIT: 4
    • OE.PHYSICAL_PROTECTION: 4
    • OE.NETWORK_PROTECTION: 3
    • OE.AUTHORIZED_USER: 16
    • OE.TRAINED_USER: 4
    • OE.TRAINED_ADMIN: 4
    • OE.TRUSTED_ADMIN: 3
    • OE.AUDIT_MANAGE: 3
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 5
  • A.USER: 4
  • A.ADMIN: 10
  • A.PHYSICAL_PROTECTION: 4
  • A.NETWORK_PROTECTION: 4
  • A.USER: 4
  • A.ADMIN: 4
  • A.TRUSTED_ADMIN: 4
pdf_data/st_keywords/cc_claims/A/A.ADMIN 10 4
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.DOCUMENT_DATA_DIS: 16
  • O.DOCUMENT_DATA_ALT: 13
  • O.JOB_ALT: 16
  • O.PROTECT_DATA_ALT: 13
  • O.CONFIDENTIAL_DATA_DIS: 15
  • O.CONFIDENTIAL_DATA_ALT: 12
  • O.AUTHORIZATION: 28
  • O.FAX: 8
  • O.VALIDATION: 10
  • O.AUDIT: 12
  • O.EMMC_ENCRYPTION: 12
pdf_data/st_keywords/cc_claims/O/O.AUDIT 9 12
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 3
  • OE.AUDIT_ACCESS: 2
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 4
  • OE.USER: 21
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • OE.AUDIT: 4
  • OE.PHYSICAL_PROTECTION: 4
  • OE.NETWORK_PROTECTION: 3
  • OE.AUTHORIZED_USER: 16
  • OE.TRAINED_USER: 4
  • OE.TRAINED_ADMIN: 4
  • OE.TRUSTED_ADMIN: 3
  • OE.AUDIT_MANAGE: 3
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT 3 4
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 14
  • T.FUNC: 7
  • T.PROT: 5
  • T.CONF: 10
  • T.DOCUMENT_DATA_DIS: 4
  • T.DOCUMENT_DATA_ALT: 4
  • T.PROTECT_DATA_ALT: 4
  • T.CONFIDENTIAL_DATA_DIS: 4
  • T.CONFIDENTIAL_DATA_ALT: 4
  • T.JOB_ALT: 2
  • T.APPLICATIONS_ALT: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL2 1 5
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 12 13
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 6 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 11
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 8 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 9 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 7
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 11
  • FCS_COP.1: 10
  • FCS_CKM.2: 2
  • FCS_CKM.4: 7
  • FCS_CKM.1.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.1: 12
  • FCS_CKM.4: 12
  • FCS_COP.1: 9
  • FCS_CKM.2: 2
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 11 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 7 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 10 9
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF.1: 31
  • FDP_ACF.1.1: 3
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 3
  • FDP_ACC.1: 31
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 2
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
  • FDP_FXS_EXP: 2
  • FDP_ACC.1: 16
  • FDP_ACF.1: 16
  • FDP_FXS_EXP.1: 12
  • FDP_FXS_EXP.1.1: 2
  • FDP_ITC.1: 4
  • FDP_ITC.2: 4
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 31 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 31 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 2 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 2 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 7
  • FIA_ATD.1: 9
  • FIA_SOS.1: 7
  • FIA_UAU.1: 14
  • FIA_UAU.7: 7
  • FIA_UID.1: 30
  • FIA_USB.1: 8
  • FIA_AFL: 1
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 9 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 8 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 8 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 18 30
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 6 8
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMF.1: 23
  • FMT_SMR.1: 29
  • FMT_MSA.3: 22
  • FMT_MSA.1: 20
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MOF.1: 7
  • FMT_MSA.1: 14
  • FMT_MSA.3: 14
  • FMT_MTD.1: 25
  • FMT_SMF.1: 25
  • FMT_SMR.1: 30
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 12 25
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 23 25
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 29 30
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 5
  • FPT_FDI_EXP.1: 11
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1: 6
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_TST_EXP: 2
  • FPT_STM.1: 9
  • FPT_TST_EXP.1: 12
  • FPT_TST_EXP.1.1: 2
  • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 17 18
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 4 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS1.0: 1
      • TLS1.1: 1
      • TLS1.2: 1
  • IPsec:
    • IPsec: 10
  • TLS:
    • SSL:
      • SSL: 5
    • TLS:
      • TLS: 8
      • TLS1.2: 3
pdf_data/st_keywords/crypto_protocol/TLS
  • TLS:
    • TLS1.0: 1
    • TLS1.1: 1
    • TLS1.2: 1
  • SSL:
    • SSL: 5
  • TLS:
    • TLS: 8
    • TLS1.2: 3
pdf_data/st_keywords/crypto_protocol/TLS/TLS
  • TLS1.0: 1
  • TLS1.1: 1
  • TLS1.2: 1
  • TLS: 8
  • TLS1.2: 3
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS1.2 1 3
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 1 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 5
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 6 5
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata//Author RICOH 株式会社リコー
pdf_data/st_metadata//CreationDate D:20170911121906+09'00' D:20220927151612+09'00'
pdf_data/st_metadata//Creator Microsoft® Word 2013 Microsoft® Word for Microsoft 365
pdf_data/st_metadata//ModDate D:20170911121906+09'00' D:20220927151612+09'00'
pdf_data/st_metadata//Producer Microsoft® Word 2013 Microsoft® Word for Microsoft 365
pdf_data/st_metadata//Title MP C6503/C8003 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) Security Target RICOH IM C530F/C530FB, SAVIN IM C530FB, LANIER IM C530FB, nashuatec IM C530F/C530FB, Rex Rotary IM C530F/C530FB, Gestetner IM C530F/C530FB Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1124359 1101447
pdf_data/st_metadata/pdf_number_of_pages 86 79
dgst 8bd2a09df4315cd9 7b007e541d1e3686