Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
OPPO Find X5 Pro, including ColorOS 12.1, and Qualcomm Snapdragon® 8 Gen 1 Mobile Platform
CSEC2021007
RICOH IM 370, nashuatec IM 370, Rex Rotary IM 370, Gestetner IM 370E-1.00
JISEC-CC-CRP-C0810-01-2024
name OPPO Find X5 Pro, including ColorOS 12.1, and Qualcomm Snapdragon® 8 Gen 1 Mobile Platform RICOH IM 370, nashuatec IM 370, Rex Rotary IM 370, Gestetner IM 370E-1.00
category Mobility Multi-Function Devices
scheme SE JP
not_valid_after 31.03.2027 26.03.2029
not_valid_before 31.03.2022 26.03.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed-CCRA-Certificate%20OPPO%20Find%20X5%20Pro.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0810_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20OPPO%20Find%20X5%20Pro.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0810_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OPPO%20Find%20X5%20Pro%20on%20ColorOS%2012.1%20Security%20Target.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0810_est.pdf
manufacturer Guangdong OPPO Mobile Telecommunications Corp., Ltd Ricoh Company, Ltd.
manufacturer_web https://www.oppo.com/en/ https://www.ricoh.com/
security_level {} EAL2
dgst 95ee9573a6851af4 18042da7045fbbca
heuristics/cert_id CSEC2021007 JISEC-CC-CRP-C0810-01-2024
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 12.1 1.00
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0810
  • certification_date: 01.03.2024
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0810
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0epbp000000b19h-att/c0810_eimg.pdf
    • certification_date: 26.03.2024
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, and Document Server functions. The TOE provides security functions to prevent unauthorized disclosure and alteration of user data and security function setting data. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Network Protection Function: Enables the TOE to protect network communications using encryption. Stored Data Protection Function: Enables the TOE to protect the stored data using encryption. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software.
    • evaluation_facility: ECSEC Laboratory Inc., Evaluation Center
    • expiration_date: 26.03.2029
    • product: RICOH IM 370, nashuatec IM 370, Rex Rotary IM 370, Gestetner IM 370
    • product_type: Multifunction Product
    • protection_profile: none
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0epbp000000b19h-att/c0810_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0epbp000000b19h-att/c0810_est.pdf
    • toe_version: E-1.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.03.2029
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0810_it3869.html
  • toe_overseas_name: RICOH IM 370, nashuatec IM 370, Rex Rotary IM 370, Gestetner IM 370 E-1.00
heuristics/protection_profiles c40ae795865a0dba, 731bdcc989507942, 83014eb399a802f3, c88af12926be2779 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf {}
pdf_data/cert_filename Signed-CCRA-Certificate OPPO Find X5 Pro.pdf c0810_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • SE:
    • CSEC2021007: 1
  • JP:
    • JISEC-CC-CRP-C0810-01-2024: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL1: 1
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_SPD.1: 1
pdf_data/cert_keywords/vendor
  • Qualcomm:
    • Qualcomm: 1
pdf_data/cert_keywords/eval_facility
  • atsec:
    • atsec: 1
  • ECSEC:
    • ECSEC Laboratory: 1
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_metadata
  • /CreationDate: D:20220404080932+02'00'
  • /Creator: RICOH MP C4504ex
  • /ModDate: D:20220404083958+02'00'
  • /Producer: RICOH MP C4504ex
  • pdf_file_size_bytes: 1623099
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate: D:20240606161757+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20240606161916+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 234832
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename Certification Report - OPPO Find X5 Pro.pdf c0810_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • SE:
    • CSEC2021007: 19
  • JP:
    • JISEC-CC-CRP-C0810-01-2024: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 3
    • EAL 1 augmented: 1
  • EAL:
    • EAL2: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 4
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONFIG: 1
    • A.NOTIFY: 1
    • A.NO_TOE_BYPASS: 1
    • A.PRECAUTION: 1
    • A.PROPER_USER: 1
    • A.TRUSTED_ADMIN: 1
  • T:
    • T.MALICIOUS_APP: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PERSISTENT_PRESENCE: 1
    • T.PHYSICAL_ACCESS: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED: 1
    • T.UNDETECTED_ACTIONS: 1
  • A:
    • A.ADMIN: 1
    • A.NETWORK_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.TRUSTED_ADMIN: 1
    • A.USER: 1
  • T:
    • T.CONFIDENTIAL_DATA_ALT: 2
    • T.CONFIDENTIAL_DATA_DIS: 2
    • T.DOCUMENT_DATA_ALT: 2
    • T.DOCUMENT_DATA_DIS: 2
    • T.JOB_ALT: 2
    • T.PROTECT_DATA_ALT: 2
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 3
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 7
      • TLS v1.1: 2
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 6
      • TLS 1.2: 3
      • TLS 1.3: 3
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 3
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 17025: 2
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP (MDFPP) Applications loaded onto the Mobile Device may: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: Jerry Johansson
  • /CreationDate: D:20220329111443+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220331141336+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 21FMV6272-30:1
  • /Title: Certification Report - OPPO Find X5 Pro
  • pdf_file_size_bytes: 504386
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Author:
  • /Company:
  • /CreationDate: D:20240606162040+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /Manager:
  • /ModDate: D:20240606162132+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240529083745
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 524687
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
pdf_data/st_filename OPPO Find X5 Pro on ColorOS 12.1 Security Target.pdf c0810_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 1
  • EAL:
    • EAL2: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 7
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG: 2
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 22
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM_EXT: 7
    • FCS_CKM_EXT.1: 5
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 5
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 6
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 5
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 5
    • FCS_CKM_EXT.6.1: 1
    • FCS_CKM_EXT.8: 7
    • FCS_CKM_EXT.8.1: 1
    • FCS_COP: 41
    • FCS_COP.1: 7
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 13
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_SMF_EXT.1: 1
    • FCS_SRV_EXT: 1
    • FCS_SRV_EXT.1: 5
    • FCS_SRV_EXT.1.1: 1
    • FCS_STG_EXT: 3
    • FCS_STG_EXT.1: 5
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 7
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 5
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 12
    • FCS_TLSC_EXT.1: 11
    • FCS_TLSC_EXT.1.1: 2
    • FCS_TLSC_EXT.1.2: 2
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.2: 4
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.4: 3
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLSC_EXT.5: 3
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 3
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_ACF_EXT: 2
    • FDP_ACF_EXT.1: 3
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 1
    • FDP_ACF_EXT.2: 3
    • FDP_ACF_EXT.2.1: 1
    • FDP_DAR_EXT: 2
    • FDP_DAR_EXT.1: 5
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 5
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 1
    • FDP_IFC_EXT.1: 6
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 3
    • FDP_PBA_EXT.1: 1
    • FDP_PBA_EXT.1.1: 1
    • FDP_STG_EXT: 1
    • FDP_STG_EXT.1: 5
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 4
    • FDP_UPC_EXT.1: 2
  • FIA:
    • FIA_AFL_EXT: 1
    • FIA_AFL_EXT.1: 4
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 6
    • FIA_BLT_EXT.1: 5
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 5
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 3
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 5
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.4.2: 1
    • FIA_BLT_EXT.6: 5
    • FIA_BLT_EXT.6.1: 1
    • FIA_BLT_EXT.7: 5
    • FIA_BLT_EXT.7.1: 1
    • FIA_BMG_EXT: 8
    • FIA_BMG_EXT.1: 5
    • FIA_PAE_EXT: 1
    • FIA_PAE_EXT.1: 5
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 1
    • FIA_PMG_EXT.1: 8
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 1
    • FIA_TRT_EXT.1: 5
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 2
    • FIA_UAU.6.1: 1
    • FIA_UAU.6.2: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.1: 5
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 3
    • FIA_UAU_EXT.2.1: 4
    • FIA_UAU_EXT.2.2: 1
  • FMT:
    • FMT_MOF_EXT: 1
    • FMT_MOF_EXT.1: 6
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF_EXT: 10
    • FMT_SMF_EXT.1: 8
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMF_EXT.2: 3
    • FMT_SMF_EXT.2.1: 1
  • FPT:
    • FPT_AEX_EXT: 4
    • FPT_AEX_EXT.1: 5
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 5
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 5
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 3
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_JTA_EXT: 1
    • FPT_JTA_EXT.1: 5
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 3
    • FPT_KST_EXT.1: 5
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 5
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 5
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 1
    • FPT_NOT_EXT.1: 5
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 1
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 13
    • FPT_TST_EXT.1: 9
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 1
    • FPT_TUD_EXT: 3
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.3: 3
    • FPT_TUD_EXT.3.1: 1
  • FTA:
    • FTA_SSL_EXT: 1
    • FTA_SSL_EXT.1: 5
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_WSE_EXT: 1
    • FTA_WSE_EXT.1: 4
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_BLT_EXT: 12
    • FTP_BLT_EXT.1: 5
    • FTP_BLT_EXT.1.1: 1
    • FTP_BLT_EXT.1.2: 1
    • FTP_BLT_EXT.2: 5
    • FTP_BLT_EXT.2.1: 1
    • FTP_BLT_EXT.3: 3
    • FTP_ITC_EXT: 7
    • FTP_ITC_EXT.1: 5
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 12
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 30
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 22
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 26
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 30
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST_EXP: 2
    • FPT_TST_EXP.1: 12
    • FPT_TST_EXP.1.1: 2
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONFIG: 1
    • A.NOTIFY: 1
    • A.NO_TOE_BYPASS: 1
    • A.PRECAUTION: 1
    • A.PROPER_USER: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.AUTH: 1
    • O.AUTH_COMM: 1
    • O.CONFIG: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.INTEGRITY: 1
    • O.PRIVACY: 1
    • O.PROTECTED_COMMS: 1
    • O.STORAGE: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.CONFIG: 1
    • OE.DATA_PROPER_USER: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.EAVESDROP: 1
    • T.FLAWAPP: 2
    • T.MALICIOUS_APP: 1
    • T.NETWORK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PERSISTENT: 2
    • T.PERSISTENT_PRESENCE: 1
    • T.PHYSICAL: 2
    • T.PHYSICAL_ACCESS: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED: 1
    • T.UNDETECTED_ACTIONS: 1
  • A:
    • A.ADMIN: 4
    • A.NETWORK_PROTECTION: 4
    • A.PHYSICAL_PROTECTION: 4
    • A.TRUSTED_ADMIN: 4
    • A.USER: 4
  • O:
    • O.AUDIT: 14
    • O.AUTHORIZATION: 28
    • O.CONFIDENTIAL_DATA_ALT: 12
    • O.CONFIDENTIAL_DATA_DIS: 15
    • O.DOCUMENT_DATA_ALT: 13
    • O.DOCUMENT_DATA_DIS: 16
    • O.EMMC_ENCRYPTION: 10
    • O.JOB_ALT: 16
    • O.PROTECT_DATA_ALT: 13
    • O.VALIDATION: 8
  • OE:
    • OE.AUDIT: 4
    • OE.AUDIT_MANAGE: 3
    • OE.AUTHORIZED_USER: 16
    • OE.NETWORK_PROTECTION: 3
    • OE.PHYSICAL_PROTECTION: 4
    • OE.TRAINED_ADMIN: 4
    • OE.TRAINED_USER: 4
    • OE.TRUSTED_ADMIN: 3
  • T:
    • T.CONFIDENTIAL_DATA_ALT: 4
    • T.CONFIDENTIAL_DATA_DIS: 4
    • T.DOCUMENT_DATA_ALT: 4
    • T.DOCUMENT_DATA_DIS: 4
    • T.JOB_ALT: 3
    • T.PROTECT_DATA_ALT: 4
pdf_data/st_keywords/vendor
  • Qualcomm:
    • Qualcomm: 10
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 28
      • AES-: 1
      • AES-128: 1
      • AES-256: 16
  • constructions:
    • MAC:
      • HMAC: 5
      • HMAC-SHA-256: 6
      • HMAC-SHA-384: 4
      • HMAC-SHA-512: 4
  • AES_competition:
    • AES:
      • AES: 9
      • AES-128: 2
  • djb:
    • ChaCha:
      • ChaCha20: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 6
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 9
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF: 1
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-256: 10
      • SHA-384: 5
      • SHA-512: 2
      • SHA384: 1
      • SHA512: 2
  • scrypt:
    • scrypt: 3
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
    • Key exchange: 3
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 3
  • TLS:
    • DTLS:
      • DTLS: 1
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 63
      • TLS 1.0: 1
      • TLS 1.1: 2
      • TLS 1.2: 2
  • VPN:
    • VPN: 17
  • IPsec:
    • IPsec: 9
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 8
      • TLS1.2: 2
      • TLS1.3: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 10
  • RNG:
    • RBG: 10
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 2
  • GCM:
    • GCM: 5
  • XTS:
    • XTS: 6
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 8
    • P-384: 8
    • secp256r1: 4
    • secp384r1: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 28
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 1
  • other:
    • TEE: 17
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 4
    • FIPS 186-4: 3
    • FIPS 197: 4
    • FIPS 198-1: 3
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 2
    • FIPS186-4: 1
    • FIPS198-1: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 186-4: 1
    • SP 800-108: 2
    • SP 800-38E: 1
    • SP 800-90A: 1
  • RFC:
    • RFC 2246: 1
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 4346: 2
    • RFC 5216: 1
    • RFC 5246: 4
    • RFC 5280: 3
    • RFC 5288: 5
    • RFC 5289: 12
    • RFC 5746: 2
    • RFC 6125: 1
    • RFC 6960: 1
  • X509:
    • X.509: 11
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 1
pdf_data/st_keywords/javacard_packages
  • com:
    • com.coloros.ocs.opencapabilityservice: 1
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP (MDFPP32) Applications loaded onto the Mobile Device: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: 株式会社リコー
  • /CreationDate: D:20240517114938+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240517114938+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: RICOH IM 370, nashuatec IM 370, Rex Rotary IM 370, Gestetner IM 370 Security Target
  • pdf_file_size_bytes: 1131843
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 82
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different