Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ZTE Optical Transmission Equipment Series
SERTIT-042
RICOH Pro 8300S/8310S/8320S, SAVIN Pro 8300S/8310S/8320S, LANIER Pro 8300S/8310S/8320S, nashuatec Pro 8300S/8310S/8320S, Rex Rotary Pro 8300S/8310S/8320S, Gestetner Pro 8300S/8310S/8320S E-1.01
JISEC-CC-CRP-C0666-01-2020
name ZTE Optical Transmission Equipment Series RICOH Pro 8300S/8310S/8320S, SAVIN Pro 8300S/8310S/8320S, LANIER Pro 8300S/8310S/8320S, nashuatec Pro 8300S/8310S/8320S, Rex Rotary Pro 8300S/8310S/8320S, Gestetner Pro 8300S/8310S/8320S E-1.01
category Other Devices and Systems Multi-Function Devices
scheme NO JP
not_valid_after 01.09.2019 13.02.2025
not_valid_before 25.02.2013 13.02.2020
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-042%20CR%20v%201.0.pdf https://www.commoncriteriaportal.org/files/epfiles/c0666_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ZTE%20Optical%20Transmission%20Equipment%20Security%20Target%20v1.2.pdf https://www.commoncriteriaportal.org/files/epfiles/c0666_est.pdf
manufacturer ZTE Corporation Ricoh Company, Ltd.
manufacturer_web https://wwwen.zte.com.cn/global/index.html
dgst a041cccd8254ec7a 4abd258f8045edf7
heuristics/cert_id SERTIT-042 JISEC-CC-CRP-C0666-01-2020
heuristics/extracted_versions - 1.01
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 25.02.2013
  • developer: ZTE Corporation
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-042
    • certification_date: 25.02.2013
    • description: SERTIT-042 C
    • developer: ZTE Corporation
    • documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134824-1607951230/SERTIT/Sertifikater/2013/42/ZTE%20Optical%20Transmission%20Equipment%20Security%20Target%20v1.2.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134821-1607951226/SERTIT/Sertifikater/2013/42/SERTIT-042%20CR%20v%201.0.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 2, ALC_FLR.2
    • mutual_recognition: CCRA
    • product: ZXONE 5800 v1.10, ZXMP S325 v2.10, ZXMP S385 v2.60, ZXMP M720 v1.00, ZXMP M820 v2.51, ZXWM M920 V4.20P01, ZXONE 8300 v1.00, ZXONE 8500 v1.00
    • sponsor: ZTE Corporation
  • product: ZTE Optical Transmission Equipment Series
  • url: https://sertit.no/certified-products/product-archive/zte-optical-transmission-equipment-series
  • cert_id: JISEC-CC-CRP-C0666
  • certification_date: 01.02.2020
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0666
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000rxc-att/c0666_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH Pro 8300S/8310S/8320S, SAVIN Pro 8300S/8310S/8320S, LANIER Pro 8300S/8310S/8320S, nashuatec Pro 8300S/8310S/8320S, Rex Rotary Pro 8300S/8310S/8320S, Gestetner Pro 8300S/8310S/8320S
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000rxc-att/c0666_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000rxc-att/c0666_est.pdf
    • toe_version: E-1.01
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.03.2025
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0666_it8686.html
  • toe_overseas_name: RICOH Pro 8300S / 8310S / 8320S, SAVIN Pro 8300S / 8310S / 8320S, LANIER Pro 8300S / 8310S / 8320S, nashuatec Pro 8300S / 8310S / 8320S, Rex Rotary Pro 8300S / 8310S / 8320S, Gestetner Pro 8300S / 8310S / 8320SE-1.01
protection_profile_links {} {}
pdf_data/report_filename SERTIT-042 CR v 1.0.pdf c0666_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-042: 23
  • JP:
    • JISEC-CC-CRP-C0666-01-2020: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 5
    • EAL 2 augmented: 2
    • EAL 2+: 21
    • EAL1: 1
    • EAL2: 1
    • EAL2+: 2
    • EAL7: 1
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.2: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 1
    • FAU_GEN.3: 2
    • FAU_SAR.1: 1
    • FAU_STG.1: 1
    • FAU_STG.4: 1
  • FDP:
    • FDP_ACC.2: 1
    • FDP_ACF.1: 1
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FTA:
    • FTA_MCS.1: 1
    • FTA_SSL.3: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.AUDITING: 1
    • O.AUTHENTICATE: 1
    • O.AUTHORISE: 1
  • OE:
    • OE.CLIENT_SECURITY: 1
    • OE.SERVER_SECURITY: 1
    • OE.TIME: 1
    • OE.TRUSTED_NETWORKS: 1
  • T:
    • T.AUTHORISED: 1
    • T.CONFIDENTIALITY: 1
    • T.INTEGRITY: 1
    • T.PHYSICAL_ATTACK: 1
    • T.UNAUTHORISED: 1
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STM: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 4
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 15408: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_metadata
  • /Author: Kvassnes, Kjartan Jæger
  • /CreationDate: D:20130321125808+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20130321125953+01'00'
  • /Producer: Microsoft® Word 2010
  • /Title: tittel
  • pdf_file_size_bytes: 1423728
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /CreationDate: D:20200619093405+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20200619093515+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 505839
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
pdf_data/st_filename ZTE Optical Transmission Equipment Security Target v1.2.pdf c0666_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
  • EAL:
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 1
    • FAU_GEN.3: 8
    • FAU_GEN.3.1: 3
    • FAU_GEN.3.2: 2
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.2: 5
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 4
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 5
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UID: 2
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_SMF: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 1
    • FPT_STM.1: 1
  • FTA:
    • FTA_MCS.1: 5
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 18
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 23
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 10
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.TRUSTED_NETWORK: 2
  • O:
    • O.ACCESS: 4
    • O.AUDITING: 4
    • O.AUTHENTICATE: 4
    • O.AUTHORISE: 4
  • OE:
    • OE.CLIENT_SECURITY: 3
    • OE.SERVER_SECURITY: 2
    • OE.TIME: 3
    • OE.TRUSTED_NETWORK: 1
    • OE.TRUSTED_NETWORKS: 1
  • OSP:
    • OSP.FLEXIBLE_MANAGEMENT: 2
  • T:
    • T.AUTHORISED: 2
    • T.CONFIDENTIALITY: 2
    • T.INTEGRITY: 2
    • T.PHYSICAL_ATTACK: 2
    • T.UNAUTHORISED: 2
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STM: 8
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS1.0: 1
      • TLS1.1: 1
      • TLS1.2: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
pdf_data/st_keywords/javacard_packages
  • com:
    • com.cn: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope and not described further in this ST. Operations Operations in the TOE are divided into • Topology: 1
    • for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope for this ST. Accounting: The TOE supports flexible logging and auditing of events. General This: 1
    • for ZTE maintenance staff that regularly services the TOE using the systems console, but this is out of scope for this ST. Accounting: The EMS supports flexible logging and auditing of security, operation and: 1
    • out of scope: 3
pdf_data/st_metadata
  • /CreationDate: D:20120816120620+02'00'
  • /Creator: PDF24 Creator
  • /ModDate: D:20120816120620+02'00'
  • /Producer: GPL Ghostscript 8.61
  • pdf_file_size_bytes: 699350
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 32
  • /Author: kkita263
  • /CreationDate: D:20200402100705+09'00'
  • /ModDate: D:20200402100705+09'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - Pro_8300S_ST_EXP_1.01_jp_ENG.doc
  • pdf_file_size_bytes: 1656431
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 88
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different