Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

MP C501 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.00
JISEC-CC-CRP-C0620-03-2018
MP C401(Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec) EE-1.00
JISEC-CC-CRP-C0471
name MP C501 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.00 MP C401(Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec) EE-1.00
not_valid_before 2018-10-11 2015-03-31
not_valid_after 2023-10-11 2020-04-02
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/C0620_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0471_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/C0620_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0471_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0620_eimg.pdf None
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash 2220e57c6bd2d49caa2062463868845dcaffe7fdf710a9152378f6b61df54980 None
state/cert/txt_hash 5c0516d48daff363331a39e9afe020152ccc207d16efcee6f7e074e5092aa8f9 None
state/report/pdf_hash d54597e17aaffb4c58d6f321f10acb2e3dfd7f7c66a2be8f8719fbfe062a735e 16781c98521c304d3c243d2fb5982fdb78cedbf8c5893245bc8321bc97892fc6
state/report/txt_hash 0b7b589276734f33ad36b6b7a19ece2ad9afcd16aae12cdb730ffe0cb6c9d557 f369fcc19e87b9402d458d56ae4417cae39c4e0548f24b83f8dbf8c12f0f9375
state/st/pdf_hash 7f25a6563411bffa93b5c1a38f0b4e4a5bed3202de0825192a33af13d3e45d90 4d91183cfcc2312ea690df66a82bd136f2115a51060edd7fa2d53c6db98ba309
state/st/txt_hash 83f17a22589e21bf61ed9fcca7323e4b6d7395a2ef2460725d2a2863f11a9215 0c17196a91ce333cbc8a0814ec2cf3736e1199d02065614743c8192ec8744d61
heuristics/cert_id JISEC-CC-CRP-C0620-03-2018 JISEC-CC-CRP-C0471
heuristics/scheme_data/cert_id C0620 C0471
heuristics/scheme_data/certification_date 2018-10 2015-03
heuristics/scheme_data/claim PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) EAL2+ ALC_FLR.2 PP
heuristics/scheme_data/enhanced
  • product: MP C501 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner)
  • toe_version: E-1.00
  • product_type: Multi Function Product
  • cert_id: JISEC-C0620
  • certification_date: 2018-10-11
  • cc_version: 3.1 Release5
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/C0620_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0620_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/C0620_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: MP C401(Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec)
  • toe_version: EE-1.00
  • product_type: Multi Function Product
  • certification_date: 2015-03-31
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented with ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0471_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0471_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0471_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/assurance_level EAL2 Augmented by ALC_FLR.2 EAL2 Augmented with ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 3.1 Release5 3.1 Release4
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0620_eimg.pdf https://www.ipa.go.jp/en/security/c0471_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2018-10-11 2015-03-31
heuristics/scheme_data/enhanced/product MP C501 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) MP C401(Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/C0620_erpt.pdf https://www.ipa.go.jp/en/security/c0471_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/C0620_est.pdf https://www.ipa.go.jp/en/security/c0471_est.pdf
heuristics/scheme_data/enhanced/toe_version E-1.00 EE-1.00
heuristics/scheme_data/expiration_date 2023-11 2020-04
heuristics/scheme_data/toe_japan_name MP C501 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) -----
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0620_it8675.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0471_it5525.html
heuristics/scheme_data/toe_overseas_name MP C501 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.00 MP C401(Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec)EE-1.00
pdf_data/cert_filename c0620_eimg.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0620-03-2018: 1
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ECSEC:
      • ECSEC Laboratory: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 150051
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20181109114253+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20181109114510+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
None
pdf_data/report_filename C0620_erpt.pdf c0471_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0620-03-2018: 1
  • CRP-C0471-01: 1
  • Certification No. C0471: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • TLS:
    • TLS: 3
  • SSL:
    • SSL: 3
pdf_data/report_keywords/standard_id/CC
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_metadata//CreationDate D:20181127141541+09'00' D:20150511134251+09'00'
pdf_data/report_metadata//ModDate D:20181127141616+09'00' D:20150511134311+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 340344 330245
pdf_data/report_metadata/pdf_number_of_pages 38 36
pdf_data/st_filename C0620_est.pdf c0471_est.pdf
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 14 31
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 18 39
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 6 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 23
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 23 22
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP 5 8
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 17 21
pdf_data/st_keywords/crypto_protocol/TLS
  • TLS:
    • TLS1.0: 1
    • TLS1.1: 1
    • TLS1.2: 1
  • SSL:
    • SSL3.0: 1
  • TLS:
    • TLS1.0: 2
pdf_data/st_keywords/crypto_protocol/TLS/TLS
  • TLS1.0: 1
  • TLS1.1: 1
  • TLS1.2: 1
  • TLS1.0: 2
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS1.0 1 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 6
  • AES:
    • AES: 8
  • RC:
    • RC4: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 6 8
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 2 5
pdf_data/st_metadata//Author RICOH z00se02158
pdf_data/st_metadata//CreationDate D:20181023112413+09'00' D:2015031214312609'00'
pdf_data/st_metadata//Creator Microsoft® Word 2016 PrimoPDF http://www.primopdf.com/
pdf_data/st_metadata//ModDate D:20181023112413+09'00' D:20150511134355+09'00'
pdf_data/st_metadata//Producer Microsoft® Word 2016 PrimoPDF
pdf_data/st_metadata//Title MP C501 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) Security Target Microsoft Word - MP_C401_ST_EU_1.00_jp_ENG.doc
pdf_data/st_metadata/pdf_file_size_bytes 1138585 853662
pdf_data/st_metadata/pdf_number_of_pages 85 91
dgst a0588f49e0ee61ca 2304fd42e2b6d53e