Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

RICOH IM 2500/2500G/2509J/3000/3000G/3009J/3500/3500G/3509J/4000/4000G/5000/ 5000G/6000/6000G,SAVIN IM 2500/2500G/3000/3000G/3500/3500G/4000/4000G/5000/5000G/6000/6000G,LANIER IM 2500/2500G/3000/3000G/3500/3500G/4000/4000G/5000/5000G/6000/6000G, nashuatec IM 2500/3000/3500/4000/5000/6000,Rex Rotary IM 2500/3000/3500/4000/5000/6000, Gestetner IM 2500/3000/3500/4000/5000/6000E-1.01
JISEC-CC-CRP-C0736-01-2022
Ricoh Aficio MP 301, Savin MP 301, Lanier MP 301, nashuatec MP 301, Rex-Rotary MP 301, Gestetner MP 301, infotec MP 301 all of the above with Facsimile Function / Hard Disk Drive Version: - Software: System/Copy 1.08, Network Support 12.25.3, Fax 03.00.00, RemoteFax 01.03.00, NetworkDocBox 1.00, Web Support 1.04, Web Uapl 1.02, animation 2.00, Scanner 01.05, Printer 1.05, PCL 1.06, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-7(WW) 03.00.00, Engine 1.02:05, OpePanel 1.16 - Hardware: Ic Key 01020714, Ic Hdd 01
JISEC-CC-CRP-C0382
name RICOH IM 2500/2500G/2509J/3000/3000G/3009J/3500/3500G/3509J/4000/4000G/5000/ 5000G/6000/6000G,SAVIN IM 2500/2500G/3000/3000G/3500/3500G/4000/4000G/5000/5000G/6000/6000G,LANIER IM 2500/2500G/3000/3000G/3500/3500G/4000/4000G/5000/5000G/6000/6000G, nashuatec IM 2500/3000/3500/4000/5000/6000,Rex Rotary IM 2500/3000/3500/4000/5000/6000, Gestetner IM 2500/3000/3500/4000/5000/6000E-1.01 Ricoh Aficio MP 301, Savin MP 301, Lanier MP 301, nashuatec MP 301, Rex-Rotary MP 301, Gestetner MP 301, infotec MP 301 all of the above with Facsimile Function / Hard Disk Drive Version: - Software: System/Copy 1.08, Network Support 12.25.3, Fax 03.00.00, RemoteFax 01.03.00, NetworkDocBox 1.00, Web Support 1.04, Web Uapl 1.02, animation 2.00, Scanner 01.05, Printer 1.05, PCL 1.06, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-7(WW) 03.00.00, Engine 1.02:05, OpePanel 1.16 - Hardware: Ic Key 01020714, Ic Hdd 01
not_valid_before 2022-01-20 2012-12-18
not_valid_after 2027-01-20 2017-02-07
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0736_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0382_est.pdf
status active archived
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0736_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0382_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0736_eimg.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash f19b2bc4e76825d51d61b2d7eeec0cfd814d51e785e8e3181eb036d7dc01b67f None
state/cert/txt_hash 1152bedc6f1c1e827f32e71b9a03add1bc43d40d4d3aaf2f187e5da0d898f1ae None
state/report/pdf_hash 36457f83cc0a3014e1d8e1487a9475a3ca5dd56ef2c3e1eaac4d691061871981 a39b7f199993ef3ec4946f3500d7cf61db0aa3097278a4f490ea65554300cf90
state/report/txt_hash 5bb5ab90da6d57820930e7923b856211eb5a18df8ad8a571c6722761b435ac0b 30edb771555a11ae9dc8b2f3fbc62fe8e6a92c610bfc99abc6b1a2038481b506
state/st/pdf_hash 31a733214c5ab454f70114ebc5214499270505b767b98e01411c3cd5e3dcdf3d 421ad4f068e1d166db821fc4d96d0547c49f79eabd41b63d0e959ec5354dc6e9
state/st/txt_hash e374c57c0bced59d7fcc3221ef4beddeaa44ace8a0037f5bbb8c876d6829bad8 9e3f2cd249241f5b769f8df5a16ab8ccc65e99351577117cf5e8d194b0aa9c10
heuristics/cert_id JISEC-CC-CRP-C0736-01-2022 JISEC-CC-CRP-C0382
heuristics/extracted_versions 1.01 01.03.00, 1.05, 1.02, 1.08, 12.25.3, 1.16, 1.06, 1.03, 1.04, 3.5, 03.00.00, 2.00, 1.13, 01.05, 1.00
heuristics/scheme_data/cert_id C0736 C0382
heuristics/scheme_data/certification_date 2022-01 2012-12
heuristics/scheme_data/claim PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) EAL3+ ALC_FLR.2 PP
heuristics/scheme_data/enhanced
  • product: RICOH IM 2500/2500G/2509J/3000/3000G/ 3009J/3500/3500G/3509J/4000/4000G/5000/ 5000G/6000/6000G, SAVIN IM 2500/2500G/3000/3000G/3500/ 3500G/4000/4000G/5000/5000G/6000/6000G, LANIER IM 2500/2500G/3000/3000G/3500/ 3500G/4000/4000G/5000/5000G/6000/6000G, nashuatec IM 2500/3000/3500/4000/5000/6000, Rex Rotary IM 2500/3000/3500/4000/5000/6000, Gestetner IM 2500/3000/3500/4000/5000/6000
  • toe_version: E-1.01
  • product_type: Multi Function Product
  • cert_id: JISEC-C0736
  • certification_date: 2022-01-20
  • cc_version: 3.1 Release5
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000ch7-att/c0736_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000ch7-att/c0736_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000ch7-att/c0736_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: Ricoh Aficio MP 301, Savin MP 301, Lanier MP 301, nashuatec MP 301, Rex-Rotary MP 301, Gestetner MP 301, infotec MP 301 all of the above with Facsimile Function / Hard Disk Drive
  • toe_version: -Software: System/Copy 1.08 Network Support 12.25.3 Fax 03.00.00 RemoteFax 01.03.00 NetworkDocBox 1.00 Web Support 1.04 Web Uapl 1.02 animation 2.00 Scanner 01.05 Printer 1.05 PCL 1.06 PCL Font 1.13 Data Erase Onb 1.03m GWFCU3.5-7(WW) 03.00.00 Engine 1.02:05 OpePanel 1.16 -Hardware: Ic Key 01020714 Ic Hdd 01
  • product_type: Multi Function Product
  • certification_date: 2012-12-18
  • cc_version: 3.1
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1-2009
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0382_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0382_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0382_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/assurance_level EAL2 Augmented by ALC_FLR.2 EAL3 Augmented with ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 3.1 Release5 3.1
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000ch7-att/c0736_eimg.pdf https://www.ipa.go.jp/en/security/c0382_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2022-01-20 2012-12-18
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/product RICOH IM 2500/2500G/2509J/3000/3000G/ 3009J/3500/3500G/3509J/4000/4000G/5000/ 5000G/6000/6000G, SAVIN IM 2500/2500G/3000/3000G/3500/ 3500G/4000/4000G/5000/5000G/6000/6000G, LANIER IM 2500/2500G/3000/3000G/3500/ 3500G/4000/4000G/5000/5000G/6000/6000G, nashuatec IM 2500/3000/3500/4000/5000/6000, Rex Rotary IM 2500/3000/3500/4000/5000/6000, Gestetner IM 2500/3000/3500/4000/5000/6000 Ricoh Aficio MP 301, Savin MP 301, Lanier MP 301, nashuatec MP 301, Rex-Rotary MP 301, Gestetner MP 301, infotec MP 301 all of the above with Facsimile Function / Hard Disk Drive
heuristics/scheme_data/enhanced/protection_profile U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) IEEE Std 2600.1-2009
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000ch7-att/c0736_erpt.pdf https://www.ipa.go.jp/en/security/c0382_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000ch7-att/c0736_est.pdf https://www.ipa.go.jp/en/security/c0382_est.pdf
heuristics/scheme_data/enhanced/toe_version E-1.01 -Software: System/Copy 1.08 Network Support 12.25.3 Fax 03.00.00 RemoteFax 01.03.00 NetworkDocBox 1.00 Web Support 1.04 Web Uapl 1.02 animation 2.00 Scanner 01.05 Printer 1.05 PCL 1.06 PCL Font 1.13 Data Erase Onb 1.03m GWFCU3.5-7(WW) 03.00.00 Engine 1.02:05 OpePanel 1.16 -Hardware: Ic Key 01020714 Ic Hdd 01
heuristics/scheme_data/expiration_date None 2017-02
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0736_it1780.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0382_it2402.html
heuristics/scheme_data/toe_overseas_name RICOH IM 2500/2500G/2509J/3000/3000G/ 3009J/3500/3500G/3509J/4000/4000G/5000/ 5000G/6000/6000G, SAVIN IM 2500/2500G/3000/3000G/3500/ 3500G/4000/4000G/5000/5000G/6000/6000G, LANIER IM 2500/2500G/3000/3000G/3500/ 3500G/4000/4000G/5000/5000G/6000/6000G, nashuatec IM 2500/3000/3500/4000/5000/6000, Rex Rotary IM 2500/3000/3500/4000/5000/6000, Gestetner IM 2500/3000/3500/4000/5000/6000E-1.01 Ricoh Aficio MP 301, Savin MP 301, Lanier MP 301, nashuatec MP 301, Rex-Rotary MP 301, Gestetner MP 301, infotec MP 301 all of the above with Facsimile Function / Hard Disk Drive - Software: System/Copy 1.08, Network Support 12.25.3, Fax 03.00.00, RemoteFax 01.03.00, NetworkDocBox 1.00, Web Support 1.04, Web Uapl 1.02, animation 2.00, Scanner 01.05, Printer 1.05, PCL 1.06, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-7(WW) 03.00.00, Engine 1.02:05, OpePanel 1.16 - Hardware: Ic Key 01020714, Ic Hdd 01
pdf_data/cert_filename c0736_eimg.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0736-01-2022: 1
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ECSEC:
      • ECSEC Laboratory: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 121967
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20220225160202+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20220303153603+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_hyperlinks:
None
pdf_data/report_filename c0736_erpt.pdf c0382_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0736-01-2022: 1
  • CRP-C0382-01: 1
  • Certification No. C0382: 1
pdf_data/report_keywords/cc_claims/T/T.CONF 4 2
pdf_data/report_keywords/cc_claims/T/T.DOC 4 2
pdf_data/report_keywords/cc_claims/T/T.FUNC 2 1
pdf_data/report_keywords/cc_claims/T/T.PROT 2 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2 augmented: 2
  • EAL3: 4
  • EAL3 augmented: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/crypto_protocol/IPsec/IPsec 5 4
pdf_data/report_keywords/crypto_protocol/TLS
  • TLS:
    • TLS 1.2: 1
    • TLS: 1
  • SSL:
    • SSL: 3
pdf_data/report_keywords/eval_facility/ECSEC/ECSEC Laboratory 4 3
pdf_data/report_keywords/standard_id/CC
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 326617
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /CreationDate: D:20220303152224+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20220303153735+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 282452
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
  • /Author:
  • /CreationDate: D:20130123142912+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20130123143958+09'00'
  • /Producer: Acrobat Distiller 9.5.2 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20220303152224+09'00' D:20130123142912+09'00'
pdf_data/report_metadata//Creator Microsoft® Word for Office 365 PScript5.dll Version 5.2.2
pdf_data/report_metadata//ModDate D:20220303153735+09'00' D:20130123143958+09'00'
pdf_data/report_metadata//Producer Microsoft® Word for Office 365 Acrobat Distiller 9.5.2 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 326617 282452
pdf_data/report_metadata/pdf_number_of_pages 36 38
pdf_data/st_filename c0736_est.pdf c0382_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.STORAGE: 14
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • O:
    • O.STORAGE: 14
    • O.RCGATE: 13
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_claims/T/T.DOC 14 10
pdf_data/st_keywords/cc_claims/T/T.FUNC 7 5
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 1
  • EAL3: 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 14 31
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 18 39
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 6 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 23
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 23 22
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 6 5
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1.3: 4
  • FTP_ITC.1: 17
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1: 21
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TST.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 17 21
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 4 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS1.2: 1
  • IPsec:
    • IPsec: 10
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
pdf_data/st_keywords/crypto_protocol/TLS
  • TLS:
    • TLS1.2: 1
  • SSL:
    • SSL3.0: 1
  • TLS:
    • TLS1.0: 2
pdf_data/st_keywords/crypto_protocol/TLS/TLS
  • TLS1.2: 1
  • TLS1.0: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 4
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 6 7
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 2 5
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata//Author RICOH p000266068
pdf_data/st_metadata//CreationDate D:20220215104204+09'00' D:20121227195113+09'00'
pdf_data/st_metadata//Creator Microsoft® Word for Microsoft 365 PScript5.dll Version 5.2
pdf_data/st_metadata//ModDate D:20220215104204+09'00' D:20121227195113+09'00'
pdf_data/st_metadata//Producer Microsoft® Word for Microsoft 365 Acrobat Distiller 7.0.5 (Windows)
pdf_data/st_metadata//Title RICOH IM 2500/2500G/2509J/3000/3000G/3009J/3500/3500G/3509J/4000/4000G/5000/5000G/6000/6000G,SAVIN IM 2500/2500G/3000/3000G/3500/3500G/4000/4000G/5000/5000G/6000/6000G,LANIER IM 2500/2500G/3000/3000G/3500/3500G/4000/4000G/5000/5000G/6000/6000G,nashuatec IM 2500/3000/3500/4000/5000/6000,Rex Rotary IM 2500/3000/3500/4000/5000/6000,Gestetner IM 2500/3000/3500/4000/5000/6000 Security Target Microsoft Word - MP_301_ST_EXP_1.00_jp_ENG.doc
pdf_data/st_metadata/pdf_file_size_bytes 1432391 579099
pdf_data/st_metadata/pdf_number_of_pages 98 92
dgst a516f02ef985f47c 430fda2c67a94c8f