Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C353P / ineo+ 353P Control Software version A02E0Y0-100_GM012
JISEC-CC-CRP-C0148
DataOverwriteSecurity Unit Type H Software Version: 1.01x
JISEC-CC-CRP-C0145
name bizhub C353P / ineo+ 353P Control Software version A02E0Y0-100_GM012 DataOverwriteSecurity Unit Type H Software Version: 1.01x
not_valid_before 26.03.2008 28.02.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0145_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0145_est.pdf
manufacturer Konica Minolta Business Technologies, Inc Ricoh Company, Ltd.
manufacturer_web https://www.konicaminolta.com/ https://www.ricoh.com/
dgst b41c1858c9432c46 663b9c1bde7447b3
heuristics/cert_id JISEC-CC-CRP-C0148 JISEC-CC-CRP-C0145
heuristics/extracted_versions - 1.01
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0148
  • certification_date: 01.03.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0148_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. network printer (bizhub C353P / ineo+ 353P). This product offers the protection from exposure of the highly confidential document stored in the printer, and aims at protecting the data which may be exposed against a user's intention. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions. - All area overwrite deletion function - HDD encryption key generation function - HDD verification function - Public box authentication function - Secure print authentication function - Trusted channel function - Administrator identification and authentication functions - Service engineer identification and authentication functions
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: Japanese name:bizhub C353P / ineo+ 353P Control Software English name:bizhub C353P / ineo+ 353P Control Software
    • product_type: IT Product (Data protection function in printer systems)
    • report_link: https://www.ipa.go.jp/en/security/c0148_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0148_est.pdf
    • toe_version: A02E0Y0-0100-GM0-12
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.10.2013
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0148_it7166.html
  • toe_overseas_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
  • cert_id: JISEC-CC-CRP-C0145
  • certification_date: 01.02.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0145_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; Ricoh imagio MP C6000 series Ricoh imagio MP C7500 series Ricoh Aficio MP C6000 series Ricoh Aficio MP C7500 series Savin C6055/C7570 series Lanier LD260c/275c series Lanier MP C6000/C7500 series Gestetner MP C6000/C7500 series Infotec MP C6000/C7500 series NRG MP C6000/C7500 series TOE security functions Same as above.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: imagio Security Card Type 7 Software (Japanese name) DataOverwriteSecurity Unit Type H Software (English name)
    • product_type: IT Product (software to overwrite data)
    • report_link: https://www.ipa.go.jp/en/security/c0145_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0145_est.pdf
    • toe_version: 1.01x
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.10.2013
  • revalidations: [frozendict({'date': '2009-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0145_it7169_02.html'})]
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: imagio Security Card Type 7 Software 1.01x
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0145_it7169.html
  • toe_overseas_name: DataOverwriteSecurity Unit Type H Software 1.01x
pdf_data/report_filename c0148_erpt.pdf c0145_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0148-01: 1
    • Certification No. C0148: 1
  • JP:
    • CRP-C0145-01: 1
    • Certification No. C0145: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.BRING-OUT-STORAGE: 2
  • A:
    • A.MODE: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 180-1: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Hereinafter referred to as”printer”). This TOE offers the protection from exposure of the highly confidential document CRP-C0148-01 2 stored in the printer. Moreover, TOE can encrypt the image data written in HDD for: 1
pdf_data/report_metadata
  • /CreationDate: D:20080617154414+09'00'
  • /ModDate: D:20080617154414+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 218797
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
  • /CreationDate: D:20080911170342+09'00'
  • /ModDate: D:20080911170342+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 98465
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename c0148_est.pdf c0145_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 6
    • EAL4: 1
  • EAL:
    • EAL3: 9
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 1
    • AVA_VLA.1: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 6
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 41
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 47
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ITC.1: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 65
    • FIA_AFL.1.1: 7
    • FIA_AFL.1.2: 7
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 14
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 58
    • FIA_SOS.1.1: 6
    • FIA_SOS.2: 11
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 22
    • FIA_UAU.2: 76
    • FIA_UAU.2.1: 5
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 2
    • FIA_UID: 3
    • FIA_UID.1: 21
    • FIA_UID.2: 34
    • FIA_UID.2.1: 4
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MOF.1: 136
    • FMT_MOF.1.1: 4
    • FMT_MSA: 5
    • FMT_MSA.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 86
    • FMT_MTD.1.1: 6
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 73
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_ITC.1: 2
    • FPT_RVM.1: 17
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FDP:
    • FDP_RIP.1: 5
    • FDP_SIP.1: 13
    • FDP_SIP.1.1: 1
  • FPT:
    • FPT_RVM.1: 8
    • FPT_RVM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 3
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.CHECK-HDD: 4
    • O.CONFIG: 13
    • O.CRYPT-KEY: 6
    • O.OVERWRITE-ALL: 4
    • O.PUBLIC-BOX: 7
    • O.SECURE-PRINT: 5
    • O.TRUSTED-PASS: 5
  • OE:
    • OE.CRYPT: 5
    • OE.CRYPTO: 1
    • OE.FEED-BACK: 11
    • OE.LOCK-HDD: 4
    • OE.SESSION: 1
  • T:
    • T.ACCESS-NET-SETTING: 3
    • T.ACCESS-PUBLIC-BOX: 3
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 3
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-PRINTER: 3
  • A:
    • A: 1
    • A.MODE: 6
  • O:
    • O.OVERWRITE: 6
  • OE:
    • OE.MODE: 6
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the printer. Moreover, TOE can encrypt the image data written in HDD for the danger of: 1
  • OutOfScope:
    • attack capability is needed for attacks such as bypassing or tampering TSF, but those are out of scope of this evaluation. That is to say, an analysis of apparent vulnerability (AVA_VLA.1) is sufficient: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author:
  • /Company:
  • /CreationDate: D:20080602193009+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20080602193041+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - 【C0148】bizhub353P_英文ST-106-080118_080530.doc
  • pdf_file_size_bytes: 641424
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 97
  • /CreationDate: D:20080820185804+09'00'
  • /ModDate: D:20080820185804+09'00'
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • pdf_file_size_bytes: 406573
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 30
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different