Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Ricoh Aficio MP C305, Savin MP C305, Lanier MP C305, nashuatec MP C305, Rex-Rotary MP C305, Gestetner MP C305, infotec MP C305 all of the above with Facsimile Function / Hard Disk Drive Version:- Software: System/Copy 1.08, Network Support 12.25.3, Fax 03.00.00, RemoteFax 01.03.00, NetworkDocBox 1.00, Web Support 1.04, Web Uapl 1.02, animation 1.00, Scanner 01.05, Printer 1.05, PCL 1.07, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-5(WW) 03.00.00, Engine 1.08:02, OpePanel 1.16 - Hardware: Ic Key 01020714, Ic Hdd 01
JISEC-CC-CRP-C0381
RICOH IM C4500/C4500G/C5500/C6000/C6000G,SAVIN IM C4500/C4500G/C6000/C6000G,LANIER IM C4500/C4500G/C6000/C6000G,nashuatec IM C4500/C5500/C6000,Rex Rotary IM C4500/C5500/C6000,Gestetner IM C4500/C5500/C6000 Version: E-1.01
JISEC-CC-CRP-C0636-01-2019
name Ricoh Aficio MP C305, Savin MP C305, Lanier MP C305, nashuatec MP C305, Rex-Rotary MP C305, Gestetner MP C305, infotec MP C305 all of the above with Facsimile Function / Hard Disk Drive Version:- Software: System/Copy 1.08, Network Support 12.25.3, Fax 03.00.00, RemoteFax 01.03.00, NetworkDocBox 1.00, Web Support 1.04, Web Uapl 1.02, animation 1.00, Scanner 01.05, Printer 1.05, PCL 1.07, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-5(WW) 03.00.00, Engine 1.08:02, OpePanel 1.16 - Hardware: Ic Key 01020714, Ic Hdd 01 RICOH IM C4500/C4500G/C5500/C6000/C6000G,SAVIN IM C4500/C4500G/C6000/C6000G,LANIER IM C4500/C4500G/C6000/C6000G,nashuatec IM C4500/C5500/C6000,Rex Rotary IM C4500/C5500/C6000,Gestetner IM C4500/C5500/C6000 Version: E-1.01
not_valid_before 2012-12-18 2019-03-27
not_valid_after 2017-02-07 2024-03-27
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0381_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0636_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0381_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0636_erpt.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0636_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None b3e90da6c261386b10b586301803bbb40d9db3978e9f41e6645cd30d1b29abdc
state/cert/txt_hash None b43467b661a3106463f7c3ab8e714512d001013559aa787cc26a011a46db2cf7
state/report/pdf_hash 70df13cba6e92b87ddfa48311233cc8f3668692e24b4eac53d803857b4c0e98a 4dc3bea7c94dac4992b43647240c2cc9d2152bf2521986888cb6f8286f207ca2
state/report/txt_hash 92cdd4c6b747510da9467531c27b3bc0a6fdf7d2fff5c0d8872ffb4d7734baf5 f315ea32ff10a9a7a228be2c44b26cd7ec16652ef039655a788475af651ab7d8
state/st/pdf_hash 107d7b55529042ceafa509ad07ae1f65292ce8425d76608b96ba12e8812522d0 6384ac1aab207199b02aee46731c0573d7b24e4cba85164472dc86af64943df1
state/st/txt_hash 5faea76ca4d4102da6f3b48a87c984c6942882da7783266dd45bbefc58fa01d2 761ab4e2cfebd205198be72c3f4ed12411b0c75c8fe9db33df992c8e83d9ba44
heuristics/cert_id JISEC-CC-CRP-C0381 JISEC-CC-CRP-C0636-01-2019
heuristics/extracted_versions 01.03.00, 1.07, 1.05, 1.02, 1.08, 12.25.3, 1.16, 1.03, 3.5, 1.04, 03.00.00, 1.13, 01.05, 1.00 1.01
heuristics/scheme_data/cert_id C0381 C0636
heuristics/scheme_data/certification_date 2012-12 2019-03
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
heuristics/scheme_data/enhanced
  • product: Ricoh Aficio MP C305, Savin MP C305, Lanier MP C305, nashuatec MP C305, Rex-Rotary MP C305, Gestetner MP C305, infotec MP C305 all of the above with Facsimile Function / Hard Disk Drive
  • toe_version: -Software: System/Copy 1.08 Network Support 12.25.3 Fax 03.00.00 RemoteFax 01.03.00 NetworkDocBox 1.00 Web Support 1.04 Web Uapl 1.02 animation 1.00 Scanner 01.05 Printer 1.05 PCL 1.07 PCL Font 1.13 Data Erase Onb 1.03m GWFCU3.5-5(WW) 03.00.00 Engine 1.08:02 OpePanel 1.16 -Hardware: Ic Key 01020714 Ic Hdd 01
  • product_type: Multi Function Product
  • certification_date: 2012-12-18
  • cc_version: 3.1
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1-2009
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0381_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0381_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0381_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: RICOH IM C4500/C4500G/C5500/C6000/C6000G,SAVIN IM C4500/C4500G/C6000/C6000G,LANIER IM C4500/C4500G/C6000/C6000G,nashuatec IM C4500/C5500/C6000,Rex Rotary IM C4500/C5500/C6000,Gestetner IM C4500/C5500/C6000
  • toe_version: E-1.01
  • product_type: Multi Function Product
  • cert_id: JISEC-C0636
  • certification_date: 2019-03-27
  • cc_version: 3.1 Release5
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0636_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0636_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0636_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/assurance_level EAL3 Augmented with ALC_FLR.2 EAL2 Augmented by ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 3.1 3.1 Release5
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0381_eimg.pdf https://www.ipa.go.jp/en/security/c0636_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2012-12-18 2019-03-27
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/product Ricoh Aficio MP C305, Savin MP C305, Lanier MP C305, nashuatec MP C305, Rex-Rotary MP C305, Gestetner MP C305, infotec MP C305 all of the above with Facsimile Function / Hard Disk Drive RICOH IM C4500/C4500G/C5500/C6000/C6000G,SAVIN IM C4500/C4500G/C6000/C6000G,LANIER IM C4500/C4500G/C6000/C6000G,nashuatec IM C4500/C5500/C6000,Rex Rotary IM C4500/C5500/C6000,Gestetner IM C4500/C5500/C6000
heuristics/scheme_data/enhanced/protection_profile IEEE Std 2600.1-2009 U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0381_erpt.pdf https://www.ipa.go.jp/en/security/c0636_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0381_est.pdf https://www.ipa.go.jp/en/security/c0636_est.pdf
heuristics/scheme_data/enhanced/toe_version -Software: System/Copy 1.08 Network Support 12.25.3 Fax 03.00.00 RemoteFax 01.03.00 NetworkDocBox 1.00 Web Support 1.04 Web Uapl 1.02 animation 1.00 Scanner 01.05 Printer 1.05 PCL 1.07 PCL Font 1.13 Data Erase Onb 1.03m GWFCU3.5-5(WW) 03.00.00 Engine 1.08:02 OpePanel 1.16 -Hardware: Ic Key 01020714 Ic Hdd 01 E-1.01
heuristics/scheme_data/expiration_date 2017-02 2024-04
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0381_it2401.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0636_it8684.html
heuristics/scheme_data/toe_overseas_name Ricoh Aficio MP C305, Savin MP C305, Lanier MP C305, nashuatec MP C305, Rex-Rotary MP C305, Gestetner MP C305, infotec MP C305 all of the above with Facsimile Function / Hard Disk Drive - Software: System/Copy 1.08, Network Support 12.25.3, Fax 03.00.00, RemoteFax 01.03.00, NetworkDocBox 1.00, Web Support 1.04, Web Uapl 1.02, animation 1.00, Scanner 01.05, Printer 1.05, PCL 1.07, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-5(WW) 03.00.00, Engine 1.08:02, OpePanel 1.16 - Hardware: Ic Key 01020714, Ic Hdd 01 RICOH IM C4500/C4500G/C5500/C6000/C6000G, SAVIN IM C4500/C4500G/C6000/C6000G,LANIER IM C4500/C4500G/C6000/C6000G,nashuatec IM C4500/C5500/C6000,Rex Rotary IM C4500/C5500/C6000, Gestetner IM C4500/C5500/C6000E-1.01
pdf_data/cert_filename None c0636_eimg.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0636-01-2019: 1
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ECSEC:
      • ECSEC Laboratory: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 274476
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20190422135218+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190422140358+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/report_filename c0381_erpt.pdf c0636_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0381-01: 1
  • Certification No. C0381: 1
  • JISEC-CC-CRP-C0636-01-2019: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 2
  • EAL2: 4
  • EAL2 augmented: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 3
  • TLS:
    • TLS: 3
pdf_data/report_keywords/eval_facility/ECSEC/ECSEC Laboratory 3 4
pdf_data/report_keywords/standard_id/CC
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 282526
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
  • /Author:
  • /CreationDate: D:20130123142727+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20130123143839+09'00'
  • /Producer: Acrobat Distiller 9.5.2 (Windows)
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 521177
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 42
  • /CreationDate: D:20190610143302+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190610143610+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20130123142727+09'00' D:20190610143302+09'00'
pdf_data/report_metadata//Creator PScript5.dll Version 5.2.2 Microsoft® Word 2010
pdf_data/report_metadata//ModDate D:20130123143839+09'00' D:20190610143610+09'00'
pdf_data/report_metadata//Producer Acrobat Distiller 9.5.2 (Windows) Microsoft® Word 2010
pdf_data/report_metadata/pdf_file_size_bytes 282526 521177
pdf_data/report_metadata/pdf_number_of_pages 38 42
pdf_data/st_filename c0381_est.pdf c0636_est.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.STORAGE: 14
    • O.RCGATE: 13
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.STORAGE: 14
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_claims/T/T.DOC 10 14
pdf_data/st_keywords/cc_claims/T/T.FUNC 5 7
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
  • ALC_FLR.2: 3
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 1
  • EAL2: 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 10 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 31 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 39 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 7 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 23 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 23
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 5 6
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 21
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TST.1: 1
  • FTP_ITC.1.3: 4
  • FTP_ITC.1: 17
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 21 17
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 1 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
  • TLS:
    • TLS:
      • TLS1.0: 1
      • TLS1.1: 1
      • TLS1.2: 1
  • IPsec:
    • IPsec: 10
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL3.0: 1
  • TLS:
    • TLS1.0: 2
  • TLS:
    • TLS1.0: 1
    • TLS1.1: 1
    • TLS1.2: 1
pdf_data/st_keywords/crypto_protocol/TLS/TLS
  • TLS1.0: 2
  • TLS1.0: 1
  • TLS1.1: 1
  • TLS1.2: 1
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS1.0 2 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 5 2
pdf_data/st_metadata//Author p000266068 RICOH
pdf_data/st_metadata//CreationDate D:20121227195012+09'00' D:20190527140509+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2 Microsoft® Word for Office 365
pdf_data/st_metadata//ModDate D:20121227195012+09'00' D:20190527140509+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 7.0.5 (Windows) Microsoft® Word for Office 365
pdf_data/st_metadata//Title Microsoft Word - MP_C305_ST_EXP_1.00_jp_ENG.doc RICOH IM C4500/C4500G/C5500/C6000/C6000G, SAVIN IM C4500/C4500G/C6000/C6000G, LANIER IM C4500/C4500G/C6000/C6000G, nashuatec IM C4500/C5500/C6000, Rex Rotary IM C4500/C5500/C6000, Gestetner IM C4500/C5500/C6000 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 579351 1096389
pdf_data/st_metadata/pdf_number_of_pages 92 88
dgst b6febb7ec07c858f 58d5bdb4349b23fb