Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
nCircle™ IP360™ Vulnerability Management System V6.3.4
383-4-35
DataOverwriteSecurity Unit Type H Software Version: 1.01x
JISEC-CC-CRP-C0145
name nCircle™ IP360™ Vulnerability Management System V6.3.4 DataOverwriteSecurity Unit Type H Software Version: 1.01x
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme CA JP
not_valid_after 29.09.2015 07.10.2013
not_valid_before 16.05.2005 28.02.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nCircle%20CR%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0145_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nCircle%20IP360%20v6.3.4%20ST%20v2.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0145_est.pdf
manufacturer nCircle Inc. Ricoh Company, Ltd.
manufacturer_web https://www.ncircle.com https://www.ricoh.com/
dgst ba7743a59a48c119 663b9c1bde7447b3
heuristics/cert_id 383-4-35 JISEC-CC-CRP-C0145
heuristics/cert_lab CANADA []
heuristics/cpe_matches cpe:2.3:a:ncircle:ip360:-:*:*:*:*:*:*:* {}
heuristics/extracted_versions 6.3.4 1.01
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0145
  • certification_date: 01.02.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0145_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; Ricoh imagio MP C6000 series Ricoh imagio MP C7500 series Ricoh Aficio MP C6000 series Ricoh Aficio MP C7500 series Savin C6055/C7570 series Lanier LD260c/275c series Lanier MP C6000/C7500 series Gestetner MP C6000/C7500 series Infotec MP C6000/C7500 series NRG MP C6000/C7500 series TOE security functions Same as above.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: imagio Security Card Type 7 Software (Japanese name) DataOverwriteSecurity Unit Type H Software (English name)
    • product_type: IT Product (software to overwrite data)
    • report_link: https://www.ipa.go.jp/en/security/c0145_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0145_est.pdf
    • toe_version: 1.01x
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.10.2013
  • revalidations: [frozendict({'date': '2009-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0145_it7169_02.html'})]
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: imagio Security Card Type 7 Software 1.01x
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0145_it7169.html
  • toe_overseas_name: DataOverwriteSecurity Unit Type H Software 1.01x
pdf_data/report_filename nCircle CR v1.0.pdf c0145_erpt.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-35
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-35: 2
  • JP:
    • CRP-C0145-01: 1
    • Certification No. C0145: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 5
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.MODE: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408:2004: 1
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_metadata
  • /Author: cmaugi
  • /CreationDate: D:20050527090045-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20050527090045-04'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Microsoft Word - nCircle CR v1.0.doc
  • pdf_file_size_bytes: 175523
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /CreationDate: D:20080911170342+09'00'
  • /ModDate: D:20080911170342+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 98465
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename nCircle IP360 v6.3.4 ST v2.1.pdf c0145_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 4
  • EAL:
    • EAL3: 9
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 1
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.2: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 1
    • AVA_SOF.1: 2
    • AVA_VLA.1: 1
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 1
    • AVA_VLA.1: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 20
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 16
    • FMT_MTD: 3
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 18
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 8
    • FPT_STM.1: 9
    • FPT_STM.1.1: 5
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FDP:
    • FDP_RIP.1: 5
    • FDP_SIP.1: 13
    • FDP_SIP.1.1: 1
  • FPT:
    • FPT_RVM.1: 8
    • FPT_RVM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ATTACK: 3
    • A.CONNECT: 3
    • A.ENVRNMT: 3
    • A.INSTALL: 3
    • A.INTROP: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
    • A.PRIVILEGE: 3
    • A.REMOTE: 3
    • A.TIME: 3
    • A.TRUSTED: 3
  • O:
    • O.ACCESS: 6
    • O.ADMIN: 3
    • O.ATTACK: 2
    • O.AUDITS: 7
    • O.CONNECT: 3
    • O.CREDENT: 2
    • O.ENVRNMT: 3
    • O.IDAUTH: 13
    • O.INSTALL: 2
    • O.INTROP: 3
    • O.NOEVIL: 3
    • O.PERSON: 3
    • O.PHYSICAL: 1
    • O.PRIVILEGE: 1
    • O.PROTECT: 11
    • O.REMOTE: 2
    • O.TIME: 4
    • O.TRAIN: 3
    • O.TRUSTED: 3
  • T:
    • T.ATTACK: 3
    • T.COMDIS: 3
    • T.COMINT: 3
    • T.FACCNT: 3
    • T.IMPCON: 3
    • T.IMPERSON: 3
    • T.LOSSOF: 3
    • T.MODIFY: 3
    • T.PRIVIL: 3
    • T.REPEAT: 3
  • A:
    • A: 1
    • A.MODE: 6
  • O:
    • O.OVERWRITE: 6
  • OE:
    • OE.MODE: 6
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • STMicroelectronics:
    • STM: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 7
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 15408:2004: 1
  • X509:
    • x.509: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • attack capability is needed for attacks such as bypassing or tampering TSF, but those are out of scope of this evaluation. That is to say, an analysis of apparent vulnerability (AVA_VLA.1) is sufficient: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: sjackson
  • /CreationDate: D:20050511115103
  • /Creator: nCircle IP360 v6.3.4 ST v2.1.doc - Microsoft Word
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Title: nCircle IP360 v6.3.4 ST v2.1.doc
  • pdf_file_size_bytes: 968005
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /CreationDate: D:20080820185804+09'00'
  • /ModDate: D:20080820185804+09'00'
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • pdf_file_size_bytes: 406573
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 30
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different