Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RICOH IM 9000/9000T/8000/7000J-2.00
JISEC-CC-CRP-C0804-01-2024
Feitian FT-JCOS V5.0
SERTIT-116
name RICOH IM 9000/9000T/8000/7000J-2.00 Feitian FT-JCOS V5.0
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP NO
status active archived
not_valid_after 31.01.2029 17.09.2023
not_valid_before 31.01.2024 17.09.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0804_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180917SERTIT-116%20C.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0804_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0804_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[09895][SERTIT-116][ST][v1.0.8]%20FTJCOS%20v5.0%20Security%20Target.pdf
manufacturer Ricoh Company, Ltd. Feitian Technologies Co., Ltd.
manufacturer_web https://www.ricoh.com/ https://www.ftsafe.com
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst bf6eacbf491bd984 8d5f8b6024447c59
heuristics/cert_id JISEC-CC-CRP-C0804-01-2024 SERTIT-116
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 AVA_COMP.1, ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_COMP.1, ALC_COMP.1, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 2.00 5.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0804
  • certification_date: 01.01.2024
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0804
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pnj-att/c0804_eimg.pdf
    • certification_date: 31.01.2024
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc., Evaluation Center
    • expiration_date: 31.01.2029
    • product: RICOH IM 9000/9000T/8000/7000
    • product_type: Multifunction Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pnj-att/c0804_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pnj-att/c0804_est.pdf
    • toe_version: J-2.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.01.2029
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0804_it3851.html
  • toe_japan_name: RICOH IM 9000 / 9000T / 8000 / 7000 J-2.00
  • toe_overseas_link: None
  • toe_overseas_name: -----
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 17.09.2018
  • developer: Feitian Technologies Co., Ltd.
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-116
    • certification_date: 17.09.2018
    • description: The TOE is an open Java Card Platforms (JCP), that is, smart cards or similar devices enabled with JavaCard technology that support post-issuance downloading of applications.The purpose of the TOE is to provide a limited Java Card environment for a single applet, specifically for e-passport and similar applications such as eID and driving license.The TOE is composed of a Smart Card Platform (SCP) and an embedded software (JCS + non-TSF parts). The JCP is compliant with Java Card Specification v3.0.4 and GlobalPlatform Specification v.2.3. The TOE allows for the loading of the customer applets, but after loading the single applet the platform must be closed to prevent further loading of applets after issuance of the card to the end user. To support this functionality, the TOE provides a closing mechanism with specific guidance. The applet should have been previously verified by an off-card trusted IT component. The JCP is managed by Card Manager that is a part of the TOE. The Card Manager(ISD) is a pre-issuance applet. The JCP is fully compliant with the Java Card Specification v3.0.4 excluding the optional part JCRMI which is not implemented by the TOE. The SCP is a certified hardware platform – the SLE77CLFX2400PM with specific IC dedicated software (firmware). The hardware platform is certified by the BSI under the certification ID: BSI-DSZ-CC-0964-V3-2017 . Not all functionality of the hardware is used by the composite TOE. Therefore some parts of the IC platform are not part of the composite TOEto ensure that the developed applet has sufficient ability to counter attacks.
    • developer: Feitian Technologies Co., Ltd.
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135382-1607954033/SERTIT/Sertifikater/2018/116/20180917SERTIT-116%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135385-1607954035/SERTIT/Sertifikater/2018/116/%5B09895%5D%5BSERTIT-116%5D%5BST%5D%5Bv1.0.8%5D%20FTJCOS%20v5.0%20Security%20Target.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135379-1607954030/SERTIT/Sertifikater/2018/116/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • expiration_date: 17.09.2023
    • level: EAL 5, ALC_DVS.2, AVA_VAN.5
    • mutual_recognition: CCRA, SOG-IS
    • product: V5.0.9
    • sponsor: Feitian Technologies Co., Ltd.
  • product: FT-JCOS V5.0
  • url: https://sertit.no/certified-products/product-archive/ft-jcos-v5-0
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0964-V3-2017
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0964-V3-2017
heuristics/protection_profiles 43ce79b420f23a00 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf {}
pdf_data/cert_filename c0804_eimg.pdf 20180917SERTIT-116 C.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0804-01-2024: 1
  • NO:
    • SERTIT-116: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ALC:
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • Feitian:
    • Feitian Technologies: 1
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/crypto_library
  • NSS:
    • NSS: 1
pdf_data/cert_metadata
  • /Author:
  • /CreationDate: D:20240328140527+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20240328140702+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240328050510
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 236136
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • pdf_file_size_bytes: 744305
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0804_erpt.pdf 20180917 Sertit-116 CR Feitian v10.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0804-01-2024: 1
  • NO:
    • SERTIT-116: 20
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 5: 1
    • EAL1: 1
    • EAL5+: 22
    • EAL7: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_COMP.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_COMP.1: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_COMP.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COMP.1: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_COMP.1: 1
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RNG.1: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 3
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 4
  • Feitian:
    • Feitian: 1
    • Feitian Technologies: 2
    • Feitian Technologies Co: 1
  • Infineon:
    • Infineon: 1
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • BrightSight:
    • Brightsight: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 6
      • TLS 1.2: 3
      • TLS 1.3: 3
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • CC:
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 15408: 8
    • ISO/IEC 7816: 2
  • SCP:
    • SCP02: 2
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 3.0.4: 1
  • JavaCard:
    • Java Card 2.3: 1
    • Java Card 3.0.4: 4
pdf_data/report_metadata
  • /Author:
  • /Company:
  • /CreationDate: D:20240328145542+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /Manager:
  • /ModDate: D:20240328145658+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240327021241
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 628579
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
  • /AAPL:Keywords: ['ugradert']
  • /Author: [email protected]
  • /CreationDate: D:20180917114319Z00'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: ugradert
  • /ModDate: D:20180917114319Z00'00'
  • /Producer: Mac OS X 10.13.6 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 1156984
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename c0804_est.pdf [09895][SERTIT-116][ST][v1.0.8] FTJCOS v5.0 Security Target.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0964-: 1
    • BSI-DSZ-CC-0964-V3-2017: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 2
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL5: 6
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 7
    • ADV_IMP.1: 9
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 10
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 10
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 10
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 28
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_RIP: 1
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 24
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 25
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 18
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 26
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 32
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP.1: 21
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 3
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 5
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 9
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 8
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP: 7
    • FCS_COP.1: 21
    • FCS_RNG: 5
    • FCS_RNG.1: 13
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 12
    • FDP_ACC.2: 2
    • FDP_ACF: 21
    • FDP_ACF.1: 13
    • FDP_IFC: 23
    • FDP_IFC.1: 13
    • FDP_IFC.2: 2
    • FDP_IFF: 18
    • FDP_IFF.1: 17
    • FDP_ITC: 12
    • FDP_ITC.1: 4
    • FDP_ITC.2: 10
    • FDP_ITT.1: 1
    • FDP_RIP: 75
    • FDP_RIP.1: 8
    • FDP_ROL: 12
    • FDP_ROL.1: 3
    • FDP_SDI.1: 1
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 5
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 8
    • FIA_ATD.1: 2
    • FIA_UID: 24
    • FIA_UID.1: 10
    • FIA_UID.2: 1
    • FIA_USB: 7
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 87
    • FMT_MSA.1: 10
    • FMT_MSA.2: 2
    • FMT_MSA.3: 16
    • FMT_MTD: 20
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 18
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR: 31
    • FMT_SMR.1: 30
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 13
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 2
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_RCV: 22
    • FPT_RCV.3: 13
    • FPT_RCV.4: 2
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 6
    • FTP_ITC.1: 4
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 5
  • D:
    • D.CONF: 4
    • D.DOC: 19
    • D.FUNC: 13
    • D.PROT: 4
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 10
    • O.SOFTWARE: 9
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 4
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 20
  • T:
    • T.CONF: 10
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
  • A:
    • A.APPLET: 6
    • A.DELETION: 1
    • A.VERIFICATION: 6
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 2
    • D.APP_I_DATA: 4
    • D.CM_APDU: 1
    • D.CRYPTO: 7
    • D.JCS_CODE: 4
    • D.JCS_DATA: 5
    • D.JCS_KEYS: 4
    • D.SEC_ATTRIBUTES: 2
    • D.SEC_DATA: 8
  • O:
    • O.ALARM: 20
    • O.APPLET: 4
    • O.CARD-: 7
    • O.CARD-MANAGEMENT: 30
    • O.CIPHER: 14
    • O.CODE_PKG: 3
    • O.COMMUNICATION: 11
    • O.DELETION: 1
    • O.FIREWALL: 37
    • O.GLOBAL: 2
    • O.GLOBAL_ARRAYS_CONFID: 16
    • O.GLOBAL_ARRAYS_INTEG: 9
    • O.IC_SUPPORT: 17
    • O.INSTALL: 16
    • O.JAVAOBJECT: 22
    • O.KEY-: 1
    • O.KEY-MNGT: 20
    • O.LOAD: 18
    • O.NATIVE: 14
    • O.OPERATE: 33
    • O.OS: 1
    • O.OS_SUPPORT: 23
    • O.PACKAGE: 2
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 15
    • O.RECOVERY: 23
    • O.REMOTE: 1
    • O.RESOURCES: 19
    • O.RND: 14
    • O.SID: 30
    • O.TRANSACTION: 14
  • OE:
    • OE.APPLET: 9
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-: 5
    • OE.CODE-EVIDENCE: 16
    • OE.SCP: 6
    • OE.VERIFICATION: 37
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.GP: 3
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.LOAD_PCKG: 1
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.VERIFICATION: 6
  • R:
    • R.JAVA: 5
  • T:
    • T.COMMUNICATION: 5
    • T.CONFID-: 2
    • T.CONFID-APPLI-: 2
    • T.CONFID-APPLI-DATA: 16
    • T.CONFID-JCS-CODE: 7
    • T.CONFID-JCS-DATA: 9
    • T.DELETION: 1
    • T.EXE-: 1
    • T.EXE-CODE: 8
    • T.FAULT: 6
    • T.INSTALL: 6
    • T.INTEG-: 6
    • T.INTEG-APPLI-: 4
    • T.INTEG-APPLI-CODE: 12
    • T.INTEG-APPLI-DATA: 17
    • T.INTEG-JCS-: 1
    • T.INTEG-JCS-CODE: 7
    • T.INTEG-JCS-DATA: 12
    • T.LEAKAGE: 6
    • T.NATIVE: 6
    • T.PHYSICAL: 8
    • T.RESOURCES: 9
    • T.RND: 6
    • T.SID: 19
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Feitian:
    • Feitian Technologies: 1
    • Feitian Technologies Co: 92
  • Infineon:
    • Infineon: 10
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • djb:
    • ChaCha:
      • ChaCha20: 2
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 7
      • Triple-DES: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 2
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-256: 2
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 9
  • TLS:
    • SSL:
      • SSL: 4
    • TLS:
      • TLS: 9
      • TLS1.2: 2
      • TLS1.3: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 21
    • RNG: 10
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • malfunction: 4
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • BSI:
    • AIS20: 2
    • AIS36: 2
  • FIPS:
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
    • FIPS140: 2
    • FIPS180-4: 2
    • FIPS197: 3
  • ICAO:
    • ICAO: 3
  • ISO:
    • ISO/IEC 18013: 2
    • ISO/IEC 9796-2: 1
  • SCP:
    • SCP02: 6
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.security: 2
  • javacardx:
    • javacardx.crypto: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are: 1
    • com 11 FT-JCOS V5.0 Security Target Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: 株式会社リコー
  • /CreationDate: D:20240311170537+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240311170537+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: RICOH IM 9000/9000T/8000/7000 Security Target
  • pdf_file_size_bytes: 1332169
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
  • /CreationDate: D:20180811160413+08'00'
  • /Creator: LaTeX with hyperref package
  • /Producer: MiKTeX-xdvipdfmx (0.7.8)
  • pdf_file_size_bytes: 1189588
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 89
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different