Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec),SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.02
JISEC-CC-CRP-C0473
Pro 8100/8110/8120 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) E-1.00
JISEC-CC-CRP-C0518
name MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec),SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.02 Pro 8100/8110/8120 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) E-1.00
not_valid_before 2015-05-19 2016-08-10
not_valid_after 2020-06-01 2017-02-13
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0473_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0518_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0473_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0518_erpt.pdf
state/report/pdf_hash c77b4ae33e08a6e03a984aefe6d135cf18be8d15d6567f3923b7086687e66a0c b102915b345f3f6335e299b53b705c12b9b013510d73d7cfd6cac71665a99e6c
state/report/txt_hash 195b4a0faeeb96ffabdb2bdbf638488381b17056c7d0a8bb509d4ac38470426c 7de8d8dcc3c5809458ac67c74b71ab46b5083f3e72aba83d790af88398e8dcea
state/st/pdf_hash a7f827eb0060d7901827b9c87d9f7fb78512e4d5456ad30937682610b6268fa6 76005c486d3dc892386c5ed73b4d5bc806bcf0bbb502f306a6a2a0da67647f68
state/st/txt_hash 6d26e9c58e81d8f4c3935a1a3a017fbbb8a6990dce10784f2efbf19ba446a4ad b25dd8cf2f270cc0f47a28caffc1c573c1bc155cbd55e6954080b469c5c28e2c
heuristics/cert_id JISEC-CC-CRP-C0473 JISEC-CC-CRP-C0518
heuristics/extracted_versions 1.02 1.00
heuristics/scheme_data/cert_id C0473 C0518
heuristics/scheme_data/certification_date 2015-05 2016-08
heuristics/scheme_data/claim EAL2+ ALC_FLR.2 PP EAL2+ ALC_FLR.2 PP
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0473_eimg.pdf https://www.ipa.go.jp/en/security/c0518_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2015-05-19 2016-08-10
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
heuristics/scheme_data/enhanced/product MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) Pro 8100/8110/8120 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0473_erpt.pdf https://www.ipa.go.jp/en/security/c0518_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0473_est.pdf https://www.ipa.go.jp/en/security/c0518_est.pdf
heuristics/scheme_data/enhanced/toe_version E-1.02 E-1.00
heuristics/scheme_data/expiration_date 2020-06 2017-02
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0473_it4493.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0518_it6601.html
heuristics/scheme_data/toe_overseas_name MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec),SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.02 Pro 8100/8110/8120 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) E-1.00
pdf_data/report_filename c0473_erpt.pdf c0518_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0473-01: 1
  • Certification No. C0473: 1
  • CRP-C0518-01: 1
  • Certification No. C0518: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 3
  • TLS:
    • TLS: 2
pdf_data/report_metadata//CreationDate D:20150611112033+09'00' D:20161020145544+09'00'
pdf_data/report_metadata//ModDate D:20150611112355+09'00' D:20161020145618+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 349188 299602
pdf_data/report_metadata/pdf_number_of_pages 41 36
pdf_data/st_filename c0473_est.pdf c0518_est.pdf
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 10 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 31 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 39 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 7 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 11 10
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 21 17
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL3.0: 1
  • TLS:
    • TLS1.0: 2
    • TLS1.1: 1
    • TLS1.2: 1
  • TLS:
    • TLS1.0: 1
    • TLS1.1: 1
    • TLS1.2: 1
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS1.0 2 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 8
  • RC:
    • RC4: 2
  • AES:
    • AES: 6
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 8 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 5 4
pdf_data/st_metadata//Author hanedach RICOH
pdf_data/st_metadata//CreationDate D:20150421102939+09'00' D:20161018100544+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 Microsoft® Word 2013
pdf_data/st_metadata//ModDate D:20150421102939+09'00' D:20161018100544+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 9.5.5 (Windows) Microsoft® Word 2013
pdf_data/st_metadata//Title Microsoft Word - MP_401_ST_EXP_jp_1.00_ENG.doc Pro 8100/8110/8120 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) Security Target
pdf_data/st_metadata/pdf_file_size_bytes 572968 1110395
pdf_data/st_metadata/pdf_number_of_pages 96 85
dgst c28c3697357e7c18 e7e524443737e5cd