Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec),SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.02
JISEC-CC-CRP-C0473
MP C2004SP/C2504SP/C3004SP/C3504SP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2004ASP/C2504ASP/C3004ASP/C3504ASP (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2094SPJ/C2594SPJ (Ricoh) E-2.03
JISEC-CC-CRP-C0571
name MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec),SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.02 MP C2004SP/C2504SP/C3004SP/C3504SP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2004ASP/C2504ASP/C3004ASP/C3504ASP (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2094SPJ/C2594SPJ (Ricoh) E-2.03
not_valid_before 2015-05-19 2017-08-23
not_valid_after 2020-06-01 2022-08-23
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0473_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0571_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0473_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0571_erpt.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0571kz_eimg.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2017, 11, 29), 'maintenance_title': 'MP C2004exSP/C2504exSP/C3004exSP/C3504exSP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2004exASP/C2504exASP/C3004exASP/C3504exASP (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2094exSPJ/C2594exSPJ (Ricoh) E-2.03', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0571kz_eacr.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0571kz_est.pdf'})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None 90092a05e055a5a70759cccd5c289cc879fe779da816c26f5aeaf1d523882187
state/cert/txt_hash None 223c5e6a3c802262932d5c39fc439e477e71ec426d843f82827874acbf40bb4c
state/report/pdf_hash c77b4ae33e08a6e03a984aefe6d135cf18be8d15d6567f3923b7086687e66a0c 6126f192b27c7eebf794ab54b9e466ccb7816250c4db497c4c905a85f9c8ca79
state/report/txt_hash 195b4a0faeeb96ffabdb2bdbf638488381b17056c7d0a8bb509d4ac38470426c 5ad7b073e00c631d51c551c961b1ae9529aae7b20161e79976c1af306eefebeb
state/st/pdf_hash a7f827eb0060d7901827b9c87d9f7fb78512e4d5456ad30937682610b6268fa6 344049a7303c4d4756b665f6d51308f30d223734bbd2dbf2f6f496ad164be2be
state/st/txt_hash 6d26e9c58e81d8f4c3935a1a3a017fbbb8a6990dce10784f2efbf19ba446a4ad 7777e2e5699bf9ea84ba7606818f50b8e444b73e2707bc14357bb220c01a7de4
heuristics/cert_id JISEC-CC-CRP-C0473 JISEC-CC-CRP-C0571
heuristics/cpe_matches None cpe:2.3:h:ricoh:mp_c2004:-:*:*:*:*:*:*:*
heuristics/extracted_versions 1.02 2.03
heuristics/scheme_data
  • cert_id: C0473
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec),SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.02
  • expiration_date: 2020-06
  • claim: EAL2+ ALC_FLR.2 PP
  • certification_date: 2015-05
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0473_it4493.html
  • toe_japan_name: -----
  • enhanced:
    • product: MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner)
    • toe_version: E-1.02
    • product_type: Multi Function Product
    • certification_date: 2015-05-19
    • cc_version: 3.1 Release4
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0473_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0473_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0473_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • cert_id: C0571
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: MP C2004exSP/C2504exSP/C3004exSP/ C3504exSP(Ricoh/Savin/Lanier/nashuatec/ Rex-Rotary/Gestetner/infotec), MP C2004exASP/C2504exASP/C3004exASP/ C3504exASP(Ricoh/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2094exSPJ/C2594exSPJ (Ricoh) E-2.03
  • expiration_date: 2022-09
  • claim: EAL2+ALC_FLR.2 PP
  • revalidations: frozendict({'date': '2017-11', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0571_it5580_01.html'})
  • certification_date: 2017-09
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0571_it5580.html
  • toe_japan_name: -----
  • enhanced:
    • product: MP C2004SP/C2504SP/C3004SP/C3504SP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2004ASP/C2504ASP/C3004ASP/ C3504ASP (Ricoh/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2094SPJ/C2594SPJ (Ricoh)
    • toe_version: E-2.03
    • product_type: Multi Function Product
    • certification_date: 2017-08-23
    • cc_version: 3.1 Release4
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0571_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0571_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0571_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/cert_id C0473 C0571
heuristics/scheme_data/certification_date 2015-05 2017-09
heuristics/scheme_data/claim EAL2+ ALC_FLR.2 PP EAL2+ALC_FLR.2 PP
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0473_eimg.pdf https://www.ipa.go.jp/en/security/c0571_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2015-05-19 2017-08-23
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/product MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) MP C2004SP/C2504SP/C3004SP/C3504SP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2004ASP/C2504ASP/C3004ASP/ C3504ASP (Ricoh/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2094SPJ/C2594SPJ (Ricoh)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0473_erpt.pdf https://www.ipa.go.jp/en/security/c0571_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0473_est.pdf https://www.ipa.go.jp/en/security/c0571_est.pdf
heuristics/scheme_data/enhanced/toe_version E-1.02 E-2.03
heuristics/scheme_data/expiration_date 2020-06 2022-09
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0473_it4493.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0571_it5580.html
heuristics/scheme_data/toe_overseas_name MP 401 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec),SP 4510 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner) E-1.02 MP C2004exSP/C2504exSP/C3004exSP/ C3504exSP(Ricoh/Savin/Lanier/nashuatec/ Rex-Rotary/Gestetner/infotec), MP C2004exASP/C2504exASP/C3004exASP/ C3504exASP(Ricoh/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2094exSPJ/C2594exSPJ (Ricoh) E-2.03
pdf_data/cert_filename None c0571kz_eimg.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ECSEC:
      • ECSEC Laboratory: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 477138
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
  • /CreationDate: D:20171211090545+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20171211093007+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/report_filename c0473_erpt.pdf c0571_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0473-01: 1
  • Certification No. C0473: 1
  • CRP-C0571-01: 1
  • Certification No. C0571: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 3
  • TLS:
    • TLS: 2
pdf_data/report_metadata//CreationDate D:20150611112033+09'00' D:20171018114755+09'00'
pdf_data/report_metadata//ModDate D:20150611112355+09'00' D:20171018114819+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 349188 303318
pdf_data/st_filename c0473_est.pdf c0571_est.pdf
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 10 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 31 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 39 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 7 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 23 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 23
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 21 17
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL3.0: 1
  • TLS:
    • TLS1.0: 2
    • TLS1.1: 1
    • TLS1.2: 1
  • TLS:
    • TLS1.0: 1
    • TLS1.1: 1
    • TLS1.2: 1
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS1.0 2 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 8
  • RC:
    • RC4: 2
  • AES:
    • AES: 6
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 8 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 5 2
pdf_data/st_metadata//Author hanedach RICOH
pdf_data/st_metadata//CreationDate D:20150421102939+09'00' D:20171002164840+09'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 Microsoft® Word 2016
pdf_data/st_metadata//ModDate D:20150421102939+09'00' D:20171002164840+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 9.5.5 (Windows) Microsoft® Word 2016
pdf_data/st_metadata//Title Microsoft Word - MP_401_ST_EXP_jp_1.00_ENG.doc MP C2004SP/C2504SP/C3004SP/C3504SP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2004ASP/C2504ASP/C3004ASP/C3504ASP (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2094SPJ/C2594SPJ (Ricoh) Security Target
pdf_data/st_metadata/pdf_file_size_bytes 572968 1336110
pdf_data/st_metadata/pdf_number_of_pages 96 89
dgst c28c3697357e7c18 e808477a81ddb0fc