Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

MP C2004SP/C2504SP/C3004SP/C3504SP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2004ASP/C2504ASP/C3004ASP/C3504ASP (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2094SPJ/C2594SPJ (Ricoh) E-2.03
JISEC-CC-CRP-C0571
Japan: Ricoh imagio MP 4000/5000 series, Overseas: Ricoh Aficio MP 4000/5000 series, Savin 9040/9050 series, Lanier MP 4000/5000 series, Gestetner MP 4000/5000 series, Nashuatec MP 4000/5000 series, Rex-Rotary MP 4000/5000 series, Infotec MP 4000/5000 series Version: System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01
JISEC-CC-CRP-C0239
name MP C2004SP/C2504SP/C3004SP/C3504SP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2004ASP/C2504ASP/C3004ASP/C3504ASP (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2094SPJ/C2594SPJ (Ricoh) E-2.03 Japan: Ricoh imagio MP 4000/5000 series, Overseas: Ricoh Aficio MP 4000/5000 series, Savin 9040/9050 series, Lanier MP 4000/5000 series, Gestetner MP 4000/5000 series, Nashuatec MP 4000/5000 series, Rex-Rotary MP 4000/5000 series, Infotec MP 4000/5000 series Version: System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01
not_valid_before 2017-08-23 2009-11-13
not_valid_after 2022-08-23 2014-11-14
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0571_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0239_est.pdf
security_level ALC_FLR.2, EAL2+ EAL3
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0571_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0239_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0571kz_eimg.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2017, 11, 29), 'maintenance_title': 'MP C2004exSP/C2504exSP/C3004exSP/C3504exSP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2004exASP/C2504exASP/C3004exASP/C3504exASP (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2094exSPJ/C2594exSPJ (Ricoh) E-2.03', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0571kz_eacr.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0571kz_est.pdf'})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash 90092a05e055a5a70759cccd5c289cc879fe779da816c26f5aeaf1d523882187 None
state/cert/txt_hash 223c5e6a3c802262932d5c39fc439e477e71ec426d843f82827874acbf40bb4c None
state/report/pdf_hash 6126f192b27c7eebf794ab54b9e466ccb7816250c4db497c4c905a85f9c8ca79 7f2e5573ec37e5276c5e63d3242e9424c67a3f78fe6b2bdd2e9f218478d74e1a
state/report/txt_hash 5ad7b073e00c631d51c551c961b1ae9529aae7b20161e79976c1af306eefebeb 8aa0c26e8eba84da96a673e01c1ba3b7b0b87682a5c0f2e8250fc80c722eb076
state/st/pdf_hash 344049a7303c4d4756b665f6d51308f30d223734bbd2dbf2f6f496ad164be2be 910da3f406e6c5a37a66aae707a1cb9f4fd9b268c9405165d487b2ee08d28ed6
state/st/txt_hash 7777e2e5699bf9ea84ba7606818f50b8e444b73e2707bc14357bb220c01a7de4 9eb18d0b7bea25d461a6295e9caef9be5110ddb5ada33057eff416697bb774a0
heuristics/cert_id JISEC-CC-CRP-C0571 JISEC-CC-CRP-C0239
heuristics/cpe_matches cpe:2.3:h:ricoh:mp_c2004:-:*:*:*:*:*:*:* None
heuristics/extracted_versions 2.03 1.57, 1.09.3, 7.23, 1.09, 1.13.1, 03.00.00, 01.23
heuristics/scheme_data
  • cert_id: C0571
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: MP C2004exSP/C2504exSP/C3004exSP/ C3504exSP(Ricoh/Savin/Lanier/nashuatec/ Rex-Rotary/Gestetner/infotec), MP C2004exASP/C2504exASP/C3004exASP/ C3504exASP(Ricoh/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2094exSPJ/C2594exSPJ (Ricoh) E-2.03
  • expiration_date: 2022-09
  • claim: EAL2+ALC_FLR.2 PP
  • revalidations: frozendict({'date': '2017-11', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0571_it5580_01.html'})
  • certification_date: 2017-09
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0571_it5580.html
  • toe_japan_name: -----
  • enhanced:
    • product: MP C2004SP/C2504SP/C3004SP/C3504SP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2004ASP/C2504ASP/C3004ASP/ C3504ASP (Ricoh/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2094SPJ/C2594SPJ (Ricoh)
    • toe_version: E-2.03
    • product_type: Multi Function Product
    • certification_date: 2017-08-23
    • cc_version: 3.1 Release4
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0571_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0571_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0571_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • cert_id: C0239
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01
  • expiration_date: 2014-11
  • claim: EAL3
  • certification_date: 2009-11
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0239_it8206.html
  • toe_japan_name: Ricoh imagio MP 4000/5000 series System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01
  • enhanced:
    • product: Japan: Ricoh imagio MP 4000/5000 series Overseas: Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series
    • toe_version: System/Copy: 1.09 Network Support: 7.23 Scanner: 01.23 Printer: 1.09 Fax: 03.00.00 Web Support: 1.57 Web Uapl: 1.13.1 Network Doc Box: 1.09.3C Ic Key: 1100 Ic Hdd: 01
    • product_type: IT Product (Multi Function Product)
    • certification_date: 2009-11-13
    • cc_version: 2.3
    • assurance_level: EAL3
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • report_link: https://www.ipa.go.jp/en/security/c0239_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0239_img.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0239_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP, made by RICOH COMPANY, LTD., that provides the functions of copier, scanner, printer and fax (optional). Those are for digitizing the paper document files, managing the document files and printing the document files. The TOE is an image I/O device that incorporates the functionality of copier, scanner, fax and printer. In general, the TOE is connected to an office LAN and is used to input, store and output the document data. TOE security functions The major security functions of the TOE are as follows: - Identification and Authentication Function and Document Data Access Control Function to protect the stored document data from the unauthorized access - Encryption Function to protect the stored document data from the leakage - Network Communication Data Protection Function to protect the communication data from the leakage or tampering - Telephone Line Intrusion Protection Function to prevent the unauthorized intrusion from a telephone line - MFP Control Software Verification Function to check the integrity of the control software
heuristics/scheme_data/cert_id C0571 C0239
heuristics/scheme_data/certification_date 2017-09 2009-11
heuristics/scheme_data/claim EAL2+ALC_FLR.2 PP EAL3
heuristics/scheme_data/enhanced
  • product: MP C2004SP/C2504SP/C3004SP/C3504SP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2004ASP/C2504ASP/C3004ASP/ C3504ASP (Ricoh/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2094SPJ/C2594SPJ (Ricoh)
  • toe_version: E-2.03
  • product_type: Multi Function Product
  • certification_date: 2017-08-23
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented with ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0571_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0571_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0571_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: Japan: Ricoh imagio MP 4000/5000 series Overseas: Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series
  • toe_version: System/Copy: 1.09 Network Support: 7.23 Scanner: 01.23 Printer: 1.09 Fax: 03.00.00 Web Support: 1.57 Web Uapl: 1.13.1 Network Doc Box: 1.09.3C Ic Key: 1100 Ic Hdd: 01
  • product_type: IT Product (Multi Function Product)
  • certification_date: 2009-11-13
  • cc_version: 2.3
  • assurance_level: EAL3
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: Information Technology Security Center Evaluation Department
  • report_link: https://www.ipa.go.jp/en/security/c0239_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0239_img.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0239_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP, made by RICOH COMPANY, LTD., that provides the functions of copier, scanner, printer and fax (optional). Those are for digitizing the paper document files, managing the document files and printing the document files. The TOE is an image I/O device that incorporates the functionality of copier, scanner, fax and printer. In general, the TOE is connected to an office LAN and is used to input, store and output the document data. TOE security functions The major security functions of the TOE are as follows: - Identification and Authentication Function and Document Data Access Control Function to protect the stored document data from the unauthorized access - Encryption Function to protect the stored document data from the leakage - Network Communication Data Protection Function to protect the communication data from the leakage or tampering - Telephone Line Intrusion Protection Function to prevent the unauthorized intrusion from a telephone line - MFP Control Software Verification Function to check the integrity of the control software
heuristics/scheme_data/enhanced/assurance_level EAL2 Augmented with ALC_FLR.2 EAL3
heuristics/scheme_data/enhanced/cc_version 3.1 Release4 2.3
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0571_eimg.pdf https://www.ipa.go.jp/en/security/c0239_img.pdf
heuristics/scheme_data/enhanced/certification_date 2017-08-23 2009-11-13
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP, made by RICOH COMPANY, LTD., that provides the functions of copier, scanner, printer and fax (optional). Those are for digitizing the paper document files, managing the document files and printing the document files. The TOE is an image I/O device that incorporates the functionality of copier, scanner, fax and printer. In general, the TOE is connected to an office LAN and is used to input, store and output the document data. TOE security functions The major security functions of the TOE are as follows: - Identification and Authentication Function and Document Data Access Control Function to protect the stored document data from the unauthorized access - Encryption Function to protect the stored document data from the leakage - Network Communication Data Protection Function to protect the communication data from the leakage or tampering - Telephone Line Intrusion Protection Function to prevent the unauthorized intrusion from a telephone line - MFP Control Software Verification Function to check the integrity of the control software
heuristics/scheme_data/enhanced/evaluation_facility ECSEC Laboratory Inc. Evaluation Center Information Technology Security Center Evaluation Department
heuristics/scheme_data/enhanced/product MP C2004SP/C2504SP/C3004SP/C3504SP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2004ASP/C2504ASP/C3004ASP/ C3504ASP (Ricoh/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2094SPJ/C2594SPJ (Ricoh) Japan: Ricoh imagio MP 4000/5000 series Overseas: Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series
heuristics/scheme_data/enhanced/product_type Multi Function Product IT Product (Multi Function Product)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0571_erpt.pdf https://www.ipa.go.jp/en/security/c0239_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0571_est.pdf https://www.ipa.go.jp/en/security/c0239_est.pdf
heuristics/scheme_data/enhanced/toe_version E-2.03 System/Copy: 1.09 Network Support: 7.23 Scanner: 01.23 Printer: 1.09 Fax: 03.00.00 Web Support: 1.57 Web Uapl: 1.13.1 Network Doc Box: 1.09.3C Ic Key: 1100 Ic Hdd: 01
heuristics/scheme_data/expiration_date 2022-09 2014-11
heuristics/scheme_data/supplier RICOH COMPANY, LTD. RICOH COMPANY, LTD.
heuristics/scheme_data/toe_japan_name ----- Ricoh imagio MP 4000/5000 series System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0571_it5580.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0239_it8206.html
heuristics/scheme_data/toe_overseas_name MP C2004exSP/C2504exSP/C3004exSP/ C3504exSP(Ricoh/Savin/Lanier/nashuatec/ Rex-Rotary/Gestetner/infotec), MP C2004exASP/C2504exASP/C3004exASP/ C3504exASP(Ricoh/nashuatec/Rex-Rotary/ Gestetner/infotec), MP C2094exSPJ/C2594exSPJ (Ricoh) E-2.03 Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01
pdf_data/cert_filename c0571kz_eimg.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ECSEC:
      • ECSEC Laboratory: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 477138
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
  • /CreationDate: D:20171211090545+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20171211093007+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
None
pdf_data/report_filename c0571_erpt.pdf c0239_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0571-01: 1
  • Certification No. C0571: 1
  • CRP-C0239-01: 1
  • Certification No. C0239: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.ADMIN: 2
  • A.SUPERVISOR: 1
  • A.NETWORK: 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 2
  • T.FUNC: 1
  • T.PROT: 1
  • T.CONF: 2
  • T.ILLEGAL_USE: 3
  • T.UNAUTH_ACCESS: 3
  • T.ABUSE_SEC_MNG: 3
  • T.SALVAGE: 3
  • T.TRANSIT: 3
  • T.FAX_LINE: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2 augmented: 2
  • EAL3: 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/report_keywords/crypto_protocol/TLS
  • TLS:
    • TLS: 2
  • SSL:
    • SSL: 7
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2005-08-001: 2
  • CCMB-2005-08-002: 2
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-004: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 303318
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
  • /CreationDate: D:20171018114755+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20171018114819+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 282719
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /ModDate: D:20100112162204+09'00'
  • /CreationDate: D:20100112162204+09'00'
  • /Title: Microsoft Word - C0239_Certification Report.doc
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Author: s-hara
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20171018114755+09'00' D:20100112162204+09'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 PScript5.dll Version 5.2
pdf_data/report_metadata//ModDate D:20171018114819+09'00' D:20100112162204+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 6.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 303318 282719
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 41 33
pdf_data/st_filename c0571_est.pdf c0239_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.STORAGE: 14
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • O:
    • O.AUDIT: 15
    • O.DOC_ACC: 8
    • O.MANAGE: 12
    • O.MEM: 11
    • O.NET: 10
    • O.GENUINE: 9
    • O.LINE_PROTECT: 10
  • T:
    • T.ILLEGAL_USE: 4
    • T.UNAUTH_ACCESS: 3
    • T.ABUSE_SEC_MNG: 4
    • T.SALVAGE: 3
    • T.TRANSIT: 4
    • T.FAX_LINE: 3
  • A:
    • A.ADMIN: 5
    • A.SUPERVISOR: 4
    • A.NETWORK: 5
  • OE:
    • OE.ADMIN: 3
    • OE.SUPERVISOR: 3
    • OE.NETWORK: 3
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 5
  • A.USER: 4
  • A.ADMIN: 10
  • A.ADMIN: 5
  • A.SUPERVISOR: 4
  • A.NETWORK: 5
pdf_data/st_keywords/cc_claims/A/A.ADMIN 10 5
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.AUDIT: 15
  • O.DOC_ACC: 8
  • O.MANAGE: 12
  • O.MEM: 11
  • O.NET: 10
  • O.GENUINE: 9
  • O.LINE_PROTECT: 10
pdf_data/st_keywords/cc_claims/O/O.AUDIT 9 15
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 3
  • OE.AUDIT_ACCESS: 2
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 4
  • OE.USER: 21
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • OE.ADMIN: 3
  • OE.SUPERVISOR: 3
  • OE.NETWORK: 3
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 8 3
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 14
  • T.FUNC: 7
  • T.PROT: 5
  • T.CONF: 10
  • T.ILLEGAL_USE: 4
  • T.UNAUTH_ACCESS: 3
  • T.ABUSE_SEC_MNG: 4
  • T.SALVAGE: 3
  • T.TRANSIT: 4
  • T.FAX_LINE: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.2: 3
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 3
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 1
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 2
  • ADV_FSP.1: 2
  • ADV_HLD.2: 3
  • ADV_RCR.1: 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_ADM.1: 2
  • AGD_USR.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 3
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 2
  • ATE_DPT.1: 1
  • ATE_FUN.1: 2
  • ATE_IND.2: 2
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 2
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 2
  • AVA_MSU.1: 2
  • AVA_SOF.1: 1
  • AVA_VLA.1: 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 1
  • EAL3: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_STG.1: 9
    • FAU_STG.4: 8
    • FAU_SAR.1: 10
    • FAU_SAR.2: 8
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_ACC.1: 31
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 9
    • FIA_UAU.7: 8
    • FIA_SOS.1: 8
    • FIA_UID.1: 18
    • FIA_UAU.1: 14
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMF.1: 23
    • FMT_SMR.1: 29
    • FMT_MSA.3: 22
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1.3: 4
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
  • FAU:
    • FAU_GEN.1: 36
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 15
    • FAU_SAR.2: 12
    • FAU_STG.1: 14
    • FAU_STG.4: 14
    • FAU_GEN.1.2: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_COP.1: 18
    • FCS_CKM.2: 2
    • FCS_CKM.4: 5
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 20
    • FDP_ACF.1: 17
    • FDP_IFC.1: 18
    • FDP_IFF.1: 14
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_AFL.1: 16
    • FIA_ATD.1: 15
    • FIA_SOS.1: 16
    • FIA_UAU.2: 18
    • FIA_UAU.7: 14
    • FIA_UID.2: 16
    • FIA_USB.1: 12
    • FIA_UAU.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UID.1: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 2
  • FMT:
    • FMT_MSA.1: 14
    • FMT_MSA.3: 19
    • FMT_MTD.1: 14
    • FMT_SMF.1: 17
    • FMT_SMR.1: 20
    • FMT_MSA.2: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 15
    • FPT_RVM.1: 43
    • FPT_SEP.1: 48
    • FPT_TST.1: 13
    • FPT_RVM.1.1: 1
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1.1: 1
    • FPT_AMT.1: 4
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_TRP.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
    • FTP_TST.1: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.1: 9
  • FAU_STG.4: 8
  • FAU_SAR.1: 10
  • FAU_SAR.2: 8
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_GEN.1: 36
  • FAU_GEN.1.1: 1
  • FAU_SAR.1: 15
  • FAU_SAR.2: 12
  • FAU_STG.1: 14
  • FAU_STG.4: 14
  • FAU_GEN.1.2: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 12 36
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 15
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 8 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 9 14
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 14
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 11 18
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 7 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 10 18
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF.1: 31
  • FDP_ACF.1.1: 3
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 3
  • FDP_ACC.1: 31
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 2
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
  • FDP_ACC.1: 20
  • FDP_ACF.1: 17
  • FDP_IFC.1: 18
  • FDP_IFF.1: 14
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF.1.6: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 31 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 31 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 4 18
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 16
  • FIA_ATD.1: 15
  • FIA_SOS.1: 16
  • FIA_UAU.2: 18
  • FIA_UAU.7: 14
  • FIA_UID.2: 16
  • FIA_USB.1: 12
  • FIA_UAU.1: 5
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UID.1: 9
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 9 16
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 8 15
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 16
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 14 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 8 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 18 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 6 12
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.3 1 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMF.1: 23
  • FMT_SMR.1: 29
  • FMT_MSA.3: 22
  • FMT_MSA.1: 20
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1: 14
  • FMT_MSA.3: 19
  • FMT_MTD.1: 14
  • FMT_SMF.1: 17
  • FMT_SMR.1: 20
  • FMT_MSA.2: 7
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 12 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 23 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 29 20
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 5
  • FPT_FDI_EXP.1: 11
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1: 6
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1: 15
  • FPT_RVM.1: 43
  • FPT_SEP.1: 48
  • FPT_TST.1: 13
  • FPT_RVM.1.1: 1
  • FPT_SEP.1.1: 1
  • FPT_SEP.1.2: 1
  • FPT_STM.1.1: 1
  • FPT_AMT.1: 4
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 9 15
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 6 13
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1.3: 4
  • FTP_ITC.1: 17
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1: 13
  • FTP_TRP.1: 13
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 2
  • FTP_TRP.1.3: 2
  • FTP_TST.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 17 13
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 4 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS1.0: 1
      • TLS1.1: 1
      • TLS1.2: 1
  • IPsec:
    • IPsec: 10
  • TLS:
    • SSL:
      • SSL: 10
pdf_data/st_keywords/crypto_protocol/TLS
  • TLS:
    • TLS1.0: 1
    • TLS1.1: 1
    • TLS1.2: 1
  • SSL:
    • SSL: 10
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS197: 3
    • FIPS 197: 1
  • BSI:
    • BSI-AIS31: 3
pdf_data/st_keywords/standard_id/FIPS
  • FIPS197: 2
  • FIPS197: 3
  • FIPS 197: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS197 2 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 4
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 6 4
pdf_data/st_metadata//Author RICOH itoh masahiro
pdf_data/st_metadata//CreationDate D:20171002164840+09'00' D:20100112151008+09'00'
pdf_data/st_metadata//Creator Microsoft® Word 2016 PScript5.dll Version 5.2
pdf_data/st_metadata//ModDate D:20171002164840+09'00' D:20100112151008+09'00'
pdf_data/st_metadata//Producer Microsoft® Word 2016 Acrobat Distiller 7.0.5 (Windows)
pdf_data/st_metadata//Title MP C2004SP/C2504SP/C3004SP/C3504SP (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2004ASP/C2504ASP/C3004ASP/C3504ASP (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec), MP C2094SPJ/C2594SPJ (Ricoh) Security Target Microsoft Word - 100111_MP_4000_ST_1.13_eng.doc
pdf_data/st_metadata/pdf_file_size_bytes 1336110 641281
pdf_data/st_metadata/pdf_number_of_pages 89 100
dgst e808477a81ddb0fc 011a212ee8367e21