Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

RICOH IM 7000/8000/9000,SAVIN IM 7000/8000/9000,LANIER IM 7000/8000/9000,nashuatec IM 7000/8000/9000,Rex Rotary IM 7000/8000/9000,Gestetner IM 7000/8000/9000E-2.00
JISEC-CC-CRP-C0805-01-2024
Ricoh Aficio MP 4002/4002G/5002/5002G, Savin MP 4002/4002G/5002/5002G, Lanier MP 4002/4002G/5002/5002G, nashuatec MP 4002/5002, Rex-Rotary MP 4002/5002, Gestetner MP 4002/5002, infotec MP 4002/5002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, PCL 1.04, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01
JISEC-CC-CRP-C0347
name RICOH IM 7000/8000/9000,SAVIN IM 7000/8000/9000,LANIER IM 7000/8000/9000,nashuatec IM 7000/8000/9000,Rex Rotary IM 7000/8000/9000,Gestetner IM 7000/8000/9000E-2.00 Ricoh Aficio MP 4002/4002G/5002/5002G, Savin MP 4002/4002G/5002/5002G, Lanier MP 4002/4002G/5002/5002G, nashuatec MP 4002/5002, Rex-Rotary MP 4002/5002, Gestetner MP 4002/5002, infotec MP 4002/5002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, PCL 1.04, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01
not_valid_before 2024-01-31 2012-04-26
not_valid_after 2029-01-31 2017-02-07
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0805_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0347_est.pdf
status active archived
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0805_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0347_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0805_eimg.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash 2f559f0bac63e6c17f6d0ae4ac986b954868629198cc30955d7c036bd19721c5 None
state/cert/txt_hash 99262f650349c34f0279418cf40d18118b917684b7c8ce94fee68a4fc96236ad None
state/report/pdf_hash e207343958a59d284b3f0d9c6e790f86584b6118b98e288315ee15a9a368224e 285c6daf63e849c1327c7699c99d5daca619cdfa12652604ffdd397fd3a2e426
state/report/txt_hash d0db7d0da0a6686475cb8945e6fd28b79e88d9f13e3f481b077181ef7d2f5365 3ead99076b94ebec0f26855f79a32ce450ce9b0645e06f50422d0eddac132a12
state/st/pdf_hash fd4ab2023a641da46e05ad38b6b5875290c7631c7d8cd98b6a00c4ac375a9ef9 2cd974b2770921021dff6943997f8a8749ceee94e802bf2f4693cc010d6cd82b
state/st/txt_hash 16723958b986771607b763b69ba149e9fc4e7eddbe725a99e61ced92bfc951f4 55bb22f5c28f2e7cf0f5ea08aa1384aeac51667ddb2521339de7ff7fc751ae4e
heuristics/cert_id JISEC-CC-CRP-C0805-01-2024 JISEC-CC-CRP-C0347
heuristics/extracted_versions 2.00 1.00.2, 1.02, 11.75, 1.03, 3.5, 1.04, 01.00.01, 1.00.1, 01.04, 01.01.00, 1.13, 1.00
heuristics/scheme_data/cert_id C0805 C0347
heuristics/scheme_data/certification_date 2024-01 2012-04
heuristics/scheme_data/claim PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) EAL3+ ALC_FLR.2 PP
heuristics/scheme_data/enhanced
  • product: RICOH IM 7000/8000/9000, SAVIN IM 7000/8000/9000, LANIER IM 7000/8000/9000, nashuatec IM 7000/8000/9000, Rex Rotary IM 7000/8000/9000, Gestetner IM 7000/8000/9000
  • toe_version: E-2.00
  • product_type: Multifunction Product
  • cert_id: JISEC-C0805
  • certification_date: 2029-01-31
  • cc_version: 3.1 Release5
  • assurance_level: EAL2 Augmented by ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc., Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pyo-att/c0805_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pyo-att/c0805_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pyo-att/c0805_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
  • product: Ricoh Aficio MP 4002/4002G/5002/5002G, Savin MP 4002/4002G/5002/5002G, Lanier MP 4002/4002G/5002/5002G, nashuatec MP 4002/5002, Rex-Rotary MP 4002/5002, Gestetner MP 4002/5002, infotec MP 4002/5002 all of above with Printer/Scanner/Facsimile Functions
  • toe_version: -Software: System/Copy 1.00.2 Network Support 11.75 Fax 01.01.00 RemoteFax 01.01.00 NetworkDocBox 1.00.1 Web Support 1.03 Web Uapl 1.02 animation 1.00 Scanner 01.04 Printer 1.00.1 PCL 1.04 PCL Font 1.13 Data Erase Onb 1.03m GWFCU3.5-2(WW) 01.00.01 Engine 1.00:03 OpePanel 1.02 LANG0 1.02 LANG1 1.02 -Hardware: Ic Key 01020714 Ic Hdd 01
  • product_type: Multi Function Product
  • certification_date: 2012-04-26
  • cc_version: 3.1
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1-2009
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0347_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0347_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0347_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/assurance_level EAL2 Augmented by ALC_FLR.2 EAL3 Augmented with ALC_FLR.2
heuristics/scheme_data/enhanced/cc_version 3.1 Release5 3.1
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pyo-att/c0805_eimg.pdf https://www.ipa.go.jp/en/security/c0347_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2029-01-31 2012-04-26
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines. PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/evaluation_facility ECSEC Laboratory Inc., Evaluation Center Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
heuristics/scheme_data/enhanced/product RICOH IM 7000/8000/9000, SAVIN IM 7000/8000/9000, LANIER IM 7000/8000/9000, nashuatec IM 7000/8000/9000, Rex Rotary IM 7000/8000/9000, Gestetner IM 7000/8000/9000 Ricoh Aficio MP 4002/4002G/5002/5002G, Savin MP 4002/4002G/5002/5002G, Lanier MP 4002/4002G/5002/5002G, nashuatec MP 4002/5002, Rex-Rotary MP 4002/5002, Gestetner MP 4002/5002, infotec MP 4002/5002 all of above with Printer/Scanner/Facsimile Functions
heuristics/scheme_data/enhanced/product_type Multifunction Product Multi Function Product
heuristics/scheme_data/enhanced/protection_profile U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) IEEE Std 2600.1-2009
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pyo-att/c0805_erpt.pdf https://www.ipa.go.jp/en/security/c0347_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pyo-att/c0805_est.pdf https://www.ipa.go.jp/en/security/c0347_est.pdf
heuristics/scheme_data/enhanced/toe_version E-2.00 -Software: System/Copy 1.00.2 Network Support 11.75 Fax 01.01.00 RemoteFax 01.01.00 NetworkDocBox 1.00.1 Web Support 1.03 Web Uapl 1.02 animation 1.00 Scanner 01.04 Printer 1.00.1 PCL 1.04 PCL Font 1.13 Data Erase Onb 1.03m GWFCU3.5-2(WW) 01.00.01 Engine 1.00:03 OpePanel 1.02 LANG0 1.02 LANG1 1.02 -Hardware: Ic Key 01020714 Ic Hdd 01
heuristics/scheme_data/expiration_date None 2017-02
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0805_it3852.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0347_it1364.html
heuristics/scheme_data/toe_overseas_name RICOH IM 7000/8000/9000, SAVIN IM 7000/8000/9000, LANIER IM 7000/8000/9000, nashuatec IM 7000/8000/9000, Rex Rotary IM 7000/8000/9000, Gestetner IM 7000/8000/9000 E-2.00 Ricoh Aficio MP 4002/4002G/5002/5002G, Savin MP 4002/4002G/5002/5002G, Lanier MP 4002/4002G/5002/5002G, nashuatec MP 4002/5002, Rex-Rotary MP 4002/5002, Gestetner MP 4002/5002, infotec MP 4002/5002 all of above with Printer/Scanner/Facsimile Functions - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, PCL, 1.04, PCL Font 1.13, Data Erase Onb 1.03m, < Cont. >
pdf_data/cert_filename c0805_eimg.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0805-01-2024: 1
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ECSEC:
      • ECSEC Laboratory: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 236653
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20240328140816+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20240328140912+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240328050752
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
None
pdf_data/report_filename c0805_erpt.pdf c0347_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • JISEC-CC-CRP-C0805-01-2024: 1
  • CRP-C0347-01: 1
  • Certification No. C0347: 1
pdf_data/report_keywords/cc_claims/T/T.CONF 4 2
pdf_data/report_keywords/cc_claims/T/T.DOC 3 2
pdf_data/report_keywords/cc_claims/T/T.FUNC 2 1
pdf_data/report_keywords/cc_claims/T/T.PROT 2 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2 augmented: 2
  • EAL3: 4
  • EAL3 augmented: 1
pdf_data/report_keywords/crypto_protocol/IPsec/IPsec 6 4
pdf_data/report_keywords/crypto_protocol/TLS
  • TLS:
    • TLS: 6
    • TLS 1.2: 3
    • TLS 1.3: 3
  • SSL:
    • SSL: 3
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/standard_id/CC
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 599759
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
  • /Author:
  • /Company:
  • /CreationDate: D:20240328145815+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /Manager:
  • /ModDate: D:20240328145904+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240327021932
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 318017
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 40
  • /Author:
  • /CreationDate: D:20120522165809+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20120522170841+09'00'
  • /Producer: Acrobat Distiller 9.5.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20240328145815+09'00' D:20120522165809+09'00'
pdf_data/report_metadata//Creator Word 用 Acrobat PDFMaker 17 PScript5.dll Version 5.2.2
pdf_data/report_metadata//ModDate D:20240328145904+09'00' D:20120522170841+09'00'
pdf_data/report_metadata//Producer Adobe PDF Library 17.11.238 Acrobat Distiller 9.5.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 599759 318017
pdf_data/report_metadata/pdf_number_of_pages 35 40
pdf_data/st_filename c0805_est.pdf c0347_est.pdf
pdf_data/st_keywords/cc_claims
  • D:
    • D.DOC: 19
    • D.FUNC: 13
    • D.PROT: 4
    • D.CONF: 4
  • O:
    • O.PROT: 10
    • O.DOC: 18
    • O.FUNC: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 5
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 4
    • OE.AUDIT_ACCESS: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 20
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • O:
    • O.STORAGE: 14
    • O.RCGATE: 13
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
pdf_data/st_keywords/cc_claims/A/A.USER 5 4
pdf_data/st_keywords/cc_claims/O
  • O.PROT: 10
  • O.DOC: 18
  • O.FUNC: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_claims/O/O.PROT 10 9
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_ACCESS 3 2
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_STORAGE 4 3
pdf_data/st_keywords/cc_claims/OE/OE.USER 20 21
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 4
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 4 3
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 2
  • EAL3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 13
    • FAU_GEN.2: 7
    • FAU_STG.1: 11
    • FAU_STG.4: 8
    • FAU_SAR.1: 12
    • FAU_SAR.2: 10
    • FAU_GEN: 1
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACF.1: 28
    • FDP_RIP.1: 5
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ACC.1.1: 2
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_RIP: 1
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 9
    • FIA_ATD.1: 7
    • FIA_SOS.1: 8
    • FIA_UAU.1: 15
    • FIA_UAU.7: 8
    • FIA_UID.1: 24
    • FIA_USB.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MSA.1: 28
    • FMT_MSA.3: 25
    • FMT_MTD.1: 18
    • FMT_SMF.1: 26
    • FMT_SMR.1: 32
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_STM.1: 9
    • FPT_TST.1: 6
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_STG.1: 9
    • FAU_STG.4: 8
    • FAU_SAR.1: 10
    • FAU_SAR.2: 8
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_ACC.1: 31
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 9
    • FIA_UAU.7: 8
    • FIA_SOS.1: 10
    • FIA_UAU.1: 31
    • FIA_UID.1: 39
    • FIA_UAU.2: 12
    • FIA_UID.2: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMF.1: 22
    • FMT_SMR.1: 29
    • FMT_MSA.3: 23
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TST.1: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 13
  • FAU_GEN.2: 7
  • FAU_STG.1: 11
  • FAU_STG.4: 8
  • FAU_SAR.1: 12
  • FAU_SAR.2: 10
  • FAU_GEN: 1
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1: 9
  • FAU_STG.4: 8
  • FAU_SAR.1: 10
  • FAU_SAR.2: 8
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 13 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 7 6
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 12 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 10 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 11 9
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 30
  • FDP_ACF.1: 28
  • FDP_RIP.1: 5
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ACC.1.1: 2
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 2
  • FDP_ACF.1.4: 2
  • FDP_RIP: 1
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
  • FDP_ACF.1: 31
  • FDP_ACF.1.1: 3
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 8
  • FDP_ACF.1.4: 3
  • FDP_ACC.1: 31
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 2
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 30 31
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 28 31
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 2 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 2 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 2 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 2 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 5 8
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_ATD.1: 7
  • FIA_SOS.1: 8
  • FIA_UAU.1: 15
  • FIA_UAU.7: 8
  • FIA_UID.1: 24
  • FIA_USB.1: 6
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD: 1
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 7 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 8 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 15 31
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 24 39
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 6 7
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MOF.1: 9
  • FMT_MSA.1: 28
  • FMT_MSA.3: 25
  • FMT_MTD.1: 18
  • FMT_SMF.1: 26
  • FMT_SMR.1: 32
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 22
  • FMT_SMR.1: 29
  • FMT_MSA.3: 23
  • FMT_MSA.1: 20
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 28 20
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 25 23
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 18 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 26 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 32 29
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP 3 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 6 5
pdf_data/st_keywords/cc_sfr/FTA/FTA_SSL.3 8 9
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 12
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_ITC.1: 21
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TST.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 12 21
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 4
    • TLS:
      • TLS: 9
      • TLS1.2: 2
      • TLS1.3: 2
  • IPsec:
    • IPsec: 9
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
pdf_data/st_keywords/crypto_protocol/TLS/SSL
  • SSL: 4
  • SSL3.0: 1
pdf_data/st_keywords/crypto_protocol/TLS/TLS
  • TLS: 9
  • TLS1.2: 2
  • TLS1.3: 2
  • TLS1.0: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 3
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • djb:
    • ChaCha:
      • ChaCha20: 2
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3DES: 6
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata//Author 株式会社リコー rskak1200296
pdf_data/st_metadata//CreationDate D:20240311165832+09'00' D:20120413143417+09'00'
pdf_data/st_metadata//Creator Microsoft® Word for Microsoft 365 PScript5.dll Version 5.2.2
pdf_data/st_metadata//ModDate D:20240311165832+09'00' D:20120413143417+09'00'
pdf_data/st_metadata//Producer Microsoft® Word for Microsoft 365 Acrobat Distiller 7.0.5 (Windows)
pdf_data/st_metadata//Title RICOH IM 7000/8000/9000,SAVIN IM 7000/8000/9000,LANIER IM 7000/8000/9000,nashuatec IM 7000/8000/9000,Rex Rotary IM 7000/8000/9000,Gestetner IM 7000/8000/9000 Security Target Microsoft Word - MP_5002_ST_EXP_1.00_jp_ENG_0.02.doc
pdf_data/st_metadata/pdf_file_size_bytes 1321388 569796
pdf_data/st_metadata/pdf_hyperlinks https://support.ricoh.com/services/device/ccmanual/IM_7000_8000_9000-re/en/Guidance_aa.zip
pdf_data/st_metadata/pdf_number_of_pages 97 94
dgst ee2b1332440ad337 ae59741b797577de