Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BooleBox On Premises V 4.2
OCSI/CERT/IMQ/06/2018/RC
imagio Security Card Type 7 Software 1.01x (Japanese name), DataOverwriteSecurity Unit Type H Software 1.01x (English name)
JISEC-CC-CRP-C0252
name BooleBox On Premises V 4.2 imagio Security Card Type 7 Software 1.01x (Japanese name), DataOverwriteSecurity Unit Type H Software 1.01x (English name)
category Data Protection Other Devices and Systems
scheme IT JP
status active archived
not_valid_after 23.04.2025 01.04.2015
not_valid_before 23.04.2020 29.03.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_boolebox_42_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0252_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_boolebox_42_v1.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0252_est.pdf
manufacturer Boole Server S.r.l. Ricoh Company, Ltd.
manufacturer_web https://www.booleserver.com/ https://www.ricoh.com/
security_level EAL2+, ALC_FLR.2 EAL3
dgst efccd1dfa8e8195d 9162dd112867a2b1
heuristics/cert_id OCSI/CERT/IMQ/06/2018/RC JISEC-CC-CRP-C0252
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 4.2 1.01
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0252
  • certification_date: 01.03.2010
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0252_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; - Ricoh imagio MP C6000/C7500 series - Ricoh Aficio MP C6000/C7500 series - Savin C6055/C7570 series - Lanier LD260c/275c series - Lanier MP C6000/C7500 series - Gestetner MP C6000/C7500 series - infotec MP C6000/C7500 series - nashuatec MP C6000/C7500 series - Rex-Rotary MP C6000/C7500 series TOE security functionality Same as above.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: imagio Security Card Type 7 Software (Japanese name) DataOverwriteSecurity Unit Type H Software (English name)
    • product_type: Software to overwrite data
    • report_link: https://www.ipa.go.jp/en/security/c0252_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0252_est.pdf
    • toe_version: 1.01x
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.04.2015
  • revalidations: [frozendict({'date': '2013-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0252_it9278_08.html'})]
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: imagio Security Card Type 7 Software 1.01x
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0252_it9278.html
  • toe_overseas_name: DataOverwriteSecurity Unit Type H Software 1.02x
pdf_data/report_filename rc_boolebox_42_v1.0.pdf c0252_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/IMQ/06/2018/RC: 27
  • JP:
    • CRP-C0252-01: 1
    • Certification No. C0252: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 7
    • EAL2+: 1
    • EAL4: 4
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ATE:
    • ATE_IND: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.MODE: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 7
pdf_data/report_keywords/eval_facility
  • IMQLPS:
    • IMQ/LPS: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-256: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 6
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20200422093535+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20200423165945+00'00'
  • /Producer: Modified using InfoCert Dike
  • /Subject: ---
  • /Title: Rapporto di Certificazione del prodotto “BooleBox On Premises V Ѐ⸂”
  • pdf_file_size_bytes: 623576
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
  • /CreationDate: D:20110202161806+09'00'
  • /ModDate: D:20110202161806+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 117111
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename st_boolebox_42_v1.5.pdf c0252_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2+: 3
  • EAL:
    • EAL3: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
  • FDP:
    • FDP_ACC.1: 26
    • FDP_ACC.1.1: 3
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 6
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 22
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 7
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_UCT.1: 7
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 9
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_XXX.1: 1
    • FIA_XXX.1.1: 2
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 15
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 18
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_PSE.1: 7
    • FPR_PSE.1.1: 1
    • FPR_PSE.1.2: 1
    • FPR_PSE.1.3: 1
    • FPR_UNO.1: 7
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_STM.1: 2
    • FPT_TDC: 1
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TEE: 2
    • FPT_TEE.1: 7
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FTP:
    • FTP_ITC.1: 3
    • FTP_TRP.1: 3
  • FDP:
    • FDP_RIP: 5
    • FDP_RIP.1.1: 1
    • FDP_SIP: 2
    • FDP_SIP.1: 13
    • FDP_SIP.1.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ALIGNEDBACKUPS: 2
    • A.ASSUMPTION: 1
    • A.CERTIFICATE: 3
    • A.DBMS_ACCESS: 3
    • A.DOC_ACCESS: 2
    • A.OS_ACCESS: 2
    • A.OS_RESTRICT: 3
    • A.SECCOMM: 3
    • A.STORAGE_ACCESS: 3
    • A.TIME: 3
    • A.TOE_EVALUATED: 2
    • A.TRAINING: 2
    • A.TRUST: 3
    • A.UPDATE: 2
  • O:
    • O.ACCESS: 13
    • O.ANTI_BRUTE: 9
    • O.AUDIT: 7
    • O.AUDIT_PROT: 4
    • O.CONFIDENTIAL: 3
    • O.CONFIG: 7
    • O.CRYPTO: 10
    • O.IDENTIFY: 15
    • O.INTEGRITY: 5
    • O.MANAGE: 7
    • O.OTP: 5
    • O.PRIVACY: 4
    • O.STRONG_PERSONALKEY: 6
    • O.USER: 6
  • OE:
    • OE.ALIGNEDBACKUP: 6
    • OE.AUDIT: 5
    • OE.AUDIT_PROTECT: 1
    • OE.BACKUP: 1
    • OE.CERTIFICATE: 4
    • OE.CONTINUITY: 3
    • OE.CRYPTO: 8
    • OE.DB: 3
    • OE.DOC: 4
    • OE.IDENTIFY: 6
    • OE.INTEGRITY: 4
    • OE.LOG_STORE: 4
    • OE.PERSONALKEY: 4
    • OE.PHYSICAL_ACCESS: 6
    • OE.SO: 8
    • OE.STAFF: 18
    • OE.STORAGE: 3
    • OE.TIME: 8
  • T:
    • T.CONFIDENTIALITY: 2
    • T.CONFIG: 3
    • T.CRASH: 1
    • T.EXHAUST: 3
    • T.INSTALL: 2
    • T.INTEGRITY: 3
    • T.INTERCEPT: 2
    • T.INTERR: 2
    • T.KEY_ACCESS: 2
    • T.KEY_GUESS: 3
    • T.LOSSOF: 3
    • T.MASQUERADE: 3
    • T.NOTRACE: 2
    • T.PRIVACY: 2
    • T.PRIVIL: 1
    • T.REPLAY: 3
    • T.SCREEN: 3
    • T.THREAT: 1
  • A:
    • A: 1
    • A.MODE: 8
  • O:
    • O.OVERWRITE: 8
  • OE:
    • OE.MODE: 6
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 10
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-256: 10
      • AES256: 2
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 6
      • SHA256: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.2: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 15408: 2
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2006-09-002: 1
    • CCMB-2007-09-0004: 1
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. See Table 18: file sharing permissions configurable in a sharing template [142] Guest (G) Guest: 1
    • activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. The Windows OS is indispensable on the END USER side in order to use this security function. [22: 1
    • and editable only in their BooleBox storage. [25] Watermark With BooleBox users can protect their confidential documents and the intellectual property of their shared files through an indelible watermark displaying key: 1
    • confidential information through e-mail in total security. With BooleBox it is possible to attach confidential documents to e-mails with the assurance that no one can intercept since the email message itself is: 1
pdf_data/st_metadata
  • /Author: Boole Server S.r.l.
  • /CreationDate: D:20200507102310Z00'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20200507102310Z00'00'
  • /Producer: Mac OS X 10.13.6 Quartz PDFContext
  • /Title: BooleBox on Premises v4.2 Security Target v1.5
  • pdf_file_size_bytes: 2607031
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/cc
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
  • /Author: RICOH
  • /Company: 株式会社リコー
  • /CreationDate: D:20110128093409+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0.7
  • /ModDate: D:20110128093436+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20110128003326
  • /Title: DOMS タイプ9 セキュリティターゲット
  • pdf_file_size_bytes: 411290
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different