Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Pro 8100EX/8100S/8110S/8120S (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) Version: E-1.01
JISEC-CC-CRP-C0426
MP 501/601(Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP 501G/601G(Ricoh/Savin/Lanier) E-1.01
JISEC-CC-CRP-C0584
name Pro 8100EX/8100S/8110S/8120S (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) Version: E-1.01 MP 501/601(Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP 501G/601G(Ricoh/Savin/Lanier) E-1.01
not_valid_before 2014-01-28 2017-12-27
not_valid_after 2017-02-07 2022-12-27
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0426_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0584_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0426_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0584_erpt.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0584_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None ba8d117cec6ab1aa50857da5844ecda555fe59dc1d2a32c2727cbf8f8d41e633
state/cert/txt_hash None bb135e2c5e0705268c7ca7a3513beb0d6e1e546549e291c87211be8a86535e42
state/report/pdf_hash dbd95fe1866f62963bb7ed9ab5a626e9abd15aa3b2d43302cadc9a1d75e96f24 401502808ee1d7eb1e5ea32447d9edc252476f2c8009022292365bef4d57af6f
state/report/txt_hash 329e3016d576bd023d13cdce7028848d0dbffc40b9a818b82f7aec66c516988a 2948f994b9c33df294f426b988e8f0c1742281c873906ad1703a140bcf418fd3
state/st/pdf_hash 9e4b2ddb36d62ab6255f890a259ab2f570d8fef9302aa3aba8a3af28bc0f700e c36499422636f48860e9b5a49261160cef3d82d14e111f86deefee0a29195471
state/st/txt_hash a8528bba5fd71fa998d60f7603dddecec22c9c0dec4f5e2b96809f5f7a93663c 8ef8be9fc815d8554428a285a7cdcbfc1312495cc6af1bfe35317b30b9c8dd3c
heuristics/cert_id JISEC-CC-CRP-C0426 JISEC-CC-CRP-C0584
heuristics/cpe_matches None cpe:2.3:h:ricoh:mp_501:-:*:*:*:*:*:*:*
heuristics/scheme_data/cert_id C0426 C0584
heuristics/scheme_data/certification_date 2014-01 2017-12
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)PP
heuristics/scheme_data/enhanced/assurance_level EAL3 Augmented with ALC_FLR.2 EAL2 Augmented by ALC_FLR.2
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0426_eimg.pdf https://www.ipa.go.jp/en/security/c0584_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2014-01-28 2017-12-27
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/product Pro 8100EX/8100S/8110S/8120S(Ricoh/Savin/ Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) MP 501/601(Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP 501G/601G(Ricoh/Savin/Lanier)
heuristics/scheme_data/enhanced/protection_profile IEEE Std 2600.1™-2009 U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0426_erpt.pdf https://www.ipa.go.jp/en/security/c0584_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0426_est.pdf https://www.ipa.go.jp/en/security/c0584_est.pdf
heuristics/scheme_data/expiration_date 2017-02 2023-01
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0426_it3457.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0584_it6593.html
heuristics/scheme_data/toe_overseas_name Pro 8100EX/8100S/8110S/8120S (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) E-1.01 MP 501/601(Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec),MP 501G/601G(Ricoh/Savin/Lanier)E-1.01
pdf_data/cert_filename None c0584_eimg.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ECSEC:
      • ECSEC Laboratory: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 477582
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
  • /CreationDate: D:20180305120951+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180305121150+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/report_filename c0426_erpt.pdf c0584_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0426-01: 1
  • Certification No. C0426: 1
  • CRP-C0584-01: 1
  • Certification No. C0584: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 2
  • EAL2: 4
  • EAL2 augmented: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 3
  • TLS:
    • TLS: 2
pdf_data/report_keywords/eval_facility/ECSEC/ECSEC Laboratory 3 4
pdf_data/report_metadata//CreationDate D:20140331120741+09'00' D:20180319161539+09'00'
pdf_data/report_metadata//ModDate D:20140331120822+09'00' D:20180319161615+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 348941 282547
pdf_data/report_metadata/pdf_number_of_pages 37 39
pdf_data/st_filename c0426_est.pdf c0584_est.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.STORAGE: 14
    • O.RCGATE: 13
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.STORAGE: 14
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_claims/T/T.DOC 10 14
pdf_data/st_keywords/cc_claims/T/T.FUNC 5 7
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
  • ALC_FLR.2: 3
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 1
  • EAL2: 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 10 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 31 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 39 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 7 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 23 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 23
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP 8 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 10 11
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 21 17
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 1 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
  • TLS:
    • TLS:
      • TLS1.0: 1
      • TLS1.1: 1
      • TLS1.2: 1
  • IPsec:
    • IPsec: 10
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL3.0: 1
  • TLS:
    • TLS1.0: 2
  • TLS:
    • TLS1.0: 1
    • TLS1.1: 1
    • TLS1.2: 1
pdf_data/st_keywords/crypto_protocol/TLS/TLS
  • TLS1.0: 2
  • TLS1.0: 1
  • TLS1.1: 1
  • TLS1.2: 1
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS1.0 2 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 5 2
pdf_data/st_metadata//Author z00se00558 RICOH
pdf_data/st_metadata//CreationDate D:2014031914374409'00' D:20180122093838+09'00'
pdf_data/st_metadata//Creator PrimoPDF http://www.primopdf.com/ Microsoft® Word 2013
pdf_data/st_metadata//ModDate D:2014031914374409'00' D:20180122093838+09'00'
pdf_data/st_metadata//Producer PrimoPDF Microsoft® Word 2013
pdf_data/st_metadata//Title Microsoft Word - Pro_8100_ST_EXP_1.00_jp_ENG_20140319 MP 501/601 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP 501G/601G (Ricoh/Savin/Lanier)Security Target
pdf_data/st_metadata/pdf_file_size_bytes 5515992 1206398
pdf_data/st_metadata/pdf_number_of_pages 87 86
dgst f446a493a438e445 2b4515aa80efff10