Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Pro 8100EX/8100S/8110S/8120S (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) Version: E-1.01
JISEC-CC-CRP-C0426
MP C4504/C6004 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C5504 (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec) E-2.03
JISEC-CC-CRP-C0573-01-2017
name Pro 8100EX/8100S/8110S/8120S (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) Version: E-1.01 MP C4504/C6004 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C5504 (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec) E-2.03
not_valid_before 2014-01-28 2017-09-14
not_valid_after 2017-02-07 2022-09-14
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0426_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0573_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0426_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0573_erpt.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0573kz_eimg.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2018, 1, 26), 'maintenance_title': 'MP C4504ex/C6004ex (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MPC5504ex (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec) E-2.03', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0573kz_eacr.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0573kz_est.pdf'})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None e7cead4d6eecddf85430d1a5aed2a69a2593a5644b435e730ce645412aa8c1c3
state/cert/txt_hash None 36e64ab9f56730139c319dee3edeada2be2c10f5b6cd7aecb49f81c87e45fc28
state/report/pdf_hash dbd95fe1866f62963bb7ed9ab5a626e9abd15aa3b2d43302cadc9a1d75e96f24 b7060a9e1b269fe365841b4f91e209bc9b4993fb83151fbf3dcddaf980026b56
state/report/txt_hash 329e3016d576bd023d13cdce7028848d0dbffc40b9a818b82f7aec66c516988a b6d3bd755dba5c6b18e1fb84d350258f0014cc89ccb2bd7dab2a97d9929ac899
state/st/pdf_hash 9e4b2ddb36d62ab6255f890a259ab2f570d8fef9302aa3aba8a3af28bc0f700e 2217de0f8046cf4b055c04fa363f957f472fe1c30b7366f4af100fdd3d0e569b
state/st/txt_hash a8528bba5fd71fa998d60f7603dddecec22c9c0dec4f5e2b96809f5f7a93663c 7f553bb2c9257cc541e4190fe7b3316b306b2ecc2651ee8f31d6266d51e469ed
heuristics/cert_id JISEC-CC-CRP-C0426 JISEC-CC-CRP-C0573-01-2017
heuristics/cpe_matches None cpe:2.3:h:ricoh:mp_c6004:-:*:*:*:*:*:*:*, cpe:2.3:h:ricoh:mp_c4504:-:*:*:*:*:*:*:*, cpe:2.3:h:ricoh:mp_c5504:-:*:*:*:*:*:*:*
heuristics/extracted_versions 1.01 2.03
heuristics/scheme_data
  • cert_id: C0426
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: Pro 8100EX/8100S/8110S/8120S (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) E-1.01
  • expiration_date: 2017-02
  • claim: EAL3+ ALC_FLR.2 PP
  • certification_date: 2014-01
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0426_it3457.html
  • toe_japan_name: -----
  • enhanced:
    • product: Pro 8100EX/8100S/8110S/8120S(Ricoh/Savin/ Lanier/nashuatec/Rex-Rotary/Gestetner/infotec)
    • toe_version: E-1.01
    • product_type: Multi Function Product
    • certification_date: 2014-01-28
    • cc_version: 3.1 Release4
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • protection_profile: IEEE Std 2600.1™-2009
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0426_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0426_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0426_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
  • cert_id: C0573
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: MP C4504ex/C6004ex(Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C5504ex (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec) E-2.03
  • expiration_date: 2022-10
  • claim: EAL2+ALC_FLR.2 PP
  • revalidations: frozendict({'date': '2018-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0573_it7634_01.html'})
  • certification_date: 2017-09
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0573_it7634.html
  • toe_japan_name: -----
  • enhanced:
    • product: MP C4504/C6004 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C5504 (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec)
    • toe_version: E-2.03
    • product_type: Multi Function Product
    • cert_id: JISEC-C0573
    • certification_date: 2017-09-14
    • cc_version: 3.1 Release4
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0573_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0573_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0573_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/cert_id C0426 C0573
heuristics/scheme_data/certification_date 2014-01 2017-09
heuristics/scheme_data/claim EAL3+ ALC_FLR.2 PP EAL2+ALC_FLR.2 PP
heuristics/scheme_data/enhanced
  • product: Pro 8100EX/8100S/8110S/8120S(Ricoh/Savin/ Lanier/nashuatec/Rex-Rotary/Gestetner/infotec)
  • toe_version: E-1.01
  • product_type: Multi Function Product
  • certification_date: 2014-01-28
  • cc_version: 3.1 Release4
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1™-2009
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0426_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0426_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0426_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
  • product: MP C4504/C6004 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C5504 (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec)
  • toe_version: E-2.03
  • product_type: Multi Function Product
  • cert_id: JISEC-C0573
  • certification_date: 2017-09-14
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented with ALC_FLR.2
  • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • vendor: RICOH COMPANY, LTD.
  • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0573_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0573_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0573_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/assurance_level EAL3 Augmented with ALC_FLR.2 EAL2 Augmented with ALC_FLR.2
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0426_eimg.pdf https://www.ipa.go.jp/en/security/c0573_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2014-01-28 2017-09-14
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
heuristics/scheme_data/enhanced/product Pro 8100EX/8100S/8110S/8120S(Ricoh/Savin/ Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) MP C4504/C6004 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C5504 (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec)
heuristics/scheme_data/enhanced/protection_profile IEEE Std 2600.1™-2009 U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0426_erpt.pdf https://www.ipa.go.jp/en/security/c0573_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0426_est.pdf https://www.ipa.go.jp/en/security/c0573_est.pdf
heuristics/scheme_data/enhanced/toe_version E-1.01 E-2.03
heuristics/scheme_data/expiration_date 2017-02 2022-10
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0426_it3457.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0573_it7634.html
heuristics/scheme_data/toe_overseas_name Pro 8100EX/8100S/8110S/8120S (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) E-1.01 MP C4504ex/C6004ex(Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C5504ex (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec) E-2.03
pdf_data/cert_filename None c0573kz_eimg.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • JP:
      • JISEC-CC-CRP-C0573-01-2017: 1
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • ECSEC:
      • ECSEC Laboratory: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 150509
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20180228134048+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180228134216+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/report_filename c0426_erpt.pdf c0573_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0426-01: 1
  • Certification No. C0426: 1
  • JISEC-CC-CRP-C0573-01-2017: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 2
  • EAL2: 4
  • EAL2 augmented: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 3
  • TLS:
    • TLS: 2
pdf_data/report_keywords/eval_facility/ECSEC/ECSEC Laboratory 3 4
pdf_data/report_metadata//CreationDate D:20140331120741+09'00' D:20171018114314+09'00'
pdf_data/report_metadata//ModDate D:20140331120822+09'00' D:20171018114459+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 348941 306300
pdf_data/report_metadata/pdf_number_of_pages 37 38
pdf_data/st_filename c0426_est.pdf c0573_est.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.STORAGE: 14
    • O.RCGATE: 13
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.STORAGE: 14
    • O.DOC: 18
    • O.FUNC: 9
    • O.PROT: 9
    • O.CONF: 18
    • O.USER: 21
    • O.INTERFACE: 9
    • O.SOFTWARE: 9
    • O.AUDIT: 9
  • T:
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
    • T.CONF: 10
  • A:
    • A.ACCESS: 5
    • A.USER: 4
    • A.ADMIN: 10
  • OE:
    • OE.AUDIT_STORAGE: 3
    • OE.AUDIT_ACCESS: 2
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.STORAGE: 14
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
pdf_data/st_keywords/cc_claims/T/T.DOC 10 14
pdf_data/st_keywords/cc_claims/T/T.FUNC 5 7
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
  • ALC_FLR.2: 3
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 1
  • EAL2: 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 8
  • FIA_UID.1: 18
  • FIA_UAU.1: 14
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_USB.1: 6
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 10 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 31 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 39 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 7 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 23 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 23
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP 8 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 10 11
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 21 17
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 1 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
  • TLS:
    • TLS:
      • TLS1.0: 1
      • TLS1.1: 1
      • TLS1.2: 1
  • IPsec:
    • IPsec: 10
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL3.0: 1
  • TLS:
    • TLS1.0: 2
  • TLS:
    • TLS1.0: 1
    • TLS1.1: 1
    • TLS1.2: 1
pdf_data/st_keywords/crypto_protocol/TLS/TLS
  • TLS1.0: 2
  • TLS1.0: 1
  • TLS1.1: 1
  • TLS1.2: 1
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS1.0 2 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 7 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 5 2
pdf_data/st_metadata//Author z00se00558 RICOH
pdf_data/st_metadata//CreationDate D:2014031914374409'00' D:20170925115525+09'00'
pdf_data/st_metadata//Creator PrimoPDF http://www.primopdf.com/ Microsoft® Word 2016
pdf_data/st_metadata//ModDate D:2014031914374409'00' D:20170925115525+09'00'
pdf_data/st_metadata//Producer PrimoPDF Microsoft® Word 2016
pdf_data/st_metadata//Title Microsoft Word - Pro_8100_ST_EXP_1.00_jp_ENG_20140319 MP C4504/C6004 (Ricoh/Savin/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec), MP C5504 (Ricoh/nashuatec/Rex-Rotary/Gestetner/infotec) Security Target
pdf_data/st_metadata/pdf_file_size_bytes 5515992 1120966
dgst f446a493a438e445 50caa2788e6bdbf6