Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, RPCS 3.12.18, RPCS Font 1.03, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01
JISEC-CC-CRP-C0346
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
CCEVS-VR-VID-10443-2012
name Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, RPCS 3.12.18, RPCS Font 1.03, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01 Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
category Multi-Function Devices Detection Devices and Systems
not_valid_before 2012-04-26 2012-10-01
not_valid_after 2017-02-07 2014-11-01
scheme JP US
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0346_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf
manufacturer Ricoh Company, Ltd. Tenable Network Security, Inc.
manufacturer_web https://www.ricoh.com/ https://www.tenable.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0346_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile Intrusion Detection System - System for Basic Robustness Environme...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf', 'pp_ids': None})
state/report/pdf_hash 4fdb1c22896cb61d84e1d905a9dd483cdb1b0f01fa43308a8c25e5e38288edff 6bbe4e39fb1e3e1496edb10118d6519fe521fc80f7080eb44d7404caa0dbfbb4
state/report/txt_hash 83dce21933dd325ca3df6f4c1db2beaf8b5c797bb789218970cdcd46a94a4796 0cc9c7cf65c4283fa42658cbdbdf224629263190e3e25cbfe0a0fd5d7e8152ce
state/st/pdf_hash bfa267c1c830830a6f2147163ab9c01a487b15ea1a218fbd28687a358d91f2ed 3b767d5258133c0eb3601092a8cf7081b94bf08c654a872c21fb6c7e48566775
state/st/txt_hash c7c1c4ffdcc26c41852f8eea6eec03a0114905ae9b1aba7e6e892b689c24b8bf ac95bdcc32b3b1fa5fb3cb004f461c884649a1e12a831f99e30019259a8b5792
heuristics/cert_id JISEC-CC-CRP-C0346 CCEVS-VR-VID-10443-2012
heuristics/cert_lab None US
heuristics/cpe_matches None cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:*
heuristics/extracted_versions 1.00.2, 1.02, 3.12.18, 11.75, 1.03, 3.5, 01.00.01, 1.00.1, 01.04, 01.01.00, 1.00 5.0.1, 2.0.1, 4.4, 2.1, 3.6
heuristics/related_cves None CVE-2018-1141, CVE-2022-22827, CVE-2017-18214, CVE-2017-5179, CVE-2018-20843, CVE-2022-22824, CVE-2016-1000029, CVE-2022-23852, CVE-2020-5774, CVE-2019-3923, CVE-2024-0971, CVE-2018-1148, CVE-2022-28291, CVE-2021-20079, CVE-2022-22825, CVE-2023-6062, CVE-2022-32973, CVE-2019-3962, CVE-2023-3252, CVE-2021-3449, CVE-2023-3251, CVE-2021-3450, CVE-2018-5407, CVE-2021-20106, CVE-2021-46143, CVE-2022-33757, CVE-2016-9260, CVE-2020-5765, CVE-2022-22826, CVE-2022-22822, CVE-2022-23990, CVE-2019-3982, CVE-2016-4055, CVE-2019-3961, CVE-2022-0778, CVE-2019-1559, CVE-2022-22823, CVE-2021-45960, CVE-2023-3253, CVE-2022-3499, CVE-2024-0955, CVE-2023-6178, CVE-2022-4313, CVE-2018-1147, CVE-2021-20135, CVE-2022-32974, CVE-2016-1000028
heuristics/scheme_data
  • cert_id: C0346
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: -----
  • expiration_date: 2017-02
  • claim: EAL3+ ALC_FLR.2 PP
  • certification_date: 2012-04
  • toe_overseas_link: None
  • toe_japan_name: Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support, 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, RPCS 3.12.18, RPCS Font 1.03, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0346_it1363.html
  • enhanced:
    • product: Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions
    • toe_version: -Software: System/Copy 1.00.2 Network Support 11.75 Fax 01.01.00 RemoteFax 01.01.00 NetworkDocBox 1.00.1 Web Support 1.03 Web Uapl 1.02 animation 1.00 Scanner 01.04 Printer 1.00.1 RPCS 3.12.18 RPCS Font 1.03 Data Erase Onb 1.03m GWFCU3.5-2(WW) 01.00.01 Engine 1.00:03 OpePanel 1.02 LANG0 1.02 LANG1 1.02 -Hardware: Ic Key 01020714 Ic Hdd 01
    • product_type: Multi Function Product
    • certification_date: 2012-04-26
    • cc_version: 3.1
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • protection_profile: IEEE Std 2600.1-2009
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0346_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0346_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0346_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: Log Correlation Engine 6.0.6
  • id: CCEVS-VR-VID11065
  • url: https://www.niap-ccevs.org/product/11065
  • certification_date: 2020-12-08T00:00:00Z
  • expiration_date: 2022-12-08T00:00:00Z
  • category: Application Software
  • vendor: Tenable, Inc
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • scheme: US
heuristics/scheme_data/certification_date 2012-04 2020-12-08T00:00:00Z
heuristics/scheme_data/expiration_date 2017-02 2022-12-08T00:00:00Z
pdf_data/report_filename c0346_erpt.pdf st_vid10443-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10443-2012
    • cert_item: Tenable SecurityCenter 4 and Components
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0346-01: 1
    • Certification No. C0346: 1
  • US:
    • CCEVS-VR-VID10443-2012: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.WKSTN: 1
  • A.OS: 1
  • A.LOCATE: 1
  • A.PROTCT: 1
  • A.MANAGE: 1
  • A.NOEVIL: 1
  • A.NOTRST: 1
  • A.ACCESS: 1
  • A.ASCOPE: 1
  • A.DYNMIC: 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 2
  • T.FUNC: 1
  • T.PROT: 1
  • T.CONF: 2
  • T.COMINT: 1
  • T.COMDIS: 1
  • T.LOSSOF: 1
  • T.NOHALT: 1
  • T.PRIVIL: 1
  • T.IMPCON: 1
  • T.INFLUX: 1
  • T.FACCNT: 1
  • T.SCNCFG: 1
  • T.SCNMLC: 1
  • T.SCNVUL: 1
  • T.FALACT: 1
  • T.FALREC: 1
  • T.FALASC: 1
  • T.MISUSE: 1
  • T.INADVE: 1
  • T.MISACT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.2 4 5
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 1
  • EAL 2: 4
  • EAL 4: 1
  • EAL2: 1
  • EAL2+: 3
  • EAL 2 augmented: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/crypto_protocol/TLS/SSL/SSL 3 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 288448
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
  • /Author:
  • /CreationDate: D:20120522165506+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20120522170807+09'00'
  • /Producer: Acrobat Distiller 9.5.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 441073
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
  • /Title: Validation Report for IronPort Messaging Gateway
  • /Author: Evaluation Team
  • /Subject: Validator Report
  • /Keywords: VR
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20121024103543
  • /ModDate: D:20121024103543
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks:
pdf_data/report_metadata//Author Evaluation Team
pdf_data/report_metadata//CreationDate D:20120522165506+09'00' D:20121024103543
pdf_data/report_metadata//Creator PScript5.dll Version 5.2.2 Microsoft® Office Word 2007
pdf_data/report_metadata//ModDate D:20120522170807+09'00' D:20121024103543
pdf_data/report_metadata//Producer Acrobat Distiller 9.5.0 (Windows) Microsoft® Office Word 2007
pdf_data/report_metadata//Title Validation Report for IronPort Messaging Gateway
pdf_data/report_metadata/pdf_file_size_bytes 288448 441073
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 38 25
pdf_data/st_filename c0346_est.pdf st_vid10443-st.pdf
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 5
  • A.USER: 4
  • A.ADMIN: 10
  • A.ACCESS: 3
  • A.ASCOPE: 3
  • A.DYNMIC: 3
  • A.LOCATE: 3
  • A.PROTCT: 3
  • A.MANAGE: 3
  • A.NOEVIL: 3
  • A.NOTRST: 3
pdf_data/st_keywords/cc_claims/A/A.ACCESS 5 3
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.PROTCT: 11
  • O.IDSCAN: 7
  • O.IDSENS: 7
  • O.IDANLZ: 5
  • O.RESPON: 5
  • O.EADMIN: 5
  • O.ACCESS: 12
  • O.IDAUTH: 20
  • O.OFLOWS: 6
  • O.AUDITS: 5
  • O.INTEGR: 7
  • O.EXPORT: 3
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 3
  • OE.AUDIT_ACCESS: 2
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 4
  • OE.USER: 21
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • OE.INSTAL: 7
  • OE.PHYCAL: 6
  • OE.CREDEN: 6
  • OE.TIME: 4
  • OE.INTROP: 5
  • OE.PERSON: 5
  • OE.AUDIT_PROTECTION: 4
  • OE.AUDIT_SORT: 2
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 10
  • T.FUNC: 5
  • T.PROT: 5
  • T.CONF: 10
  • T.COMINT: 3
  • T.COMDIS: 3
  • T.LOSSOF: 3
  • T.NOHALT: 3
  • T.PRIVIL: 3
  • T.IMPCON: 3
  • T.INFLUX: 3
  • T.FACCNT: 3
  • T.SCNCFG: 3
  • T.SCNMLC: 3
  • T.SCNVUL: 3
  • T.FALACT: 3
  • T.FALREC: 3
  • T.FALASC: 3
  • T.MISUSE: 3
  • T.INADVE: 3
  • T.MISACT: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.2: 3
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ADV:
    • ADV_ARC.1: 22
    • ADV_FSP.2: 12
    • ADV_TDS.1: 12
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 7
  • ALC:
    • ALC_FLR.2: 22
    • ALC_CMS.2: 8
    • ALC_DEL.1: 6
    • ALC_CMC.2: 8
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 9
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
  • ADV_ARC.1: 22
  • ADV_FSP.2: 12
  • ADV_TDS.1: 12
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 1 22
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 1 11
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 1 7
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
  • ALC_FLR.2: 22
  • ALC_CMS.2: 8
  • ALC_DEL.1: 6
  • ALC_CMC.2: 8
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 1 6
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 3 22
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 5
  • ATE_FUN.1: 9
  • ATE_IND.2: 8
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 9
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 8
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 2 8
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 1
  • EAL2: 9
  • EAL 2: 1
  • EAL2 augmented: 4
  • EAL 2 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_STG.1: 9
    • FAU_STG.4: 8
    • FAU_SAR.1: 10
    • FAU_SAR.2: 8
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_ACC.1: 31
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 9
    • FIA_UAU.7: 8
    • FIA_SOS.1: 10
    • FIA_UAU.1: 31
    • FIA_UID.1: 39
    • FIA_UAU.2: 12
    • FIA_UID.2: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMF.1: 22
    • FMT_SMR.1: 29
    • FMT_MSA.3: 23
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TST.1: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_SAR: 6
    • FAU_SEL: 2
    • FAU_STG: 4
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 5
    • FAU_SAR.2: 6
    • FAU_SEL.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG.2: 9
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
  • FIA:
    • FIA_UAU.2: 8
    • FIA_AFL: 2
    • FIA_ATD: 2
    • FIA_UAU: 2
    • FIA_UID: 2
    • FIA_UID.2: 7
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 1
    • FIA_UAU.1: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMR: 2
    • FMT_MOF.1: 7
    • FMT_MDT.1: 1
    • FMT_SMR.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 2
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_ITT.1: 9
    • FPT_ITT.1.1: 1
    • FPT_STM: 1
    • FPT_ITA.1: 2
    • FPT_ITC.1: 2
    • FPT_ITI.1: 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.1: 9
  • FAU_STG.4: 8
  • FAU_SAR.1: 10
  • FAU_SAR.2: 8
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_GEN: 2
  • FAU_SAR: 6
  • FAU_SEL: 2
  • FAU_STG: 4
  • FAU_GEN.1: 7
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_SAR.1: 5
  • FAU_SAR.2: 6
  • FAU_SEL.1: 5
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_SAR.3: 4
  • FAU_SAR.3.1: 1
  • FAU_SEL.1.1: 1
  • FAU_STG.2: 9
  • FAU_STG.2.1: 1
  • FAU_STG.2.2: 1
  • FAU_STG.2.3: 1
  • FAU_STG.4: 5
  • FAU_STG.4.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 12 7
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 5
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 8 6
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 5
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UAU.2: 8
  • FIA_AFL: 2
  • FIA_ATD: 2
  • FIA_UAU: 2
  • FIA_UID: 2
  • FIA_UID.2: 7
  • FIA_AFL.1: 2
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 4
  • FIA_ATD.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 1
  • FIA_UAU.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 9 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 8 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 31 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 12 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 39 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 13 7
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMF.1: 22
  • FMT_SMR.1: 29
  • FMT_MSA.3: 23
  • FMT_MSA.1: 20
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MOF: 2
  • FMT_MTD: 2
  • FMT_SMF: 2
  • FMT_SMR: 2
  • FMT_MOF.1: 7
  • FMT_MDT.1: 1
  • FMT_SMR.1: 5
  • FMT_MOF.1.1: 1
  • FMT_MTD.1: 7
  • FMT_MTD.1.1: 1
  • FMT_SMF.1: 9
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 12 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 29 5
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 5
  • FPT_FDI_EXP.1: 11
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1: 5
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_ITT: 2
  • FPT_STM.1: 6
  • FPT_STM.1.1: 1
  • FPT_ITT.1: 9
  • FPT_ITT.1.1: 1
  • FPT_STM: 1
  • FPT_ITA.1: 2
  • FPT_ITC.1: 2
  • FPT_ITI.1: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 9 6
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
  • SSH:
    • SSH: 18
  • TLS:
    • SSL:
      • SSL: 20
  • VPN:
    • VPN: 1
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL3.0: 1
  • TLS:
    • TLS1.0: 2
  • SSL:
    • SSL: 20
pdf_data/st_keywords/crypto_protocol/TLS/SSL
  • SSL3.0: 1
  • SSL: 20
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 1 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3DES: 6
pdf_data/st_metadata
  • pdf_file_size_bytes: 559869
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 91
  • /CreationDate: D:20120413143029+09'00'
  • /Author: rskak1200296
  • /Creator: PScript5.dll Version 5.2.2
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20120413143029+09'00'
  • /Title: Microsoft Word - MP_5002_ST_DOM_1.00_ENG_0.02.doc
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1188447
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 59
  • /Author: ktodd
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20121024103427
  • /ModDate: D:20121024103427
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks: http://cve.mitre.org/, http://nvd.nist.gov/fdcc/download_fdcc.cfm, http://www.securityfocus.com/bid/
pdf_data/st_metadata//Author rskak1200296 ktodd
pdf_data/st_metadata//CreationDate D:20120413143029+09'00' D:20121024103427
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 Microsoft® Office Word 2007
pdf_data/st_metadata//ModDate D:20120413143029+09'00' D:20121024103427
pdf_data/st_metadata//Producer Acrobat Distiller 7.0.5 (Windows) Microsoft® Office Word 2007
pdf_data/st_metadata/pdf_file_size_bytes 559869 1188447
pdf_data/st_metadata/pdf_hyperlinks http://cve.mitre.org/, http://nvd.nist.gov/fdcc/download_fdcc.cfm, http://www.securityfocus.com/bid/
pdf_data/st_metadata/pdf_number_of_pages 91 59
dgst f4d6197758691b89 7a9d9dd29e76bfba