| name |
CBB business application unit Version 1.0 |
RICOH IM C530F/C530FB version E-1.00-H |
| category |
Other Devices and Systems |
Multi-Function Devices |
| scheme |
JP |
CA |
| status |
archived |
active |
| not_valid_after |
10.12.2010 |
31.08.2026 |
| not_valid_before |
11.03.2005 |
13.10.2021 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0024_ecvr2.pdf |
https://www.commoncriteriaportal.org/files/epfiles/556-LSS%20CR%20v1.1.pdf |
| st_link |
|
https://www.commoncriteriaportal.org/files/epfiles/556-LSS%20%20ST%20v1.5.pdf |
| manufacturer |
The Bank of Tokyo-Mitsubishi/ MITSUBISHI ELECTRIC INFORMATION SYSTEMS CORPORATION |
Ricoh Company, Ltd. |
| manufacturer_web |
https://www.mitsubishielectric.com/ |
|
| security_level |
EAL2 |
{} |
| dgst |
fcef5c6a6d0cec57 |
6576b5ebcb3a4739 |
| heuristics/cert_id |
JISEC-CC-CRP-C0024 |
556-LSS |
| heuristics/cert_lab |
[] |
CANADA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
{} |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
1.0 |
1.00 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0159
- certification_date: 01.05.2008
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE TOE is application software installed in dedicated terminals for banking services that are placed in stores such as supermarkets. By using the terminals, customers can take banking services such as address corrections and changing signature. The terminal can also accept application forms in bulk. To enable these services, TOE has the acceptance function, the collection function, and the data communication function. TOE security functions TOE has the following security functions: - Encryption function of individual information. - Identification and authentication of user.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: ABB business application software
- product_type: Business application in a terminal for banking services
- toe_version: 1.0
- vendor: AEON BANK, LTD. / Mitsubishi Electric Information Systems Corporation
- expiration_date: 01.01.2011
- supplier: AEON BANK, LTD./ Mitsubishi Electric Information Systems Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0159_it7174.html
- toe_japan_name: ABB business application software 1.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
- certification_date: 13.10.2021
- level: PP_HCD_V1.0
- product: RICOH IM C530F/C530FB version E-1.00-H
- vendor: RICOH Company, LTD.
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0024_ecvr2.pdf |
556-LSS CR v1.1.pdf |
| pdf_data/report_frontpage |
|
- CA:
- cert_id: 556-LSS
- cert_lab: CANADA
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0024: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA/ISEC
- /CreationDate: D:20051104120631+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20051104120640+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20051104030140
- /Title: TOE List
- pdf_file_size_bytes: 23139
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Clark, Cory P.
- /CreationDate: D:20211014184716-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20211014184716-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 579858
- pdf_hyperlinks: http://www.zerodayinitiative.com/advisories, https://www.cvedetails.com/vulnerability-search.php, https://www.ricoh.com/info/, https://web.nvd.nist.gov/view/vuln/search, http://cve.mitre.org/cve/, mailto:[email protected], https://support.ricoh.com/services/device/ccmanual/IM_C530/SecurityReference/en-GB/booklist/int/index_book.htm, http://nessus.org/plugins/index.php?view=search, https://www.securityfocus.com/, http://www.kb.cert.org/vuls/html/search, https://www.rapid7.com/db/vulnerabilities, https://www.ricoh.com/products/security/mfp/bulletins/, https://support.ricoh.com/services/device/ccmanual/IM_C530/en-GB/booklist/int/index_book.htm, https://www.exploit-db.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
| pdf_data/st_filename |
|
556-LSS ST v1.5.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 11
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.1: 7
- ALC_CMS.1: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 20
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_SAR.1: 3
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 3
- FAU_SAR.2.1: 1
- FAU_STG.1: 3
- FAU_STG.4: 3
- FAU_STG.4.1: 1
- FAU_STG_EXT: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 2
- FCS_CKM.4: 5
- FCS_CKM.4.1: 2
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 5
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 52
- FCS_COP.1.1: 5
- FCS_DSK_EXT.1: 1
- FCS_FXS_EXT.1: 1
- FCS_KDF_EXT: 1
- FCS_KDF_EXT.1: 4
- FCS_KDF_EXT.1.1: 1
- FCS_KYC_EXT: 3
- FCS_KYC_EXT.1: 2
- FCS_KYC_EXT.1.1: 1
- FCS_PCC_EXT: 1
- FCS_PCC_EXT.1: 2
- FCS_PCC_EXT.1.1: 1
- FCS_RBG: 1
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT: 1
- FCS_SMC_EXT.1: 4
- FCS_SMC_EXT.1.1: 1
- FCS_SNI_EXT: 1
- FCS_SNI_EXT.1: 2
- FCS_SNI_EXT.1.1: 1
- FCS_SNI_EXT.1.2: 1
- FCS_SNI_EXT.1.3: 1
- FCS_SSH_EXT: 1
- FCS_SSH_EXT.1: 2
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 8
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC.1: 3
- FDP_ACC.1.1: 1
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 1
- FDP_DSK_EXT.1: 1
- FDP_DSK_EXT.1.1: 1
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 1
- FDP_FXS_EXT.1: 4
- FDP_FXS_EXT.1.1: 2
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 3
- FIA_ATD.1.1: 1
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT: 1
- FIA_PSK_EXT.1: 3
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA.1: 3
- FMT_MSA.1.1: 1
- FMT_MSA.3: 3
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR.1: 4
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 1
- FPT_KYP_EXT.1: 2
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 7
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 9
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- A.NETWORK: 2
- A.PHYSICAL: 2
- A.TRAINED_USERS: 1
- A.TRUSTED_: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS_: 1
- O.ACCESS_CONTROL: 3
- O.ADMIN_ROLES: 4
- O.AUDIT: 2
- O.COMMS_PROTECTION: 3
- O.FAX_NET_SEPARATION: 2
- O.TSF_SELF_TEST: 2
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 3
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 2
- OE.NETWORK: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 2
- OE.USER_TRAINING: 1
- T:
- T.NET_: 1
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 2
- T.TSF_FAILURE: 2
- T.UNAUTHORIZED_: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UP: 1
- T.UNAUTHORIZED_UPDATE: 1
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 11
- SHA-384: 2
- SHA-512: 3
- SHA256: 10
- SHA384: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 23
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 3
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- NIST:
- Curve P-256: 1
- P-256: 3
- P-384: 4
- P-521: 4
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 4
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10118-: 1
- ISO/IEC 18031:2011: 3
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-132: 1
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- NIST SP 800-90A: 2
- SP 800-90A: 1
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2818: 3
- RFC 3602: 3
- RFC 4106: 2
- RFC 4109: 1
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 1
- RFC 4304: 1
- RFC 4346: 1
- RFC 4868: 2
- RFC 5246: 2
- RFC 5282: 1
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
False |
True |
| state/st/download_ok |
False |
True |
| state/st/extract_ok |
False |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |