DataOverwriteSecurity Unit Type M19 1.02
CSV information ?
Status | archived |
---|---|
Valid from | 09.03.2016 |
Valid until | 09.03.2021 |
Scheme | 🇯🇵 JP |
Manufacturer | Ricoh Company, Ltd. |
Category | Other Devices and Systems |
Security level | EAL2 |
Maintenance updates | DataOverwriteSecurity Unit Type M19 1.02 (02.10.2017) Certification report Security target |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Security level
EAL2Claims
A.MODE, A.MFPCertificates
CRP-C0498-01, Certification No. C0498Evaluation facilities
ECSEC LaboratoryStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date | D:20160808101252+09'00' |
---|---|
Modification date | D:20160808101320+09'00' |
Pages | 23 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Security target ?
Extracted keywords
Security level
EAL2Claims
O.OVERWRITE, A.MODE, A.MFP, OE.MODE, OE.MFPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FDP_SIP.1, FDP_RIP, FDP_RIP.1.1, FDP_SIP, FDP_SIP.1.1Standards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003File metadata
Title | Security Card Type M19 DataOverwriteSecurity Unit Type M19 Security Target |
---|---|
Author | RICOH |
Creation date | D:20160607103036+09'00' |
Modification date | D:20160607103036+09'00' |
Pages | 23 |
Creator | Microsoft® Word 2013 |
Producer | Microsoft® Word 2013 |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ALC_CMS.2, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_PRE.1, ADV_FSP.2, ASE_OBJ.2Similar certificates
Scheme data ?
Cert Id | JISEC-CC-CRP-C0498 | |
---|---|---|
Supplier | RICOH COMPANY, LTD. | |
Toe Overseas Name | DataOverwriteSecurity Unit Type M191.02 | |
Expiration Date | 01.04.2021 | |
Claim | EAL2 | |
Revalidations | [frozendict({'date': '2017-10', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0498_it5536_01.html'})] | |
Certification Date | 01.03.2016 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0498_it5536.html | |
Toe Japan Name | Security Card Type M191.02 | |
Enhanced | ||
Product | Security Card Type M19 (Japanese name) DataOverwriteSecurity Unit Type M19 (English name) | |
Toe Version | 1.02 | |
Product Type | Software to overwrite data | |
Cc Version | 3.1 Release4 | |
Assurance Level | EAL2 | |
Vendor | RICOH COMPANY, LTD. | |
Evaluation Facility | ECSEC Laboratory Inc. Evaluation Center | |
Report Link | https://www.ipa.go.jp/en/security/c0498_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0498_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0498_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; - RICOH MP CW2201/CW1201 series TOE security functionality Same as above. |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'JISEC-CC-CRP-C0498', 'expiration_date': '2021-04-01', 'certification_date': '2016-03-01', 'enhanced': {'__update__': {'product': 'Security Card Type M19 (Japanese name) DataOverwriteSecurity Unit Type M19 (English name)', 'evaluation_facility': 'ECSEC Laboratory Inc. Evaluation Center', 'description': 'PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; - RICOH MP CW2201/CW1201 series TOE security functionality Same as above.'}, '__delete__': ['certification_date']}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0498', 'supplier': 'RICOH COMPANY, LTD.', 'toe_overseas_name': 'DataOverwriteSecurity Unit Type M191.02', 'expiration_date': '2021-04', 'claim': 'EAL2', 'revalidations': [{'date': '2017-10', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0498_it5536_01.html'}], 'certification_date': '2016-03', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0498_it5536.html', 'toe_japan_name': 'Security Card Type M191.02', 'enhanced': {'product': 'Security Card Type M19 (Japanese name)\n DataOverwriteSecurity Unit Type M19 (English name)', 'toe_version': '1.02', 'product_type': 'Software to overwrite data', 'certification_date': '2016-03-09', 'cc_version': '3.1 Release4', 'assurance_level': 'EAL2', 'vendor': 'RICOH COMPANY, LTD.', 'evaluation_facility': 'ECSEC Laboratory Inc.\n Evaluation Center', 'report_link': 'https://www.ipa.go.jp/en/security/c0498_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0498_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0498_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; \n \n \n \n - \n RICOH MP CW2201/CW1201 series \n \n \n \n \n TOE security functionality \n Same as above.'}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e43f10c902a9622e70250627cbce834083d650a09b08ca349d9f2f82a1744e88', 'txt_hash': 'd95f15bd8ef92d5a37445b14842bbde46cac8d153901062198fde3d30fa3a35b'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '074694dad16ad93aabfde0a658ba4a626d031b103dba6e07ee2b4a3c7965f13a', 'txt_hash': '4859d47a788bb00ee8f466437f713a1b2028097f3c00b8d003f213564f9752ce'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 182746, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 23, '/CreationDate': "D:20160808101252+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20160808101320+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 253717, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 23, '/Title': 'Security Card Type M19 DataOverwriteSecurity Unit Type M19 Security Target', '/Author': 'RICOH', '/Creator': 'Microsoft® Word 2013', '/CreationDate': "D:20160607103036+09'00'", '/ModDate': "D:20160607103036+09'00'", '/Producer': 'Microsoft® Word 2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0498-01': 1, 'Certification No. C0498': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.MODE': 2, 'A.MFP': 1}}, 'vendor': {}, 'eval_facility': {'ECSEC': {'ECSEC Laboratory': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FDP': {'FDP_SIP.1': 15, 'FDP_RIP': 5, 'FDP_RIP.1.1': 1, 'FDP_SIP': 1, 'FDP_SIP.1.1': 2}}, 'cc_claims': {'O': {'O.OVERWRITE': 8}, 'A': {'A.MODE': 8, 'A.MFP': 3}, 'OE': {'OE.MODE': 6, 'OE.MFP': 5}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
c0498_erpt.pdf
. - The st_filename property was set to
c0498_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0498
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0498_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0498_est.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name DataOverwriteSecurity Unit Type M19 1.02 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "eb25e3be8cbd0906",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0498",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.02"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0498",
"certification_date": "2016-03-01",
"claim": "EAL2",
"enhanced": {
"assurance_level": "EAL2",
"cc_version": "3.1 Release4",
"cert_link": "https://www.ipa.go.jp/en/security/c0498_eimg.pdf",
"description": "PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; - RICOH MP CW2201/CW1201 series TOE security functionality Same as above.",
"evaluation_facility": "ECSEC Laboratory Inc. Evaluation Center",
"product": "Security Card Type M19 (Japanese name) DataOverwriteSecurity Unit Type M19 (English name)",
"product_type": "Software to overwrite data",
"report_link": "https://www.ipa.go.jp/en/security/c0498_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0498_est.pdf",
"toe_version": "1.02",
"vendor": "RICOH COMPANY, LTD."
},
"expiration_date": "2021-04-01",
"revalidations": [
{
"date": "2017-10",
"link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0498_it5536_01.html"
}
],
"supplier": "RICOH COMPANY, LTD.",
"toe_japan_name": "Security Card Type M191.02",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0498_it5536.html",
"toe_overseas_name": "DataOverwriteSecurity Unit Type M191.02"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2017-10-02",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0498kz_eacr.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0498kz_est.pdf",
"maintenance_title": "DataOverwriteSecurity Unit Type M19 1.02"
}
]
},
"manufacturer": "Ricoh Company, Ltd.",
"manufacturer_web": "https://www.ricoh.com/",
"name": "DataOverwriteSecurity Unit Type M19 1.02",
"not_valid_after": "2021-03-09",
"not_valid_before": "2016-03-09",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0498_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0498-01": 1,
"Certification No. C0498": 1
}
},
"cc_claims": {
"A": {
"A.MFP": 1,
"A.MODE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 4
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ECSEC": {
"ECSEC Laboratory": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20160808101252+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20160808101320+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 182746,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 23
},
"st_filename": "c0498_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.MFP": 3,
"A.MODE": 8
},
"O": {
"O.OVERWRITE": 8
},
"OE": {
"OE.MFP": 5,
"OE.MODE": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 4
}
},
"cc_sfr": {
"FDP": {
"FDP_RIP": 5,
"FDP_RIP.1.1": 1,
"FDP_SIP": 1,
"FDP_SIP.1": 15,
"FDP_SIP.1.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "RICOH",
"/CreationDate": "D:20160607103036+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20160607103036+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Title": "Security Card Type M19 DataOverwriteSecurity Unit Type M19 Security Target",
"pdf_file_size_bytes": 253717,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 23
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0498_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0498_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e43f10c902a9622e70250627cbce834083d650a09b08ca349d9f2f82a1744e88",
"txt_hash": "d95f15bd8ef92d5a37445b14842bbde46cac8d153901062198fde3d30fa3a35b"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "074694dad16ad93aabfde0a658ba4a626d031b103dba6e07ee2b4a3c7965f13a",
"txt_hash": "4859d47a788bb00ee8f466437f713a1b2028097f3c00b8d003f213564f9752ce"
}
},
"status": "archived"
}