imagio Security Card Type 7 (Japanese name), DataOverwriteSecurity Unit Type H (English name) Version: 1.02x
CSV information ?
Status | archived |
---|---|
Valid from | 29.11.2013 |
Valid until | 01.09.2019 |
Scheme | 🇯🇵 JP |
Manufacturer | Ricoh Company, Ltd. |
Category | Other Devices and Systems |
Security level | EAL3 |
Maintenance updates | DataOverwriteSecurity Unit Type H 1.02x (07.12.2015) Certification report Security target |
Heuristics summary ?
Certification report ?
Extracted keywords
Security level
EAL3Claims
A.MODECertificates
CRP-C0416-01, Certification No. C0416Evaluation facilities
ECSEC LaboratoryStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date: | D:20140204162613+09'00' |
---|---|
Modification date: | D:20140204162638+09'00' |
Pages: | 24 |
Creator: | Microsoft® Word 2010 |
Producer: | Microsoft® Word 2010 |
References
No references.
Security target ?
Extracted keywords
Security level
EAL3Claims
O.OVERWRITE, A.MODE, OE.MODESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FDP_SIP.1, FDP_RIP, FDP_RIP.1.1, FDP_SIP, FDP_SIP.1.1Standards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003File metadata
Creation date: | D:20140131135638+09'00' |
---|---|
Modification date: | D:20140131135642+09'00' |
Pages: | 24 |
Creator: | CubePDF |
Producer: | GPL Ghostscript 9.06; modified using iText® 5.3.2 ©2000-2012 1T3XT BVBA (AGPL-version) |
References
No references.
Heuristics ?
Extracted SARs
ADV_FSP.3, ALC_DVS.1, ASE_TSS.1, ATE_FUN.1, ATE_DPT.1, ALC_CMC.3, ASE_CCL.1, ASE_INT.1, ADV_TDS.2, ALC_CMS.3, ALC_LCD.1, AVA_VAN.2, ASE_REQ.2, ASE_SPD.1, ALC_DEL.1, AGD_PRE.1, ASE_OBJ.2, AGD_OPE.1, ATE_IND.2, ASE_ECD.1, ATE_COV.2, ADV_ARC.1Scheme data ?
Cert Id | C0416 | |
---|---|---|
Supplier | RICOH COMPANY, LTD. | |
Toe Overseas Name | DataOverwriteSecurity Unit Type H 1.02x | |
Claim | EAL3 | |
Revalidations | [frozendict({'date': '2015-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0416_it3458_04.html'})] | |
Certification Date | 2013-11 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0416_it3458.html | |
Toe Japan Name | imagio Security Card Type 71.02x | |
Enhanced | ||
Product | imagio Security Card Type 7 (Japanese name) DataOverwriteSecurity Unit Type H (English name) | |
Toe Version | 1.02x | |
Product Type | Software to overwrite data | |
Certification Date | 2013-11-29 | |
Cc Version | 3.1 Release4 | |
Assurance Level | EAL3 | |
Vendor | RICOH COMPANY, LTD. | |
Evaluation Facility | ECSEC Laboratory Inc. Evaluation Center | |
Report Link | https://www.ipa.go.jp/en/security/c0416_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0416_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0416_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; - RICOH MP C5503 - RICOH MP C4503 - RICOH MP C6003 - RICOH MP C5503A - RICOH MP C4503A - Ricoh MP C4503 - Ricoh MP C4503G - Ricoh MP C4503A - Ricoh MP C5503 - Ricoh MP C5503G - Ricoh MP C5503A - Ricoh MP C6003 - Ricoh MP C6003G - Savin MP C4503 - Savin MP C4503G - Savin MP C5503 - Savin MP C5503G - Savin MP C6003 - Savin MP C6003G - Lanier MP C4503 - Lanier MP C4503G - Lanier MP C5503 - Lanier MP C5503G - Lanier MP C6003 - Lanier MP C6003G - nashuatec MP C4503 - nashuatec MP C4503A - nashuatec MP C5503 - nashuatec MP C5503A - nashuatec MP C6003 - Rex-Rotary MP C4503 - Rex-Rotary MP C4503A - Rex-Rotary MP C5503 - Rex-Rotary MP C5503A - Rex-Rotary MP C6003 - Gestetner MP C4503 - Gestetner MP C4503A - Gestetner MP C5503 - Gestetner MP C5503A - Gestetner MP C6003 - infotec MP C4503 - infotec MP C4503A - infotec MP C5503 - infotec MP C5503A - infotec MP C6003 TOE security functionality Same as above. |
References ?
No references are available for this certificate.
Updates ?
-
21.09.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'C0416', 'supplier': 'RICOH COMPANY, LTD.', 'toe_overseas_name': 'DataOverwriteSecurity Unit Type H\n 1.02x', 'claim': 'EAL3', 'certification_date': '2013-11', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0416_it3458.html', 'toe_japan_name': 'imagio Security Card Type 71.02x', 'enhanced': {'__insert__': {'cc_version': '3.1 Release4', 'report_link': 'https://www.ipa.go.jp/en/security/c0416_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0416_est.pdf'}, '__update__': {'product': 'imagio Security Card Type 7\n (Japanese name)\n DataOverwriteSecurity Unit Type H \n (English name)', 'toe_version': '1.02x', 'product_type': 'Software to overwrite data', 'certification_date': '2013-11-29', 'assurance_level': 'EAL3', 'evaluation_facility': 'ECSEC Laboratory Inc. \n Evaluation Center', 'cert_link': 'https://www.ipa.go.jp/en/security/c0416_eimg.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; \n \n \n \n - \n RICOH MP C5503 \n \n \n - \n RICOH MP C4503 \n \n \n - \n RICOH MP C6003 \n \n \n - \n RICOH MP C5503A \n \n \n - \n RICOH MP C4503A \n \n \n - \n Ricoh MP C4503 \n \n \n - \n Ricoh MP C4503G \n \n \n - \n Ricoh MP C4503A \n \n \n - \n Ricoh MP C5503 \n \n \n - \n Ricoh MP C5503G \n \n \n - \n Ricoh MP C5503A \n \n \n - \n Ricoh MP C6003 \n \n \n - \n Ricoh MP C6003G \n \n \n - \n Savin MP C4503 \n \n \n - \n Savin MP C4503G \n \n \n - \n Savin MP C5503 \n \n \n - \n Savin MP C5503G \n \n \n - \n Savin MP C6003 \n \n \n - \n Savin MP C6003G \n \n \n - \n Lanier MP C4503 \n \n \n - \n Lanier MP C4503G \n \n \n - \n Lanier MP C5503 \n \n \n - \n Lanier MP C5503G \n \n \n - \n Lanier MP C6003 \n \n \n - \n Lanier MP C6003G \n \n \n - \n nashuatec MP C4503 \n \n \n - \n nashuatec MP C4503A \n \n \n - \n nashuatec MP C5503 \n \n \n - \n nashuatec MP C5503A \n \n \n - \n nashuatec MP C6003 \n \n \n - \n Rex-Rotary MP C4503 \n \n \n - \n Rex-Rotary MP C4503A \n \n \n - \n Rex-Rotary MP C5503 \n \n \n - \n Rex-Rotary MP C5503A \n \n \n - \n Rex-Rotary MP C6003 \n \n \n - \n Gestetner MP C4503 \n \n \n - \n Gestetner MP C4503A \n \n \n - \n Gestetner MP C5503 \n \n \n - \n Gestetner MP C5503A \n \n \n - \n Gestetner MP C6003 \n \n \n - \n infotec MP C4503 \n \n \n - \n infotec MP C4503A \n \n \n - \n infotec MP C5503 \n \n \n - \n infotec MP C5503A \n \n \n - \n infotec MP C6003 \n \n \n \n TOE security functionality \n Same as above.'}}}
data.
- The scheme_data property was updated, with the
-
20.06.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'supplier': 'Ricoh Company, Ltd.'}
data.
- The scheme_data property was updated, with the
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'cert_id': 'C0046', 'supplier': 'Ricoh\n Company,\n Ltd.', 'toe_overseas_name': 'DataOverwriteSecurity Unit Type\n D Software\n V0.03', 'claim': 'EAL2', 'certification_date': '2006-03', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0046_it5060.html', 'toe_japan_name': 'DataOverwriteSecurity Unit Type C Software\n V0.03', 'enhanced': {'product': 'DataOverwriteSecurity Unit Type D Software', 'toe_version': 'V0.03', 'product_type': 'IT Product ( software to overwrite data )', 'certification_date': '2006-03-29', 'assurance_level': 'EAL2', 'vendor': 'RICOH COMPANY, LTD.', 'evaluation_facility': 'Electronic Commerce Security Technology Laboratory Inc.Evaluation Center', 'cert_link': 'https://www.ipa.go.jp/en/security/c0046_eimg.pdf', 'description': 'PRODUCT DESCRIPTION \n This product, an optional kit of safer use for Multi Function Product, overwrites the specified area on HDD with random data by Multi Function Product.'}}}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2015-12-07', 'maintenance_title': 'DataOverwriteSecurity Unit Type H 1.02x', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/c0416kz_eacr4.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/c0416kz_est4.pdf'}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
05.02.2023 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
74cbd56c9d120e19c048ff01502f75f44a1a60a784cdec2ec0f489f7fe9c1355
. - The st_txt_hash property was set to
e9be374a4b352d9c6407341f121668af7997d17f1d68c81e272b0b0047ad5592
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 154078, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 24, '/Producer': 'GPL Ghostscript 9.06; modified using iText® 5.3.2 ©2000-2012 1T3XT BVBA (AGPL-version)', '/CreationDate': "D:20140131135638+09'00'", '/ModDate': "D:20140131135642+09'00'", '/Title': '', '/Creator': 'CubePDF', '/Author': '', '/Subject': '', '/Keywords': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FDP': {'FDP_SIP.1': 15, 'FDP_RIP': 5, 'FDP_RIP.1.1': 1, 'FDP_SIP': 1, 'FDP_SIP.1.1': 2}}, 'cc_claims': {'O': {'O.OVERWRITE': 8}, 'A': {'A.MODE': 8}, 'OE': {'OE.MODE': 6}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
c0416_est.pdf
.
The computed heuristics were updated.
- The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The st_download_ok property was set to
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0416_est.pdf, code: 408']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0416_erpt.pdf, code: 408']
. - The st_pdf_hash property was set to
74cbd56c9d120e19c048ff01502f75f44a1a60a784cdec2ec0f489f7fe9c1355
. - The st_txt_hash property was set to
e9be374a4b352d9c6407341f121668af7997d17f1d68c81e272b0b0047ad5592
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 154078, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 24, '/Producer': 'GPL Ghostscript 9.06; modified using iText® 5.3.2 ©2000-2012 1T3XT BVBA (AGPL-version)', '/CreationDate': "D:20140131135638+09'00'", '/ModDate': "D:20140131135642+09'00'", '/Title': '', '/Creator': 'CubePDF', '/Author': '', '/Subject': '', '/Keywords': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FDP': {'FDP_SIP.1': 15, 'FDP_RIP': 5, 'FDP_RIP.1.1': 1, 'FDP_SIP': 1, 'FDP_SIP.1.1': 2}}, 'cc_claims': {'O': {'O.OVERWRITE': 8}, 'A': {'A.MODE': 8}, 'OE': {'OE.MODE': 6}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
c0416_est.pdf
.
The computed heuristics were updated.
- The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0416_est.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The st_download_ok property was set to
-
22.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0416_erpt.pdf, code: nok']
.
- The errors property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'c0416_erpt.pdf', 'st_filename': 'c0416_est.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'JP': {'__update__': {'CRP-C0416-01': 1}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL3': 4}}}}, 'cc_claims': {'__update__': {'A': {'A.MODE': 2}}}}
data. - The st_keywords property was updated, with the
{'cc_claims': {'__update__': {'A': {'A.MODE': 8}, 'OE': {'OE.MODE': 6}}, '__delete__': ['T']}}
data.
The computed heuristics were updated.
- The cert_id property was set to
C0416
.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2015-12-07', 'maintenance_title': 'DataOverwriteSecurity Unit Type H 1.02x', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/c0416kz_eacr4.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/c0416kz_est4.pdf'}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0416-01': 48, 'Certification No. C0416': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.MODE.AUTOMATIC': 1, 'A.MODE.MANUAL': 1}}, 'vendor': {}, 'eval_facility': {'ECSEC': {'ECSEC Laboratory': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FDP': {'FDP_SIP.1': 15, 'FDP_RIP': 5, 'FDP_RIP.1.1': 1, 'FDP_SIP': 1, 'FDP_SIP.1.1': 2}}, 'cc_claims': {'O': {'O.OVERWRITE': 8}, 'T': {'T': 1}, 'A': {'A.MODE.AUTOMATIC': 4, 'A.MODE.MANUAL': 4}, 'OE': {'OE': 3, 'OE.MODE.AUTOMATIC': 3, 'OE.MODE.MANUAL': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': 'f05e1683f46cae1b43bb4c55004fa7520970d133164a0ea7b91f9696934cb03c', 'st_pdf_hash': '74cbd56c9d120e19c048ff01502f75f44a1a60a784cdec2ec0f489f7fe9c1355', 'report_txt_hash': '2ab5c20d17107d89623974a4c5179394b0ae6a3a40ed917d80cfd0f983a38044', 'st_txt_hash': 'e9be374a4b352d9c6407341f121668af7997d17f1d68c81e272b0b0047ad5592'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_extract_ok property was set to
True
. - The errors property was set to
[]
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 173797, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 24, '/CreationDate': "D:20140204162613+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20140204162638+09'00'", '/Producer': 'Microsoft® Word 2010'}
. - The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['1.02']}
. - The cert_id property was set to
CRP-C0416-01
.
- The report_extract_ok property was set to
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name imagio Security Card Type 7 (Japanese name), DataOverwriteSecurity Unit Type H (English name) Version: 1.02x was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "635749310390578b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "C0416",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.02"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "C0416",
"certification_date": "2013-11",
"claim": "EAL3",
"enhanced": {
"assurance_level": "EAL3",
"cc_version": "3.1 Release4",
"cert_link": "https://www.ipa.go.jp/en/security/c0416_eimg.pdf",
"certification_date": "2013-11-29",
"description": "PRODUCT DESCRIPTION \n Description of TOE \n This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; \n \n \n \n - \n RICOH MP C5503 \n \n \n - \n RICOH MP C4503 \n \n \n - \n RICOH MP C6003 \n \n \n - \n RICOH MP C5503A \n \n \n - \n RICOH MP C4503A \n \n \n - \n Ricoh MP C4503 \n \n \n - \n Ricoh MP C4503G \n \n \n - \n Ricoh MP C4503A \n \n \n - \n Ricoh MP C5503 \n \n \n - \n Ricoh MP C5503G \n \n \n - \n Ricoh MP C5503A \n \n \n - \n Ricoh MP C6003 \n \n \n - \n Ricoh MP C6003G \n \n \n - \n Savin MP C4503 \n \n \n - \n Savin MP C4503G \n \n \n - \n Savin MP C5503 \n \n \n - \n Savin MP C5503G \n \n \n - \n Savin MP C6003 \n \n \n - \n Savin MP C6003G \n \n \n - \n Lanier MP C4503 \n \n \n - \n Lanier MP C4503G \n \n \n - \n Lanier MP C5503 \n \n \n - \n Lanier MP C5503G \n \n \n - \n Lanier MP C6003 \n \n \n - \n Lanier MP C6003G \n \n \n - \n nashuatec MP C4503 \n \n \n - \n nashuatec MP C4503A \n \n \n - \n nashuatec MP C5503 \n \n \n - \n nashuatec MP C5503A \n \n \n - \n nashuatec MP C6003 \n \n \n - \n Rex-Rotary MP C4503 \n \n \n - \n Rex-Rotary MP C4503A \n \n \n - \n Rex-Rotary MP C5503 \n \n \n - \n Rex-Rotary MP C5503A \n \n \n - \n Rex-Rotary MP C6003 \n \n \n - \n Gestetner MP C4503 \n \n \n - \n Gestetner MP C4503A \n \n \n - \n Gestetner MP C5503 \n \n \n - \n Gestetner MP C5503A \n \n \n - \n Gestetner MP C6003 \n \n \n - \n infotec MP C4503 \n \n \n - \n infotec MP C4503A \n \n \n - \n infotec MP C5503 \n \n \n - \n infotec MP C5503A \n \n \n - \n infotec MP C6003 \n \n \n \n TOE security functionality \n Same as above.",
"evaluation_facility": "ECSEC Laboratory Inc. \n Evaluation Center",
"product": "imagio Security Card Type 7\n (Japanese name)\n DataOverwriteSecurity Unit Type H \n (English name)",
"product_type": "Software to overwrite data",
"report_link": "https://www.ipa.go.jp/en/security/c0416_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0416_est.pdf",
"toe_version": "1.02x",
"vendor": "RICOH COMPANY, LTD."
},
"revalidations": [
{
"date": "2015-12",
"link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0416_it3458_04.html"
}
],
"supplier": "RICOH COMPANY, LTD.",
"toe_japan_name": "imagio Security Card Type 71.02x",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0416_it3458.html",
"toe_overseas_name": "DataOverwriteSecurity Unit Type H\n 1.02x"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2015-12-07",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0416kz_eacr4.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0416kz_est4.pdf",
"maintenance_title": "DataOverwriteSecurity Unit Type H 1.02x"
}
]
},
"manufacturer": "Ricoh Company, Ltd.",
"manufacturer_web": "https://www.ricoh.com/",
"name": "imagio Security Card Type 7 (Japanese name), DataOverwriteSecurity Unit Type H (English name) Version: 1.02x",
"not_valid_after": "2019-09-01",
"not_valid_before": "2013-11-29",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "c0416_erpt.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0416-01": 1,
"Certification No. C0416": 1
}
},
"cc_claims": {
"A": {
"A.MODE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL3": 4
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ECSEC": {
"ECSEC Laboratory": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20140204162613+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20140204162638+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 173797,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 24
},
"st_filename": "c0416_est.pdf",
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.MODE": 8
},
"O": {
"O.OVERWRITE": 8
},
"OE": {
"OE.MODE": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {
"FDP": {
"FDP_RIP": 5,
"FDP_RIP.1.1": 1,
"FDP_SIP": 1,
"FDP_SIP.1": 15,
"FDP_SIP.1.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20140131135638+09\u002700\u0027",
"/Creator": "CubePDF",
"/Keywords": "",
"/ModDate": "D:20140131135642+09\u002700\u0027",
"/Producer": "GPL Ghostscript 9.06; modified using iText\u00ae 5.3.2 \u00a92000-2012 1T3XT BVBA (AGPL-version)",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 154078,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 24
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0416_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0416_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "f05e1683f46cae1b43bb4c55004fa7520970d133164a0ea7b91f9696934cb03c",
"report_txt_hash": "2ab5c20d17107d89623974a4c5179394b0ae6a3a40ed917d80cfd0f983a38044",
"st_convert_garbage": false,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true,
"st_pdf_hash": "74cbd56c9d120e19c048ff01502f75f44a1a60a784cdec2ec0f489f7fe9c1355",
"st_txt_hash": "e9be374a4b352d9c6407341f121668af7997d17f1d68c81e272b0b0047ad5592"
},
"status": "archived"
}