imagio Security Card Type 7 (Japanese name), DataOverwriteSecurity Unit Type H (English name) Version: 1.02x

CSV information ?

Status archived
Valid from 29.11.2013
Valid until 01.09.2019
Scheme 🇯🇵 JP
Manufacturer Ricoh Company, Ltd.
Category Other Devices and Systems
Security level EAL3
Maintenance updates DataOverwriteSecurity Unit Type H 1.02x (07.12.2015) Certification report Security target

Heuristics summary ?

Certificate ID: C0416

Certification report ?

Extracted keywords

Security level
EAL3
Claims
A.MODE
Certificates
CRP-C0416-01, Certification No. C0416
Evaluation facilities
ECSEC Laboratory

Standards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Creation date: D:20140204162613+09'00'
Modification date: D:20140204162638+09'00'
Pages: 24
Creator: Microsoft® Word 2010
Producer: Microsoft® Word 2010

References

No references.

Security target ?

Extracted keywords

Security level
EAL3
Claims
O.OVERWRITE, A.MODE, OE.MODE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_SIP.1, FDP_RIP, FDP_RIP.1.1, FDP_SIP, FDP_SIP.1.1

Standards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003

File metadata

Creation date: D:20140131135638+09'00'
Modification date: D:20140131135642+09'00'
Pages: 24
Creator: CubePDF
Producer: GPL Ghostscript 9.06; modified using iText® 5.3.2 ©2000-2012 1T3XT BVBA (AGPL-version)

References

No references.

Heuristics ?

Certificate ID: C0416

Extracted SARs

ADV_FSP.3, ALC_DVS.1, ASE_TSS.1, ATE_FUN.1, ATE_DPT.1, ALC_CMC.3, ASE_CCL.1, ASE_INT.1, ADV_TDS.2, ALC_CMS.3, ALC_LCD.1, AVA_VAN.2, ASE_REQ.2, ASE_SPD.1, ALC_DEL.1, AGD_PRE.1, ASE_OBJ.2, AGD_OPE.1, ATE_IND.2, ASE_ECD.1, ATE_COV.2, ADV_ARC.1

Scheme data ?

Cert Id C0416
Supplier RICOH COMPANY, LTD.
Toe Overseas Name DataOverwriteSecurity Unit Type H 1.02x
Claim EAL3
Revalidations [frozendict({'date': '2015-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0416_it3458_04.html'})]
Certification Date 2013-11
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0416_it3458.html
Toe Japan Name imagio Security Card Type 71.02x
Enhanced
Product imagio Security Card Type 7 (Japanese name) DataOverwriteSecurity Unit Type H (English name)
Toe Version 1.02x
Product Type Software to overwrite data
Certification Date 2013-11-29
Cc Version 3.1 Release4
Assurance Level EAL3
Vendor RICOH COMPANY, LTD.
Evaluation Facility ECSEC Laboratory Inc. Evaluation Center
Report Link https://www.ipa.go.jp/en/security/c0416_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/c0416_eimg.pdf
Target Link https://www.ipa.go.jp/en/security/c0416_est.pdf
Description PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; - RICOH MP C5503 - RICOH MP C4503 - RICOH MP C6003 - RICOH MP C5503A - RICOH MP C4503A - Ricoh MP C4503 - Ricoh MP C4503G - Ricoh MP C4503A - Ricoh MP C5503 - Ricoh MP C5503G - Ricoh MP C5503A - Ricoh MP C6003 - Ricoh MP C6003G - Savin MP C4503 - Savin MP C4503G - Savin MP C5503 - Savin MP C5503G - Savin MP C6003 - Savin MP C6003G - Lanier MP C4503 - Lanier MP C4503G - Lanier MP C5503 - Lanier MP C5503G - Lanier MP C6003 - Lanier MP C6003G - nashuatec MP C4503 - nashuatec MP C4503A - nashuatec MP C5503 - nashuatec MP C5503A - nashuatec MP C6003 - Rex-Rotary MP C4503 - Rex-Rotary MP C4503A - Rex-Rotary MP C5503 - Rex-Rotary MP C5503A - Rex-Rotary MP C6003 - Gestetner MP C4503 - Gestetner MP C4503A - Gestetner MP C5503 - Gestetner MP C5503A - Gestetner MP C6003 - infotec MP C4503 - infotec MP C4503A - infotec MP C5503 - infotec MP C5503A - infotec MP C6003 TOE security functionality Same as above.

References ?

No references are available for this certificate.

Updates ?

  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'C0416', 'supplier': 'RICOH COMPANY, LTD.', 'toe_overseas_name': 'DataOverwriteSecurity Unit Type H\n 1.02x', 'claim': 'EAL3', 'certification_date': '2013-11', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0416_it3458.html', 'toe_japan_name': 'imagio Security Card Type 71.02x', 'enhanced': {'__insert__': {'cc_version': '3.1 Release4', 'report_link': 'https://www.ipa.go.jp/en/security/c0416_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0416_est.pdf'}, '__update__': {'product': 'imagio Security Card Type 7\n (Japanese name)\n DataOverwriteSecurity Unit Type H \n (English name)', 'toe_version': '1.02x', 'product_type': 'Software to overwrite data', 'certification_date': '2013-11-29', 'assurance_level': 'EAL3', 'evaluation_facility': 'ECSEC Laboratory Inc. \n Evaluation Center', 'cert_link': 'https://www.ipa.go.jp/en/security/c0416_eimg.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; \n \n \n \n - \n RICOH MP C5503 \n \n \n - \n RICOH MP C4503 \n \n \n - \n RICOH MP C6003 \n \n \n - \n RICOH MP C5503A \n \n \n - \n RICOH MP C4503A \n \n \n - \n Ricoh MP C4503 \n \n \n - \n Ricoh MP C4503G \n \n \n - \n Ricoh MP C4503A \n \n \n - \n Ricoh MP C5503 \n \n \n - \n Ricoh MP C5503G \n \n \n - \n Ricoh MP C5503A \n \n \n - \n Ricoh MP C6003 \n \n \n - \n Ricoh MP C6003G \n \n \n - \n Savin MP C4503 \n \n \n - \n Savin MP C4503G \n \n \n - \n Savin MP C5503 \n \n \n - \n Savin MP C5503G \n \n \n - \n Savin MP C6003 \n \n \n - \n Savin MP C6003G \n \n \n - \n Lanier MP C4503 \n \n \n - \n Lanier MP C4503G \n \n \n - \n Lanier MP C5503 \n \n \n - \n Lanier MP C5503G \n \n \n - \n Lanier MP C6003 \n \n \n - \n Lanier MP C6003G \n \n \n - \n nashuatec MP C4503 \n \n \n - \n nashuatec MP C4503A \n \n \n - \n nashuatec MP C5503 \n \n \n - \n nashuatec MP C5503A \n \n \n - \n nashuatec MP C6003 \n \n \n - \n Rex-Rotary MP C4503 \n \n \n - \n Rex-Rotary MP C4503A \n \n \n - \n Rex-Rotary MP C5503 \n \n \n - \n Rex-Rotary MP C5503A \n \n \n - \n Rex-Rotary MP C6003 \n \n \n - \n Gestetner MP C4503 \n \n \n - \n Gestetner MP C4503A \n \n \n - \n Gestetner MP C5503 \n \n \n - \n Gestetner MP C5503A \n \n \n - \n Gestetner MP C6003 \n \n \n - \n infotec MP C4503 \n \n \n - \n infotec MP C4503A \n \n \n - \n infotec MP C5503 \n \n \n - \n infotec MP C5503A \n \n \n - \n infotec MP C6003 \n \n \n \n TOE security functionality \n Same as above.'}}} data.
  • 20.06.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'supplier': 'Ricoh Company, Ltd.'} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'C0046', 'supplier': 'Ricoh\n Company,\n Ltd.', 'toe_overseas_name': 'DataOverwriteSecurity Unit Type\n D Software\n V0.03', 'claim': 'EAL2', 'certification_date': '2006-03', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0046_it5060.html', 'toe_japan_name': 'DataOverwriteSecurity Unit Type C Software\n V0.03', 'enhanced': {'product': 'DataOverwriteSecurity Unit Type D Software', 'toe_version': 'V0.03', 'product_type': 'IT Product ( software to overwrite data )', 'certification_date': '2006-03-29', 'assurance_level': 'EAL2', 'vendor': 'RICOH COMPANY, LTD.', 'evaluation_facility': 'Electronic Commerce Security Technology Laboratory Inc.Evaluation Center', 'cert_link': 'https://www.ipa.go.jp/en/security/c0046_eimg.pdf', 'description': 'PRODUCT DESCRIPTION \n This product, an optional kit of safer use for Multi Function Product, overwrites the specified area on HDD with random data by Multi Function Product.'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2015-12-07', 'maintenance_title': 'DataOverwriteSecurity Unit Type H 1.02x', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/c0416kz_eacr4.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/c0416kz_est4.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 74cbd56c9d120e19c048ff01502f75f44a1a60a784cdec2ec0f489f7fe9c1355.
    • The st_txt_hash property was set to e9be374a4b352d9c6407341f121668af7997d17f1d68c81e272b0b0047ad5592.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 154078, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 24, '/Producer': 'GPL Ghostscript 9.06; modified using iText® 5.3.2 ©2000-2012 1T3XT BVBA (AGPL-version)', '/CreationDate': "D:20140131135638+09'00'", '/ModDate': "D:20140131135642+09'00'", '/Title': '', '/Creator': 'CubePDF', '/Author': '', '/Subject': '', '/Keywords': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FDP': {'FDP_SIP.1': 15, 'FDP_RIP': 5, 'FDP_RIP.1.1': 1, 'FDP_SIP': 1, 'FDP_SIP.1.1': 2}}, 'cc_claims': {'O': {'O.OVERWRITE': 8}, 'A': {'A.MODE': 8}, 'OE': {'OE.MODE': 6}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to c0416_est.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0416_est.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was set to None.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0416_erpt.pdf, code: 408'].
    • The st_pdf_hash property was set to 74cbd56c9d120e19c048ff01502f75f44a1a60a784cdec2ec0f489f7fe9c1355.
    • The st_txt_hash property was set to e9be374a4b352d9c6407341f121668af7997d17f1d68c81e272b0b0047ad5592.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 154078, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 24, '/Producer': 'GPL Ghostscript 9.06; modified using iText® 5.3.2 ©2000-2012 1T3XT BVBA (AGPL-version)', '/CreationDate': "D:20140131135638+09'00'", '/ModDate': "D:20140131135642+09'00'", '/Title': '', '/Creator': 'CubePDF', '/Author': '', '/Subject': '', '/Keywords': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FDP': {'FDP_SIP.1': 15, 'FDP_RIP': 5, 'FDP_RIP.1.1': 1, 'FDP_SIP': 1, 'FDP_SIP.1.1': 2}}, 'cc_claims': {'O': {'O.OVERWRITE': 8}, 'A': {'A.MODE': 8}, 'OE': {'OE.MODE': 6}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to c0416_est.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0416_est.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was set to None.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0416_erpt.pdf, code: nok'].
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'c0416_erpt.pdf', 'st_filename': 'c0416_est.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'JP': {'__update__': {'CRP-C0416-01': 1}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL3': 4}}}}, 'cc_claims': {'__update__': {'A': {'A.MODE': 2}}}} data.
    • The st_keywords property was updated, with the {'cc_claims': {'__update__': {'A': {'A.MODE': 8}, 'OE': {'OE.MODE': 6}}, '__delete__': ['T']}} data.

    The computed heuristics were updated.

    • The cert_id property was set to C0416.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2015-12-07', 'maintenance_title': 'DataOverwriteSecurity Unit Type H 1.02x', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/c0416kz_eacr4.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/c0416kz_est4.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0416-01': 48, 'Certification No. C0416': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.MODE.AUTOMATIC': 1, 'A.MODE.MANUAL': 1}}, 'vendor': {}, 'eval_facility': {'ECSEC': {'ECSEC Laboratory': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FDP': {'FDP_SIP.1': 15, 'FDP_RIP': 5, 'FDP_RIP.1.1': 1, 'FDP_SIP': 1, 'FDP_SIP.1.1': 2}}, 'cc_claims': {'O': {'O.OVERWRITE': 8}, 'T': {'T': 1}, 'A': {'A.MODE.AUTOMATIC': 4, 'A.MODE.MANUAL': 4}, 'OE': {'OE': 3, 'OE.MODE.AUTOMATIC': 3, 'OE.MODE.MANUAL': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'f05e1683f46cae1b43bb4c55004fa7520970d133164a0ea7b91f9696934cb03c', 'st_pdf_hash': '74cbd56c9d120e19c048ff01502f75f44a1a60a784cdec2ec0f489f7fe9c1355', 'report_txt_hash': '2ab5c20d17107d89623974a4c5179394b0ae6a3a40ed917d80cfd0f983a38044', 'st_txt_hash': 'e9be374a4b352d9c6407341f121668af7997d17f1d68c81e272b0b0047ad5592'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 173797, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 24, '/CreationDate': "D:20140204162613+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20140204162638+09'00'", '/Producer': 'Microsoft® Word 2010'}.
    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.02']}.
    • The cert_id property was set to CRP-C0416-01.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name imagio Security Card Type 7 (Japanese name), DataOverwriteSecurity Unit Type H (English name) Version: 1.02x was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "635749310390578b",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "cert_id": "C0416",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.02"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "C0416",
      "certification_date": "2013-11",
      "claim": "EAL3",
      "enhanced": {
        "assurance_level": "EAL3",
        "cc_version": "3.1 Release4",
        "cert_link": "https://www.ipa.go.jp/en/security/c0416_eimg.pdf",
        "certification_date": "2013-11-29",
        "description": "PRODUCT DESCRIPTION \n    Description of TOE \n    This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; \n     \n     \n       \n       - \n       RICOH MP C5503 \n       \n       \n       - \n       RICOH MP C4503 \n       \n       \n       - \n       RICOH MP C6003 \n       \n       \n       - \n       RICOH MP C5503A \n       \n       \n       - \n       RICOH MP C4503A \n       \n       \n       - \n       Ricoh MP C4503 \n       \n       \n       - \n       Ricoh MP C4503G \n       \n       \n       - \n       Ricoh MP C4503A \n       \n       \n       - \n       Ricoh MP C5503 \n       \n       \n       - \n       Ricoh MP C5503G \n       \n       \n       - \n       Ricoh MP C5503A \n       \n       \n       - \n       Ricoh MP C6003 \n       \n       \n       - \n       Ricoh MP C6003G \n       \n       \n       - \n       Savin MP C4503 \n       \n       \n       - \n       Savin MP C4503G \n       \n       \n       - \n       Savin MP C5503 \n       \n       \n       - \n       Savin MP C5503G \n       \n       \n       - \n       Savin MP C6003 \n       \n       \n       - \n       Savin MP C6003G \n       \n       \n       - \n       Lanier MP C4503 \n       \n       \n       - \n       Lanier MP C4503G \n       \n       \n       - \n       Lanier MP C5503 \n       \n       \n       - \n       Lanier MP C5503G \n       \n       \n       - \n       Lanier MP C6003 \n       \n       \n       - \n       Lanier MP C6003G \n       \n       \n       - \n       nashuatec MP C4503 \n       \n       \n       - \n       nashuatec MP C4503A \n       \n       \n       - \n       nashuatec MP C5503 \n       \n       \n       - \n       nashuatec MP C5503A \n       \n       \n       - \n       nashuatec MP C6003 \n       \n       \n       - \n       Rex-Rotary MP C4503 \n       \n       \n       - \n       Rex-Rotary MP C4503A \n       \n       \n       - \n       Rex-Rotary MP C5503 \n       \n       \n       - \n       Rex-Rotary MP C5503A \n       \n       \n       - \n       Rex-Rotary MP C6003 \n       \n       \n       - \n       Gestetner MP C4503 \n       \n       \n       - \n       Gestetner MP C4503A \n       \n       \n       - \n       Gestetner MP C5503 \n       \n       \n       - \n       Gestetner MP C5503A \n       \n       \n       - \n       Gestetner MP C6003 \n       \n       \n       - \n       infotec MP C4503 \n       \n       \n       - \n       infotec MP C4503A \n       \n       \n       - \n       infotec MP C5503 \n       \n       \n       - \n       infotec MP C5503A \n       \n       \n       - \n       infotec MP C6003 \n       \n     \n     \n    TOE security functionality \n    Same as above.",
        "evaluation_facility": "ECSEC Laboratory Inc. \n      Evaluation Center",
        "product": "imagio Security Card Type 7\n       (Japanese name)\n       DataOverwriteSecurity Unit Type H \n      (English name)",
        "product_type": "Software to overwrite data",
        "report_link": "https://www.ipa.go.jp/en/security/c0416_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0416_est.pdf",
        "toe_version": "1.02x",
        "vendor": "RICOH COMPANY, LTD."
      },
      "revalidations": [
        {
          "date": "2015-12",
          "link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0416_it3458_04.html"
        }
      ],
      "supplier": "RICOH COMPANY, LTD.",
      "toe_japan_name": "imagio Security Card Type 71.02x",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0416_it3458.html",
      "toe_overseas_name": "DataOverwriteSecurity Unit Type H\n                    1.02x"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2015-12-07",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0416kz_eacr4.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0416kz_est4.pdf",
        "maintenance_title": "DataOverwriteSecurity Unit Type H 1.02x"
      }
    ]
  },
  "manufacturer": "Ricoh Company, Ltd.",
  "manufacturer_web": "https://www.ricoh.com/",
  "name": "imagio Security Card Type 7 (Japanese name), DataOverwriteSecurity Unit Type H (English name) Version: 1.02x",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2013-11-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "report_filename": "c0416_erpt.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0416-01": 1,
          "Certification No. C0416": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.MODE": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL3": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "ECSEC": {
          "ECSEC Laboratory": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20140204162613+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20140204162638+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "pdf_file_size_bytes": 173797,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 24
    },
    "st_filename": "c0416_est.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.MODE": 8
        },
        "O": {
          "O.OVERWRITE": 8
        },
        "OE": {
          "OE.MODE": 6
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 3
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_RIP": 5,
          "FDP_RIP.1.1": 1,
          "FDP_SIP": 1,
          "FDP_SIP.1": 15,
          "FDP_SIP.1.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/CreationDate": "D:20140131135638+09\u002700\u0027",
      "/Creator": "CubePDF",
      "/Keywords": "",
      "/ModDate": "D:20140131135642+09\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.06; modified using iText\u00ae 5.3.2 \u00a92000-2012 1T3XT BVBA (AGPL-version)",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 154078,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0416_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0416_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "f05e1683f46cae1b43bb4c55004fa7520970d133164a0ea7b91f9696934cb03c",
    "report_txt_hash": "2ab5c20d17107d89623974a4c5179394b0ae6a3a40ed917d80cfd0f983a38044",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "74cbd56c9d120e19c048ff01502f75f44a1a60a784cdec2ec0f489f7fe9c1355",
    "st_txt_hash": "e9be374a4b352d9c6407341f121668af7997d17f1d68c81e272b0b0047ad5592"
  },
  "status": "archived"
}