Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
JISEC-CC-CRP-C0036
Belden Hirschmann IT MTS Series Ethernet Switchesv9.7.202.3 (for box switch), v9.7.202.3 (for chassis switch)
CSA_CC_21001
name Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03 Belden Hirschmann IT MTS Series Ethernet Switchesv9.7.202.3 (for box switch), v9.7.202.3 (for chassis switch)
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme JP SG
status archived active
not_valid_after 07.10.2013 20.04.2028
not_valid_before 09.09.2005 20.04.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20Belden%20Hirschmann%20IT%20MTS%20Series%20CC%20Certificate.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0036_ecvr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20Belden%20Hirschmann%20IT%20MTS%20Series%20Certificate%20Report.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[DD]%20MTS_Security%20target%20v2.4.pdf
manufacturer Canon Inc. Belden Hirschmann Industries (Suzhou) Ltd
manufacturer_web https://www.canon.com/ https://hirschmann.com/en/index.phtml
security_level EAL3 EAL2+, ALC_FLR.2
dgst 0b61e662b1de9f6c 3dc6ace2d6cd57c2
heuristics/cert_id JISEC-CC-CRP-C0036 CSA_CC_21001
heuristics/extracted_sars {} ALC_FLR.2
heuristics/extracted_versions 2.03 9.7.202.3
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0386
  • certification_date: 01.04.2013
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP)
    • product_type: Multifunction Product
    • protection_profile: IEEE Std 2600.1-2009
    • toe_version: 1.0
    • vendor: Canon Inc.
  • expiration_date: 01.05.2018
  • supplier: Canon Inc.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0386_it2398.html
  • toe_japan_name: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP) 1.0
  • toe_overseas_link: None
  • toe_overseas_name: -----
pdf_data/cert_filename [CER] Belden Hirschmann IT MTS Series CC Certificate.pdf
pdf_data/cert_keywords/cc_cert_id
  • SG:
    • CSA_CC_21001: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • An:
    • An Security: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20230426100527+08'00'
  • /MSIP_Label_770f46e1-5fba-47ae-991f-a0785d9c0dac_ActionId: 54b26a1c-fca1-4a7a-a092-cf9c35c709b2
  • /MSIP_Label_770f46e1-5fba-47ae-991f-a0785d9c0dac_ContentBits: 0
  • /MSIP_Label_770f46e1-5fba-47ae-991f-a0785d9c0dac_Enabled: true
  • /MSIP_Label_770f46e1-5fba-47ae-991f-a0785d9c0dac_Method: Privileged
  • /MSIP_Label_770f46e1-5fba-47ae-991f-a0785d9c0dac_Name: Sensitive Normal_1
  • /MSIP_Label_770f46e1-5fba-47ae-991f-a0785d9c0dac_SetDate: 2023-04-26T09:15:22Z
  • /MSIP_Label_770f46e1-5fba-47ae-991f-a0785d9c0dac_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /ModDate: D:20230426100527+08'00'
  • pdf_file_size_bytes: 372107
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0036_ecvr.pdf [CER] Belden Hirschmann IT MTS Series Certificate Report.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0036: 1
  • SG:
    • CSA_CC_21001: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 1
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/report_keywords/eval_facility
  • An:
    • An Security: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_metadata
  • /CreationDate: D:20060123172731+09'00'
  • /ModDate: D:20060123172731+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 14795
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/st_filename [DD] MTS_Security target v2.4.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 4
    • FAU_STG.3.1: 2
  • FCS:
    • FCS_CKM: 17
    • FCS_CKM.1: 11
    • FCS_CKM.2: 6
    • FCS_CKM.4: 20
    • FCS_CKM.4.1: 1
    • FCS_COP: 12
    • FCS_COP.1: 9
  • FDP:
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 10
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 5
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 4
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 1
    • FMT_MSA.3: 10
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FTA:
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_TSE.1: 5
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NOEVIL: 2
pdf_data/st_keywords/vendor
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
pdf_data/st_keywords/asymmetric_crypto
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 7
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 21
    • SSHv2: 3
pdf_data/st_keywords/randomness
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 1
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 197: 1
  • RFC:
    • RFC 2104: 1
    • RFC 4253: 1
    • RFC 4344: 1
    • RFC 4716: 2
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
pdf_data/st_metadata
  • /Author: Belden Hirschmann © 2020
  • /CreationDate: D:20230411152414+08'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_ActionId: 14c29ab4-45a5-47eb-906a-0d5a47261c5c
  • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_ContentBits: 0
  • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_Enabled: true
  • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_Method: Privileged
  • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_Name: Official (Open)
  • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_SetDate: 2023-04-27T08:44:35Z
  • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /ModDate: D:20230426095156+08'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: security target for MTS serial switch v2.2
  • pdf_file_size_bytes: 683425
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 43
state/cert/convert_garbage False True
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/convert_garbage False True
state/report/extract_ok True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different