Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
JISEC-CC-CRP-C0036
CypherNET Ethernet Encryptor (2.0.0), CypherNET Fibre Channel Encryptor (2.0.0), CypherStream Ethernet Encryptor (1.0.6) and CypherManager (6.5.0)
Certificate Number: 2009/62
name Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03 CypherNET Ethernet Encryptor (2.0.0), CypherNET Fibre Channel Encryptor (2.0.0), CypherStream Ethernet Encryptor (1.0.6) and CypherManager (6.5.0)
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme JP AU
not_valid_after 07.10.2013 01.09.2019
not_valid_before 09.09.2005 26.10.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0036_ecvr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles//2009-62_Certification_report_for_Senetas_Encryptor_Range.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CypherNet_Security_Target_v200_for_distribution.pdf
manufacturer Canon Inc. Senetas Corporation Ltd, Distributed by Thales SA (SafeNet)
manufacturer_web https://www.canon.com/ https://www.senetas.com/
security_level EAL3 EAL4+, ALC_FLR.2
dgst 0b61e662b1de9f6c 509da579c95aaf73
heuristics/cert_id JISEC-CC-CRP-C0036 Certificate Number: 2009/62
heuristics/extracted_sars {} ALC_FLR.2
heuristics/extracted_versions 2.03 6.5.0, 2.0.0, 1.0.6
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0386
  • certification_date: 01.04.2013
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP)
    • product_type: Multifunction Product
    • protection_profile: IEEE Std 2600.1-2009
    • toe_version: 1.0
    • vendor: Canon Inc.
  • expiration_date: 01.05.2018
  • supplier: Canon Inc.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0386_it2398.html
  • toe_japan_name: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP) 1.0
  • toe_overseas_link: None
  • toe_overseas_name: -----
pdf_data/report_filename c0036_ecvr.pdf 2009-62_Certification_report_for_Senetas_Encryptor_Range.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0036: 1
  • AU:
    • Certificate Number: 2009/62: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 1
  • EAL:
    • EAL 4+: 1
    • EAL4: 4
    • EAL4 augmented: 2
    • EAL4+: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 2
  • X509:
    • X.509: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • onto the applicable encryptor model; and a single version of CypherManager software (6.5.0). The out of scope Quantum Key Distribution System was connected to ensure no adverse effects on the CypherNET: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20060123172731+09'00'
  • /ModDate: D:20060123172731+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 14795
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: terence.caulfield
  • /CreationDate: D:20091102114851+11'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20091102114851+11'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - 2009-62 Certification report for Senetas Encryptor Range 26 Oct 2009.doc
  • pdf_file_size_bytes: 67756
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename CypherNet_Security_Target_v200_for_distribution.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 3
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 1
    • FAU_GEN.1.1: 5
    • FAU_GEN.1.2: 4
    • FAU_SAR: 1
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 4
    • FAU_SAR.1.2: 4
  • FCS:
    • FCS_CKM: 5
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 17
    • FCS_CKM.2: 1
    • FCS_CKM.2.1: 6
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 4
    • FCS_CKMA: 2
    • FCS_COP: 3
    • FCS_COP.1: 13
    • FCS_COP.1.1: 30
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 4
    • FDP_ACC.1.1: 3
    • FDP_ACF: 1
    • FDP_ACF.1: 4
    • FDP_ACF.1.1: 6
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 4
    • FDP_DAU: 2
    • FDP_DAU.1: 1
    • FDP_DAU.1.1: 5
    • FDP_DAU.1.2: 4
    • FDP_IFC: 1
    • FDP_IFC.1: 6
    • FDP_IFC.1.1: 4
    • FDP_IFF.1: 2
    • FDP_IFF.1.1: 8
    • FDP_IFF.1.2: 5
    • FDP_IFF.1.3: 4
    • FDP_IFF.1.4: 5
    • FDP_IFF.1.5: 5
    • FDP_IFF.1.6: 1
    • FDP_UCT: 2
    • FDP_UCT.1: 2
    • FDP_UCT.1.1: 4
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 1
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 3
    • FIA_UAU: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 2
    • FIA_UAU.2.1: 4
    • FIA_UID: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 1
    • FIA_UID.2.1: 3
  • FMT:
    • FMT_MID.1.1: 2
    • FMT_MSA: 3
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 9
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 6
    • FMT_MSA.3.2: 8
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 2
    • FMT_SMEF.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 4
    • FMT_SMR: 5
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_FLS.1: 3
    • FPT_FLS.1.1: 3
    • FPT_IST.1.1: 1
    • FPT_IST.1.3: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 1
    • FPT_ITT.1.4: 1
    • FPT_LTST.1.2: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 6
    • FPT_STM.1: 5
    • FPT_STM.1.1: 3
    • FPT_TST: 1
    • FPT_TST.1: 2
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 4
    • FPT_TST.1.3: 3
  • FTA:
    • FTA_SSL.3: 2
    • FTA_SSL.3.1: 4
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 2
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.AUDIT: 2
    • A.CERBERIS: 3
    • A.CYPHERMANAGER: 2
    • A.INSTALL: 3
    • A.LOCATE: 3
    • A.PRIVATEKEY: 2
  • O:
    • O.ADMIN: 10
    • O.AUDIT: 9
    • O.AUDITLOG: 8
    • O.AUTHDATA: 6
    • O.CERBERISMGT: 3
    • O.CERTGEN: 8
    • O.CONNECT: 3
    • O.ENCRYPT: 8
    • O.FAILSAFE: 7
    • O.IDENT: 7
    • O.INFOFLOW: 8
    • O.INSTALL: 5
    • O.KEYMAN: 13
    • O.PERSONNEL: 5
    • O.PHYSICAL: 5
    • O.REMOTEMGT: 6
    • O.ROLEMGT: 6
    • O.ROLES: 7
    • O.TAMPER: 6
  • T:
    • T.ABUSE: 3
    • T.ATTACK: 3
    • T.CAPTURE: 3
    • T.CONNECT: 3
    • T.IMPERSON: 3
    • T.LINK: 3
    • T.MAL: 3
    • T.OBSERVE: 3
    • T.PHYSICAL: 3
    • T.PRIVILEGE: 3
pdf_data/st_keywords/vendor
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 21
  • DES:
    • 3DES:
      • 3DES: 3
    • DES:
      • DES: 7
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 4
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
pdf_data/st_keywords/randomness
pdf_data/st_keywords/cipher_mode
  • CFB:
    • CFB: 6
  • CTR:
    • CTR: 1
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 3
    • FIPS PUB 140-2: 5
    • FIPS PUB 180-1: 1
    • FIPS PUB 186-2: 3
    • FIPS PUB 197: 1
    • FIPS PUB 81: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS #3: 2
    • PKCS 12: 1
    • PKCS#1: 2
  • RFC:
    • RFC 2459: 1
    • RFC 2574: 1
    • RFC2574: 1
  • X509:
    • X.509: 39
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
pdf_data/st_metadata
  • /CreationDate: D:20091105093401
  • /Creator: ESP Ghostscript 81502 (pswrite)
  • /ModDate: D:20091105093401
  • /Producer: ESP Ghostscript 815.02
  • pdf_file_size_bytes: 2127676
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_garbage False True
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different