Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
JISEC-CC-CRP-C0036
NEC Group Secure Information Exchange Site Version 1.0
JISEC-CC-CRP-C0156
name Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03 NEC Group Secure Information Exchange Site Version 1.0
not_valid_before 09.09.2005 25.04.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0036_ecvr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0156_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0156_est.pdf
manufacturer Canon Inc. NEC Corporation
manufacturer_web https://www.canon.com/ https://www.nec.com/
security_level EAL3 ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+
dgst 0b61e662b1de9f6c 73d5a894fa2ec94b
heuristics/cert_id JISEC-CC-CRP-C0036 JISEC-CC-CRP-C0156
heuristics/extracted_sars {} ASE_OBJ.2, ASE_SPD.1, ASE_REQ.2
heuristics/extracted_versions 2.03 1.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0386
  • certification_date: 01.04.2013
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP)
    • product_type: Multifunction Product
    • protection_profile: IEEE Std 2600.1-2009
    • toe_version: 1.0
    • vendor: Canon Inc.
  • expiration_date: 01.05.2018
  • supplier: Canon Inc.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0386_it2398.html
  • toe_japan_name: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP) 1.0
  • toe_overseas_link: None
  • toe_overseas_name: -----
  • cert_id: JISEC-CC-CRP-C0156
  • certification_date: 01.04.2008
  • claim: EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
  • enhanced:
    • assurance_level: EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. The TOE provides the following service functions: - Upload - Download - Area Maintenance - User Maintenance - Set Personal Information - Administration As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. TOE security functions [Identification and Authentication] A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: NEC Group Secure Information Exchange Site
    • product_type: Secure Information Exchange System
    • report_link: https://www.ipa.go.jp/en/security/c0156_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0156_est.pdf
    • toe_version: 1.0
    • vendor: NEC Corporation
  • expiration_date: 01.10.2013
  • supplier: NEC Corporation
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html
  • toe_japan_name: NEC Group Secure Information Exchange Site 1.0
  • toe_overseas_link: None
  • toe_overseas_name: -----
pdf_data/report_filename c0036_ecvr.pdf c0156_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0036: 1
  • JP:
    • CRP-C0156-01: 1
    • Certification No. C0156: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 1
  • EAL:
    • EAL1: 3
    • EAL1 augmented: 2
pdf_data/report_keywords/cc_sar
  • ASE:
    • ASE_OBJ.2: 3
    • ASE_REQ.2: 3
    • ASE_SPD.1: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINISTRATOR: 1
    • A.AUDIT_ADMIN: 1
    • A.NETWORK: 1
    • A.SYSTEM_ADMIN: 1
  • T:
    • T.ILLEGAL_ACCESS: 1
    • T.MISDELIVERY: 1
    • T.SPOOFING: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 16
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2006-09-002: 2
    • CCMB-2006-09-003: 2
    • CCMB-2006-09-004: 2
pdf_data/report_metadata
  • /CreationDate: D:20060123172731+09'00'
  • /ModDate: D:20060123172731+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 14795
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20080807163541+09'00'
  • /ModDate: D:20080807163541+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 320841
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename c0156_est.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 1
    • EAL1+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_OBJ.2: 2
    • ASE_REQ: 1
    • ASE_REQ.2: 2
    • ASE_SPD: 1
    • ASE_SPD.1: 2
    • ASE_TSS: 1
  • ATE:
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL: 18
    • FIA_AFL.1: 4
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS: 21
    • FIA_SOS.2: 4
    • FIA_UAU: 1
    • FIA_UAU.1: 8
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID: 29
    • FIA_UID.1: 7
    • FIA_UID.2: 4
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 27
    • FMT_MSA.1: 16
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_SAE.1: 14
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 26
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
  • FTP:
    • FTP_ITC: 1
    • FTP_TRP: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMINISTRATOR: 5
    • A.AUDIT_ADMIN: 4
    • A.DATACENTER: 4
    • A.NETWORK: 3
    • A.SYSTEM_ADMIN: 2
    • A.SYSTEM_ADNIN: 1
  • O:
    • O.ACCESS_CONTROL: 8
    • O.ADMIN_IDENTIFY: 7
    • O.AUDIT: 12
    • O.ENCRYPT: 8
    • O.IDENTIFY: 8
  • OE:
    • OE.ADMIN_TRAINING: 9
    • OE.AUDIT_ADMIN: 4
    • OE.AUTHENTICATION: 5
    • OE.DATACENTER: 4
    • OE.NETWORK: 4
    • OE.OS_TIMESTAMP: 9
    • OE.SEND_PIN: 5
    • OE.SYSTEM_ADMIN: 4
    • OE.TRUSTED_ROLE: 4
  • T:
    • T.ILLEGAL_ACCESS: 2
    • T.LISTEN-IN_NW_DATA: 3
    • T.MISDELIVERY: 2
    • T.SPOOFING: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 16
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
pdf_data/st_keywords/asymmetric_crypto
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
pdf_data/st_keywords/crypto_scheme
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 11
pdf_data/st_keywords/randomness
pdf_data/st_keywords/cipher_mode
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2006-09-002: 2
    • CCMB-2006-09-003: 2
    • CCMB-2006-09-004: 2
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
pdf_data/st_metadata
  • /CreationDate: D:20080807135828+09'00'
  • /ModDate: D:20080807135828+09'00'
  • /Producer: SkyPDF Pro Driver Version 3.03.0100.00
  • pdf_file_size_bytes: 491338
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 72
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different