Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
JISEC-CC-CRP-C0036
Taiwan eID Applet PACE with CAM, CA and AA on ID-one V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N - Large Platform on NXP P6022M VB (version 03 00 00 00)
ANSSI-CC-2017/72
name Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03 Taiwan eID Applet PACE with CAM, CA and AA on ID-one V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N - Large Platform on NXP P6022M VB (version 03 00 00 00)
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 07.10.2013 14.02.2023
not_valid_before 09.09.2005 14.02.2018
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0036_ecvr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_72_idemia.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-2017_72.pdf
manufacturer Canon Inc. Oberthur Technologies / NXP Semiconductors GmbH
manufacturer_web https://www.canon.com/ https://www.oberthur.com/
security_level EAL3 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst 0b61e662b1de9f6c 7d3256f28fe32474
heuristics/cert_id JISEC-CC-CRP-C0036 ANSSI-CC-2017/72
heuristics/cert_lab [] CEA
heuristics/extracted_sars {} AGD_PRE.1, AVA_VAN.5, ADV_FSP.4, ALC_DVS.2, AGD_OPE.1, ADV_ARC.1, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ADV_IMP.1
heuristics/extracted_versions 2.03 8.1
heuristics/report_references/directly_referencing {} ANSSI-CC-2017/47, ANSSI-CC-2017/49, BSI-DSZ-CC-0955-V2-2016, ANSSI-CC-2010/03, BSI-DSZ-CC-0973-V2-2016
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2017/47, ANSSI-CC-2009/26, ANSSI-CC-2017/49, BSI-DSZ-CC-0955-2016, ANSSI-CC-2009/05, BSI-DSZ-CC-0955-V2-2016, ANSSI-CC-2009/06, BSI-DSZ-CC-0973-2016, ANSSI-CC-2010/03, BSI-DSZ-CC-0973-V2-2016
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0386
  • certification_date: 01.04.2013
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP)
    • product_type: Multifunction Product
    • protection_profile: IEEE Std 2600.1-2009
    • toe_version: 1.0
    • vendor: Canon Inc.
  • expiration_date: 01.05.2018
  • supplier: Canon Inc.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0386_it2398.html
  • toe_japan_name: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP) 1.0
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/st_references/directly_referencing {} ANSSI-CC-2017/48
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2017/48, BSI-DSZ-CC-0955-V2-2016
heuristics/protection_profiles {} 184ca3dbcac741fa
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-06fr.pdf
pdf_data/report_filename c0036_ecvr.pdf anssi-cc-2017_72_idemia.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2017/72
    • cert_item: Taiwan eID Applet PACE with CAM, CA and AA on ID- one V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N - Large Platform on NXP P6022M VB
    • cert_item_version: Version 03 00 00 00
    • cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: Chunghwa Telecom (CHT) N°99 Dianyan Road – Yangmei Distric, Taiwan Taoyuan City 32661, Taiwan IDEMIA (ex Oberthur Technologies) 420 rue d’Estienne d’Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire IDEMIA 420 rue d’Estienne d’Orves, 92700 Colombes, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: BSI-CC-PP-0068-V2-2011, [PP-PACE], version 1.0 Machine Readable Travel Document using Standard Inspection Procedure with PACE
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0036: 1
  • DE:
    • BSI-DSZ-CC-0955-V2-: 1
    • BSI-DSZ-CC-0955-V2-2016: 1
    • BSI-DSZ-CC-0973-V2-: 1
    • BSI-DSZ-CC-0973-V2-2016: 1
  • FR:
    • ANSSI-CC-2010/03: 1
    • ANSSI-CC-2010/03-M01: 1
    • ANSSI-CC-2017/47: 2
    • ANSSI-CC-2017/49: 1
    • ANSSI-CC-2017/72: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0068-V2-2011: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 1
    • EAL 7: 1
    • EAL2: 2
    • EAL5: 4
    • EAL5+: 1
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 4
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 6
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 10
  • NXP:
    • NXP: 50
    • NXP Semiconductors: 1
  • Oberthur:
    • OBERTHUR: 4
    • Oberthur Technologies: 1
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 28
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 34: 1
    • AIS34: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 1
pdf_data/report_metadata
  • /CreationDate: D:20060123172731+09'00'
  • /ModDate: D:20060123172731+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 14795
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Category: Référence, Version
  • /Comments: Développeur
  • /Company: SGDSN/ANSSI
  • /CreationDate: D:20180319145506+01'00'
  • /Creator: Acrobat PDFMaker 11 pour Word
  • /Keywords: ANSSI-CC-CER-F-07.026
  • /ModDate: D:20180319164954+01'00'
  • /Producer: Adobe PDF Library 11.0
  • /SourceModified: D:20180319135409
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 200918
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename st-2017_72.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0955-V2-: 2
    • BSI-DSZ-CC-0973-V2-: 4
  • FR:
    • ANSSI-CC-017/48: 1
    • ANSSI-CC-2017/49-M01: 1
    • ANSSi-CC-PP-2009/02: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL5: 6
    • EAL5+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 1
    • AGD_PRE: 5
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 10
  • ASE:
    • ASE_TSS.2: 3
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.3: 1
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 4
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 33
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 5
    • FCS_COP: 68
    • FCS_COP.1: 19
    • FCS_RND: 3
    • FCS_RND.1: 9
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC: 16
    • FDP_ACC.1: 3
    • FDP_ACC.2: 2
    • FDP_ACF: 16
    • FDP_ACF.1: 13
    • FDP_DAU: 5
    • FDP_DAU.1: 2
    • FDP_ITC: 14
    • FDP_ITC.1: 9
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_UCT: 15
    • FDP_UCT.1: 3
    • FDP_UIT: 17
    • FDP_UIT.1: 6
  • FIA:
    • FIA_AFL: 12
    • FIA_AFL.1: 4
    • FIA_API: 7
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_UAU: 87
    • FIA_UAU.1: 8
    • FIA_UAU.4: 4
    • FIA_UAU.5: 13
    • FIA_UAU.6: 3
    • FIA_UID: 21
    • FIA_UID.1: 8
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 12
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 11
    • FMT_LIM.2.1: 1
    • FMT_MOF: 5
    • FMT_MOF.1: 1
    • FMT_MTD: 73
    • FMT_MTD.1: 13
    • FMT_SMF: 2
    • FMT_SMF.1: 5
    • FMT_SMR: 9
    • FMT_SMR.1: 4
  • FPT:
    • FPT_EMS: 14
    • FPT_EMS.1: 22
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS: 1
    • FPT_FLS.1: 4
    • FPT_PHP: 1
    • FPT_PHP.3: 4
    • FPT_TST: 9
    • FPT_TST.1: 14
  • FTP:
    • FTP_ITC: 11
    • FTP_ITC.1: 6
pdf_data/st_keywords/cc_claims
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 4
  • Morpho:
    • Morpho: 1
  • NXP:
    • NXP: 7
    • NXP Semiconductors: 4
  • Oberthur:
    • Oberthur: 3
    • Oberthur Technologies: 14
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
      • AES-256: 1
      • AES128: 1
  • DES:
    • 3DES:
      • 3DES: 16
      • TDES: 1
      • Triple-DES: 1
    • DES:
      • DES: 7
  • constructions:
    • MAC:
      • CMAC: 12
      • KMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • DH: 8
      • Diffie-Hellman: 4
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 6
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA2: 2
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 11
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 146
pdf_data/st_keywords/randomness
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 16
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 4
  • SCA:
    • DPA: 1
    • physical probing: 3
  • other:
    • JIL: 1
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 6
    • EF.DG1: 9
    • EF.DG14: 4
    • EF.DG15: 2
    • EF.DG16: 7
    • EF.DG2: 5
    • EF.DG3: 5
    • EF.DG4: 5
    • EF.DG5: 2
    • EF.SOD: 6
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 2
  • FIPS:
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-3: 1
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
    • FIPS PUB 81: 1
  • ICAO:
    • ICAO: 14
  • ISO:
    • ISO/IEC 11770-2: 2
    • ISO/IEC 14443: 6
    • ISO/IEC 15946-1: 1
    • ISO/IEC 15946-2: 1
    • ISO/IEC 18013-3: 1
    • ISO/IEC 7816-3: 2
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9796-1: 1
    • ISO/IEC 9796-2: 1
    • ISO/IEC 9797-1: 3
  • PKCS:
    • PKCS#1: 3
    • PKCS#3: 4
  • RFC:
    • RFC3369: 1
  • SCP:
    • SCP02: 1
    • SCP03: 1
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
pdf_data/st_metadata
  • /CreationDate: D:20180208105536+01'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20180319164937+01'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1834260
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 92
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different