Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
JISEC-CC-CRP-C0036
ST31G480 E01, including optional cryptographic library NesLib NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X
ANSSI-CC-2019/13
name Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03 ST31G480 E01, including optional cryptographic library NesLib NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
status archived active
not_valid_after 07.10.2013 18.07.2027
not_valid_before 09.09.2005 05.03.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2019_13-s03.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0036_ecvr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_13fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_13en.pdf
manufacturer Canon Inc. STMicroelectronics
manufacturer_web https://www.canon.com/ https://www.st.com/
security_level EAL3 ADV_IMP.2, ALC_FLR.1, ALC_CMC.5, EAL5+, AVA_VAN.5, ASE_TSS.2, ALC_TAT.3, ADV_TDS.5, ALC_DVS.2
dgst 0b61e662b1de9f6c d443ad6517b187a0
heuristics/cert_id JISEC-CC-CRP-C0036 ANSSI-CC-2019/13
heuristics/cert_lab [] SERMA
heuristics/extracted_sars {} ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ATE_COV.2, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 2.03 -
heuristics/report_references/directly_referencing {} ANSSI-CC-2019/12
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2019/12
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0386
  • certification_date: 01.04.2013
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP)
    • product_type: Multifunction Product
    • protection_profile: IEEE Std 2600.1-2009
    • toe_version: 1.0
    • vendor: Canon Inc.
  • expiration_date: 01.05.2018
  • supplier: Canon Inc.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0386_it2398.html
  • toe_japan_name: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP) 1.0
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles {} cf0f01bcd7be3e9c
maintenance_updates


protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename certificat-cc-2019_13-s03.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2019/13-S03: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_IMP.2: 1
    • ADV_TDS.5: 1
  • ALC:
    • ALC_CMC.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/report_filename c0036_ecvr.pdf anssi-cc-2019_13fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ADV_IMP.2, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ASE_TSS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2019/13
    • cert_item: ST31G480 including optional cryptographic library NESLIB v6.2.1, optional technologies MIFARE DESFire EV1 v4.8.12 and MIFARE Plus X v2.4.6
    • cert_item_version: E01
    • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
    • developer: STMicroelectronics 190 avenue Célestin Coq, ZI de Rousset, 13106 Rousset Cedex, France Commanditaire STMicroelectronics 190 avenue Célestin Coq, ZI de Rousset, 13106 Rousset Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0036: 1
  • FR:
    • ANSSI-CC-2019/12: 2
    • ANSSI-CC-2019/13: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 2
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
    • ADV_TDS.5: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 2
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 2
    • ALC_LCD: 1
    • ALC_TAT: 1
    • ALC_TAT.3: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STM: 10
    • STMicroelectronics: 3
pdf_data/report_keywords/eval_facility
  • Serma:
    • SERMA: 2
    • Serma Safety & Security: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 2
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NESLIB v6.2.1: 21
    • NesLib 6.2: 2
    • NesLib v6.2.1: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 31: 1
    • AIS31: 4
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_metadata
  • /CreationDate: D:20060123172731+09'00'
  • /ModDate: D:20060123172731+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 14795
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: CHERGUI Yoan
  • /CreationDate: D:20190308153153+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.28.1
  • /ModDate: D:20190308153153+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: ST31G480 E01 including optional cryptographic library NESLIB v6.2.1, optional technologies MIFARE DESFire EV1 v4.8.12 and MIFARE Plus X v2.4.6
  • /Title: ANSSI-CC-2019/13
  • pdf_file_size_bytes: 544471
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename anssi-cible-cc-2019_13en.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 10
    • BSI-CC-PP-0084-: 3
    • BSI-CC-PP-0084-2014: 75
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL5: 15
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 2
    • ADV_FSP: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.2: 4
    • ADV_INT.2: 1
    • ADV_SPM: 1
    • ADV_TDS.5: 4
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 4
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_FLR.1: 6
    • ALC_LCD.1: 1
    • ALC_TAT.3: 4
  • ASE:
    • ASE_CCL: 4
    • ASE_CCL.1: 1
    • ASE_ECD: 3
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 2
    • ASE_OBJ: 26
    • ASE_OBJ.2: 1
    • ASE_REQ: 61
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 13
    • ASE_SPD.1: 1
    • ASE_TSS: 16
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV: 3
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 8
    • FAU_SAR.1: 25
    • FAU_SAS: 2
    • FAU_SAS.1: 28
  • FCS:
    • FCS_CKM.1: 22
    • FCS_CKM.4: 22
    • FCS_COP.1: 53
    • FCS_RNG: 2
    • FCS_RNG.1: 8
  • FDP:
    • FDP_ACC.1: 68
    • FDP_ACC.2: 12
    • FDP_ACF: 1
    • FDP_ACF.1: 67
    • FDP_CKM.2: 1
    • FDP_IFC.1: 22
    • FDP_ITC.1: 5
    • FDP_ITC.2: 24
    • FDP_ITT.1: 10
    • FDP_RIP.1: 18
    • FDP_ROL.1: 9
    • FDP_SDC: 2
    • FDP_SDC.1: 8
    • FDP_SDI.2: 14
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
    • FDP_UCT.1: 16
    • FDP_UIT.1: 16
  • FIA:
    • FIA_API: 2
    • FIA_API.1: 6
    • FIA_UAU.1: 14
    • FIA_UAU.2: 18
    • FIA_UAU.5: 19
    • FIA_UID.1: 20
    • FIA_UID.2: 22
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 29
    • FMT_LIM.2: 30
    • FMT_MSA.1: 50
    • FMT_MSA.3: 63
    • FMT_MTD.1: 18
    • FMT_SMF.1: 43
    • FMT_SMR.1: 45
  • FPR:
    • FPR_UNL.1: 18
  • FPT:
    • FPT_FLS.1: 28
    • FPT_ITT.1: 9
    • FPT_PHP.3: 11
    • FPT_RPL.1: 22
    • FPT_TDC.1: 20
    • FPT_TRP.1: 17
  • FRU:
    • FRU_FLT.2: 13
    • FRU_RSA.2: 18
  • FTP:
    • FTP_ITC.1: 29
    • FTP_TRP.1: 13
    • FTP_TRP.1.3: 5
pdf_data/st_keywords/cc_claims
  • O:
    • O.C: 2
    • O.MAC-: 1
    • O.RND: 4
    • O.TOE-: 1
  • R:
    • R.O: 2
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • NXP:
    • NXP: 2
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 25
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 48
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 11
      • Triple-DES: 1
    • DES:
      • DES: 22
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 4
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 4
    • EdDSA:
      • EdDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 11
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • Keccak:
    • Keccak: 14
  • SHA:
    • SHA1:
      • SHA-1: 14
    • SHA2:
      • SHA-2: 3
      • SHA-224: 5
      • SHA-256: 8
      • SHA-384: 8
      • SHA-512: 7
    • SHA3:
      • SHA-3: 4
      • SHA3-224: 4
      • SHA3-256: 4
      • SHA3-384: 4
      • SHA3-512: 4
  • SHAKE:
    • SHAKE128: 4
    • SHAKE256: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 15
pdf_data/st_keywords/crypto_protocol
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 10
  • RNG:
    • RND: 7
    • RNG: 6
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 8
  • CCM:
    • CCM: 3
  • ECB:
    • ECB: 7
  • GCM:
    • GCM: 3
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 3
    • Nescrypt: 8
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib 6.2: 2
    • NesLib 6.2.1: 2
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 13
    • malfunction: 6
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 14
    • Physical Probing: 4
    • physical probing: 3
    • side channel: 10
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 67
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS PUB 140-2: 5
    • FIPS PUB 180-2: 5
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 4
    • FIPS PUB 198-1: 3
    • FIPS PUB 202: 6
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 14888: 2
    • ISO/IEC 18092: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9796: 1
    • ISO/IEC 9796-2: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38B: 2
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-56A: 3
    • NIST SP 800-67: 3
    • NIST SP 800-90: 4
    • SP 800-38A: 3
    • SP 800-38C: 1
    • SP 800-38D: 1
    • SP 800-67: 1
    • SP 800-90A: 1
  • PKCS:
    • PKCS #1: 6
    • PKCS1: 1
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib, MIFARE DESFire EV1, and MIFARE Plus X when they are embedded: 1
    • The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib, MIFARE DESFire EV1, and MIFARE Plus X when they are embedded. 1.6: 1
    • out of scope: 1
pdf_data/st_metadata
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different