Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
JISEC-CC-CRP-C0036
McAfee Endpoint Encryption for PC v5.2.6 with McAfee Endpoint Encryption Manager v5.2.6
CCEVS-VR-VID-10400-2011
name Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03 McAfee Endpoint Encryption for PC v5.2.6 with McAfee Endpoint Encryption Manager v5.2.6
category Other Devices and Systems Data Protection
scheme JP US
not_valid_after 07.10.2013 01.11.2014
not_valid_before 09.09.2005 17.10.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0036_ecvr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10400-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10400-st.pdf
manufacturer Canon Inc. McAfee, Inc.
manufacturer_web https://www.canon.com/ https://www.mcafee.com/
security_level EAL3 EAL4+, ALC_FLR.3
dgst 0b61e662b1de9f6c ee66687b54d71ea5
heuristics/cert_id JISEC-CC-CRP-C0036 CCEVS-VR-VID-10400-2011
heuristics/cert_lab [] US
heuristics/extracted_sars {} AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ATE_DPT.2, ALC_CMS.4, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, ADV_FSP.4, ATE_IND.2, ALC_LCD.1, ADV_ARC.1, ALC_FLR.3, ADV_TDS.3, AGD_OPE.1, AVA_VAN.3, ADV_IMP.1
heuristics/extracted_versions 2.03 5.2.6
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0386
  • certification_date: 01.04.2013
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP)
    • product_type: Multifunction Product
    • protection_profile: IEEE Std 2600.1-2009
    • toe_version: 1.0
    • vendor: Canon Inc.
  • expiration_date: 01.05.2018
  • supplier: Canon Inc.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0386_it2398.html
  • toe_japan_name: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP) 1.0
  • toe_overseas_link: None
  • toe_overseas_name: -----
  • category: Sensitive Data Protection
  • certification_date: 04.10.2011
  • evaluation_facility: COACT, Inc. Labs
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10400
  • product: McAfee Endpoint Encryption for PC v5.2.6 with McAfee Endpoint Encryption Manager v5.2.6
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10400
  • vendor: McAfee, LLC
pdf_data/report_filename c0036_ecvr.pdf st_vid10400-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10400-2011
    • cert_item: McAfee Endpoint Encryption for PC version 5.2.6 with McAfee Endpoint Encryption Manager version 5.2.6
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0036: 1
  • US:
    • CCEVS-VR-VID10400-2011: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 1
  • EAL:
    • EAL 4: 7
    • EAL 4 augmented: 1
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 4
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 7
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_metadata
  • /CreationDate: D:20060123172731+09'00'
  • /ModDate: D:20060123172731+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 14795
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/st_filename st_vid10400-st.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
    • EAL4+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 14
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 4
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 22
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 13
    • FAU_GEN.2.1: 2
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 13
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
    • FAU_STG.3: 13
    • FAU_STG.3.1: 2
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 10
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 31
    • FCS_COP.1.1: 4
  • FDP:
    • FDP_ACC.2: 11
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 13
    • FIA_UAU.2.1: 2
    • FIA_UAU.4: 23
    • FIA_UAU.4.1: 2
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 2
    • FIA_UID.2: 13
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 28
    • FMT_MTD.1.1: 4
    • FMT_MTD.2: 6
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_REV.1: 13
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SAE.1: 13
    • FMT_SAE.1.1: 2
    • FMT_SAE.1.2: 2
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_RCV.1: 5
    • FPT_RCV.1.1: 1
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
  • FRU:
    • FRU_FLT.1: 5
    • FRU_FLT.1.1: 1
  • FTA:
    • FTA_SSL.2: 5
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUTHENTICATION_DATA_PRIVATE: 5
    • A.AVAILABLE_BACKUP: 4
    • A.DOMAIN_SEPARATION: 4
    • A.MANAGEMENT: 5
    • A.NON_TECHNICAL_IDENTITY_VERIFICATION: 5
    • A.NO_MALEVOLENCE: 3
    • A.PROFICIENT_USERS: 6
    • A.SECURE_BACKUP: 4
    • A.TIME_SOURCE: 5
    • A.TRUSTED_SOFTWARE: 4
  • O:
    • O.ACCESS_CONTROL: 9
    • O.AUDIT: 14
    • O.AUTHORISATION: 18
    • O.AUTHORISED: 1
    • O.CRYPOTOGRAPHIC_KEYS: 3
    • O.CRYPTOGRAPHIC_KEYS: 8
    • O.CRYPTOGRAPHIC_OPERATIONS: 9
    • O.DATA_TRANSFER: 9
    • O.EASE_OF_USE_USER: 7
    • O.EFFECTIVE_ADMINISTRATION: 8
    • O.ENCRYPTED_MEDIA: 9
    • O.FAULT_TOLERANCE: 7
    • O.NO_OBJECT_REUSE: 9
    • O.PROTECT: 9
    • O.SECURE_RECOVERY: 7
    • O.TRUSTED_PATH: 9
    • O.UNATHORISED_MODIFICATION: 1
  • OE:
    • OE.AUTH: 6
    • OE.AVAILABLE_BACKUP: 6
    • OE.DOMAIN_SEPARATION: 4
    • OE.EASE_OF_USE_ADMIN: 8
    • OE.EASE_OF_USE_USER: 6
    • OE.MANAGED: 10
    • OE.NON_TECHNICAL_IDENTITY_VERIFICATION: 6
    • OE.SECURE_BACKUP: 6
    • OE.TIME_SOURCE: 9
    • OE.TRUSTED_SOFTWARE: 4
  • T:
    • T.ACCESS: 9
    • T.ALTERNATE_BOOT_PROCESS: 4
    • T.CONFIG: 3
    • T.CONFIG_MODIFICATION: 1
    • T.CORRUPT_AUDIT: 5
    • T.EASE_OF_USE_ADMIN: 4
    • T.EASE_OF_USE_USER: 4
    • T.EAVESDROP_TRANSIT: 4
    • T.OBJECT_REUSE: 5
    • T.PASSWORD_LOSS: 6
    • T.RECORD_ACTIONS: 7
    • T.RECOVERY_MASQUERADE: 5
    • T.RECOVERY_PROCEDURE_INTERCEPT: 3
    • T.REMOVE_DISK: 3
    • T.SPOOF: 5
    • T.SYSTEM_ACCESS: 9
    • T.UNAUTHORISED_MODIFICATION: 9
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 12
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 31
      • AES-256: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 9
    • DSA:
      • DSA: 19
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 13
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/st_keywords/crypto_protocol
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 3
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 186-2: 5
    • FIPS 197: 4
  • RFC:
    • RFC 2631: 2
    • RFC 2898: 3
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
pdf_data/st_metadata
  • /Author: Alan Gornall
  • /CreationDate: D:20111028152413
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20111028152413
  • /Producer: Microsoft® Office Word 2007
  • /Title: 1
  • pdf_file_size_bytes: 736993
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 60
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different