Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
JISEC-CC-CRP-C0036
IDMotion V2 Multos Virtual Machine OS Multos V4.5.2, AMD version 0151v001
ANSSI-CC-2018/50
name Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03 IDMotion V2 Multos Virtual Machine OS Multos V4.5.2, AMD version 0151v001
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 07.10.2013 14.12.2023
not_valid_before 09.09.2005 14.12.2018
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0036_ecvr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_50fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_50en.pdf
manufacturer Canon Inc. Gemalto / Trusted Labs
manufacturer_web https://www.canon.com/ https://www.gemalto.com
security_level EAL3 EAL7
dgst 0b61e662b1de9f6c efb9f87dde709ef7
heuristics/cert_id JISEC-CC-CRP-C0036 ANSSI-CC-2018/50
heuristics/cert_lab [] THALES
heuristics/extracted_sars {} ADV_TAT.3, ALC_LCD.2, ATE_DPT.4, ADV_INT.3, ADV_LCD.2, AVA_VAN.5, ADV_FSP.6, ALC_CMS.1, ALC_DVS.2, ALC_TAT.3, ATE_FUN.2, ADV_ARC.1, ADV_CMC.5, ADV_IMP.2, ALC_CMC.5, ADV_TDS.6, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 2.03 4.5.2
heuristics/report_references/directly_referencing {} ANSSI-CC-2018/35, BSI-DSZ-CC-0945-2017
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2018/35, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0386
  • certification_date: 01.04.2013
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP)
    • product_type: Multifunction Product
    • protection_profile: IEEE Std 2600.1-2009
    • toe_version: 1.0
    • vendor: Canon Inc.
  • expiration_date: 01.05.2018
  • supplier: Canon Inc.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0386_it2398.html
  • toe_japan_name: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP) 1.0
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0945-2017
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0945-2017
pdf_data/report_filename c0036_ecvr.pdf anssi-cc-2018_50fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 7
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2018/50
    • cert_item: IDMotion V2 Multos Virtual Machine
    • cert_item_version: OS version Multos V4.5.2 AMD version 0151v001
    • cert_lab: THALES (TCS – CNES) 290 allée du Lac, 31670 Labège, France
    • developer: Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat Trusted Labs 6, rue de la Verrerie – CS20001, 92197 Meudon Cedex Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg Commanditaire Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Néant
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0036: 1
  • DE:
    • BSI-DSZ-CC-0945-2017: 1
  • FR:
    • ANSSI-CC-2018/35: 2
    • ANSSI-CC-2018/50: 15
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 4
    • EAL2: 2
    • EAL7: 3
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 2
  • Infineon:
    • Infineon Technologies AG: 2
pdf_data/report_keywords/eval_facility
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_metadata
  • /CreationDate: D:20060123172731+09'00'
  • /ModDate: D:20060123172731+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 14795
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20181219113402+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.028
  • /ModDate: D:20181219115454+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 749242
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename anssi-cible-cc-2018_50en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0945-2017: 1
  • NL:
    • CC-1: 1
    • CC-2: 1
    • CC-3: 1
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL5: 3
    • EAL5+: 1
    • EAL7: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_CMC.5: 4
    • ADV_FSP.2: 1
    • ADV_FSP.6: 3
    • ADV_IMP.1: 3
    • ADV_IMP.2: 2
    • ADV_INT.3: 3
    • ADV_LCD.2: 1
    • ADV_SPM.1: 5
    • ADV_TAT.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.6: 3
  • ALC:
    • ALC_CMC.5: 2
    • ALC_CMS.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 5
    • ALC_LCD.1: 1
    • ALC_LCD.2: 5
    • ALC_TAT.3: 5
  • ATE:
    • ATE_COV.1: 1
    • ATE_COV.3: 3
    • ATE_DPT.4: 3
    • ATE_FUN.1: 2
    • ATE_FUN.2: 3
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ACC.2: 1
    • FAU_ARP: 3
    • FAU_ARP.1: 6
    • FAU_ARP.1.1: 4
    • FAU_GEN.1: 4
    • FAU_SAA: 3
    • FAU_SAA.1: 10
    • FAU_SAA.1.1: 2
    • FAU_SAA.1.2: 3
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_COP: 5
    • FCS_RNG: 4
  • FDP:
    • FDP_ACC: 5
    • FDP_ACC.1: 4
    • FDP_ACC.2: 13
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 1
    • FDP_ACF: 4
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
    • FDP_ROL: 3
    • FDP_ROL.1: 5
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
    • FDP_SDC.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_API.1: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.2: 1
    • FMT_MSA.1: 3
    • FMT_MSA.3: 3
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS: 4
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 2
    • FPT_PHP.3: 1
    • FPT_RCV: 3
    • FPT_RCV.4: 7
    • FPT_RCV.4.1: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
    • FRU_RSA: 3
    • FRU_RSA.1: 6
    • FRU_RSA.1.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLI_CONT: 9
    • A.CIPHER: 3
    • A.CLON: 3
    • A.DECIPHER: 3
    • A.DIS_MEMORY: 3
    • A.LOAD: 3
    • A.MOD_MEMORY: 3
    • A.OPERATE: 3
    • A.REMOVE: 3
    • A.SECURITY: 3
    • A.SIDE: 3
    • A.TAMPER_ES: 3
  • O:
    • O.AES: 1
    • O.APPLI_DEV: 12
    • O.CIPHER: 3
    • O.CLON: 2
    • O.DECIPHER: 4
    • O.DEV_DIS_ES: 13
    • O.DIS: 1
    • O.DIS_MEMORY: 2
    • O.DLV_: 7
    • O.DLV_AUDIT: 1
    • O.DLV_DATA: 6
    • O.EFECT_REMOVE: 1
    • O.EFFECT_L: 1
    • O.EFFECT_LOAD: 5
    • O.EFFECT_R: 1
    • O.EFFECT_REMOVE: 3
    • O.FLAW: 1
    • O.INIT_A: 2
    • O.INIT_ACS: 7
    • O.LOAD: 8
    • O.MOD_MEMORY: 1
    • O.OPERATE: 1
    • O.REMOVE: 6
    • O.RESOURCE: 4
    • O.RESOURCES: 1
    • O.RND: 1
    • O.ROLLBACK: 5
    • O.SAMPLES_ACS: 1
    • O.SAMPLE_ACS: 4
    • O.SECURITY: 5
    • O.SEGREGATE: 5
    • O.SIDE: 6
    • O.TAMPER_ES: 17
    • O.TEST_OPERA: 1
  • OSP:
    • OSP.CIPHER: 3
    • OSP.CONF-ALU: 3
  • T:
    • T.APP_CORR: 6
    • T.APP_DISC: 7
    • T.APP_MOD: 7
    • T.APP_READ: 7
    • T.APP_REMOVE: 7
    • T.CLON: 2
    • T.DEL_REMOVE: 7
    • T.DIS: 2
    • T.DIS_DATA: 14
    • T.DIS_TEST_ES: 5
    • T.ERR_REMOVE: 6
    • T.LOAD_APP: 8
    • T.LOAD_MAN: 5
    • T.LOAD_MOD: 5
    • T.LOAD_OTHER: 5
    • T.MOD: 5
    • T.MOD_DATA: 7
    • T.MOD_EXE: 10
    • T.MOD_LOAD: 7
    • T.MOD_SHARE: 8
    • T.MOD_TSF: 8
    • T.RESOURCES: 5
    • T.RND: 2
    • T.T_CMD: 10
    • T.T_ES: 8
    • T.T_TOOLS: 5
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 39
  • Infineon:
    • Infineon: 5
    • Infineon Technologies: 2
  • Thales:
    • Thales: 1
pdf_data/st_keywords/eval_facility
  • TrustedLabs:
    • Trusted Labs: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • TDES: 4
      • Triple-DES: 1
    • DES:
      • DES: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
pdf_data/st_keywords/crypto_scheme
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 5
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 3
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • malfunction: 1
  • SCA:
    • Leak-Inherent: 4
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 1
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.CardAccess: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • ICAO:
    • ICAO: 2
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • the TOE, the product also contain native applications and native modules used by ICAO application (out of scope of the TOE). Mel applications and native modules Native/MEL application: GMF v1.0 The GMF: 1
    • to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 16 shows how these security functions satisfy the TOE security functional requirements. 8.1: 1
pdf_data/st_metadata
  • /CreationDate: D:20181113151704+01'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: Security Target, CC, MULTOS, IDMotion, Platform
  • /ModDate: D:20181219115510+01'00'
  • /Producer: Microsoft® Word 2013
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 2271251
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different