Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model 1.0
JISEC-CC-CRP-C0497
Canon imageRUNNER ADVANCE C5000 Series 2600.1 model Version 1.0
JISEC-CC-CRP-C0287
name Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model 1.0 Canon imageRUNNER ADVANCE C5000 Series 2600.1 model Version 1.0
not_valid_before 2016-02-25 2011-03-29
not_valid_after 2021-02-25 2015-03-17
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0497_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0287_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0497_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0287_erpt.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None})
state/report/pdf_hash 925a12caa5ee353c76e512590d287fa094ca63bc243f235e9c4d338bdb384498 af4a8d4a98b5e41410e7c008df62f985427619466fab27ecd478147d955afab2
state/report/txt_hash 5d5eff0b90435bf3491db783a037a3b43ee2f8342a64de7c651c6da51886bcf0 6ce89c153b32161e956d40d960f0331b1c51360a54b272ff63c55605b2c19b49
state/st/convert_garbage True False
state/st/pdf_hash 1aff760e1dcd525216a02d0aa9239142633283799215f91f6940392ede241ca8 dae308e642035f6efb4e1731cf3cd5bd76b07512317b767ee0b8b66dcf0587bc
state/st/txt_hash 62064bb034e4ff94394169e376b97e528925a222f2e5f7036c26b61481496d03 4f1af31d046bcdc7bbdf6e204c56fee493bf6a0ebbd309a821d22fe9344f04c3
heuristics/cert_id JISEC-CC-CRP-C0497 JISEC-CC-CRP-C0287
heuristics/scheme_data/cert_id C0497 C0459
heuristics/scheme_data/certification_date 2016-02 2014-12
heuristics/scheme_data/claim EAL3+ALC_FLR.2 PP EAL3+ ALC_FLR.2 PP
heuristics/scheme_data/enhanced
  • product: Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model
  • toe_version: 1.0
  • product_type: Multifunction Product
  • certification_date: 2016-02-25
  • cc_version: 3.1 Release4
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1™-2009
  • vendor: Canon Inc.
  • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
  • report_link: https://www.ipa.go.jp/en/security/c0497_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0497_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0497_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, and I-Fax capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
  • product: Canon imageRUNNER ADVANCE C5000 Series 2600.1 model
  • toe_version: 1.3
  • product_type: Multifunction Product
  • certification_date: 2014-12-25
  • cc_version: 3.1 Release4
  • assurance_level: EAL3 Augmented with ALC_FLR.2
  • protection_profile: IEEE Std 2600.1™-2009
  • vendor: Canon Inc.
  • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
  • cert_link: https://www.ipa.go.jp/en/security/c0459_eimg.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP, except for the fax function which is not included in this constitution. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0497_eimg.pdf https://www.ipa.go.jp/en/security/c0459_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2016-02-25 2014-12-25
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, and I-Fax capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator. PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP, except for the fax function which is not included in this constitution. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
heuristics/scheme_data/enhanced/product Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model Canon imageRUNNER ADVANCE C5000 Series 2600.1 model
heuristics/scheme_data/enhanced/toe_version 1.0 1.3
heuristics/scheme_data/expiration_date 2021-03 2020-01
heuristics/scheme_data/toe_japan_name Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model1.0 Canon imageRUNNER ADVANCE C5000 Series 2600.1 model 1.3
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0497_it3444.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0459_it4514.html
heuristics/scheme_data/toe_overseas_name Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model1.0 Canon imageRUNNER ADVANCE C5000 Series 2600.1 model 1.3
pdf_data/report_filename c0497_erpt.pdf c0287_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0497-01: 1
  • Certification No. C0497: 1
  • CRP-C0287-01: 1
  • Certification No. C0287: 1
pdf_data/report_keywords/cc_claims/T/T.CONF 2 4
pdf_data/report_keywords/cc_claims/T/T.DOC 2 4
pdf_data/report_keywords/cc_claims/T/T.FUNC 1 2
pdf_data/report_keywords/cc_claims/T/T.PROT 1 2
pdf_data/report_keywords/cc_security_level/EAL/EAL3 augmented 3 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 4
    • of the print job contains an identification and authentication mechanism, that mechanism is out of scope of this evaluation. In terms of this evaluation, only Microsoft Internet Explorer 6 SP1: 1
    • for use as the Web browser for operating the TOE. Any and all other Web browsers and versions are out of scope of this evaluation. 1.2 Conduct of Evaluation Evaluation Facility conducted IT security evaluation: 1
    • MFP, created by the submitted print jobs. As such, the following security functions are considered out of scope of this evaluation. 1) The TOE supports various print protocols for the submission of print jobs: 1
    • protocols have their own identification and authentication mechanisms, and those mechanisms are out of scope of this evaluation. Examples of this include the identification and authentication mechanism in the: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 8
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
pdf_data/report_keywords/vendor/Microsoft/Microsoft 2 3
pdf_data/report_metadata
  • pdf_file_size_bytes: 326477
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /CreationDate: D:20160713090714+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160713155803+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 626101
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 34
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110630165749+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110630170428+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20160713090714+09'00' D:20110630165749+09'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 Word 用 Acrobat PDFMaker 8.1
pdf_data/report_metadata//ModDate D:20160713155803+09'00' D:20110630170428+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 8.3.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 326477 626101
pdf_data/report_metadata/pdf_number_of_pages 36 34
pdf_data/st_filename c0497_est.pdf c0287_est.pdf
pdf_data/st_keywords/cc_claims/A/A.ACCESS 2 3
pdf_data/st_keywords/cc_claims/A/A.ADMIN 4 6
pdf_data/st_keywords/cc_claims/D
  • D.DOC: 16
  • D.FUNC: 12
  • D.PROT: 6
  • D.CONF: 9
  • D.DOC_: 1
  • D.DOC: 12
  • D.FUNC: 6
  • D.PROT: 6
  • D.CONF: 8
pdf_data/st_keywords/cc_claims/D/D.CONF 9 8
pdf_data/st_keywords/cc_claims/D/D.DOC 16 12
pdf_data/st_keywords/cc_claims/D/D.FUNC 12 6
pdf_data/st_keywords/cc_claims/O/O.AUDIT 3 8
pdf_data/st_keywords/cc_claims/O/O.CONF 8 18
pdf_data/st_keywords/cc_claims/O/O.DOC 8 18
pdf_data/st_keywords/cc_claims/O/O.FUNC 5 9
pdf_data/st_keywords/cc_claims/O/O.HDD 5 9
pdf_data/st_keywords/cc_claims/O/O.INTERFACE 4 9
pdf_data/st_keywords/cc_claims/O/O.PROT 4 9
pdf_data/st_keywords/cc_claims/O/O.SOFTWARE 5 8
pdf_data/st_keywords/cc_claims/O/O.USER 10 15
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 3
  • OE.AUDIT_ACCESS: 3
  • OE.INTERFACE: 2
  • OE.PHYSICAL: 2
  • OE.USER: 10
  • OE.ADMIN: 5
  • OE.AUDIT: 2
  • OE.AUDIT_STORAGE: 4
  • OE.AUDIT_ACCESS: 4
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 2
  • OE.USER: 14
  • OE.ADMIN: 8
  • OE.AUDIT: 4
  • OE.PHYISCAL: 2
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN 5 8
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT 2 4
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_ACCESS 3 4
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_STORAGE 3 4
pdf_data/st_keywords/cc_claims/OE/OE.INTERFACE 2 4
pdf_data/st_keywords/cc_claims/OE/OE.USER 10 14
pdf_data/st_keywords/cc_claims/T/T.CONF 4 6
pdf_data/st_keywords/cc_claims/T/T.DOC 4 6
pdf_data/st_keywords/cc_claims/T/T.FUNC 2 3
pdf_data/st_keywords/cc_claims/T/T.PROT 2 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 12
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_FLR.2: 11
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 12 11
pdf_data/st_keywords/cc_sar/APE/APE_ECD 1 2
pdf_data/st_keywords/cc_security_level/EAL/EAL3 9 8
pdf_data/st_keywords/cc_security_level/EAL/EAL3 augmented 8 7
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN: 7
  • FAU_GEN.2: 6
  • FAU_SAR: 1
  • FAU_SAR.1: 6
  • FAU_SAR.2: 6
  • FAU_STG.1: 6
  • FAU_STG.4: 6
  • FAU_GEN.1: 6
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_GENA: 1
  • FAU_GEN.1: 13
  • FAU_GEN.2: 6
  • FAU_SAR.1: 8
  • FAU_SAR.2: 6
  • FAU_STG.1: 8
  • FAU_STG.4: 6
  • FAU_GEN: 2
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN 7 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 6 13
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 6 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 6 8
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_COP: 6
  • FCS_CKM: 2
  • FCS_CKM.2: 12
  • FCS_COP.1: 19
  • FCS_CKM.1: 24
  • FCS_CKM.4: 11
  • FCS_COP.1.1: 1
  • FCS_CKM.1.1: 1
  • FCS_CKM.2.1: 1
  • FCS_COP.1: 25
  • FCS_CKM.1: 24
  • FCS_CKM.2: 13
  • FCS_CKM.4: 12
  • FCS_COP.1.1: 2
  • FCS_CKM.1.1: 1
  • FCS_CKM.2.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 12 13
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 11 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 19 25
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 1 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 17
  • FDP_ACC.1: 26
  • FDP_ACF.1: 20
  • FDP_ACF: 10
  • FDP_RIP.1: 4
  • FDP_ACE: 2
  • FDP_ACFI: 1
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_IFC.1: 3
  • FDP_ACC.1.1: 2
  • FDP_ACF.1.1: 3
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 3
  • FDP_ACF.1.4: 3
  • FDP_RIP.1.1: 1
  • FDP_ITC.1: 6
  • FDP_ITC.2: 6
  • FDP_ACEF: 1
  • FDP_RIP: 2
  • FDP_ACE.1: 1
  • FDP_ACG.1: 1
  • FDP_ACC.1: 49
  • FDP_ACF.1: 34
  • FDP_RIP.1: 6
  • FDP_IFF: 1
  • FDP_IFC: 1
  • FDP_IFC.1: 4
  • FDP_ACC.1.1: 4
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_RIP.1.1: 1
  • FDP_ITC.1: 6
  • FDP_ITC.2: 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 26 49
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 2 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 20 34
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 3 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 3 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 3 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 3 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 3 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 4 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 5 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 5 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 9 13
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 6 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 20 22
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA: 13
  • FMT_MSA.3: 19
  • FMT_MSA.1: 10
  • FMT_MTD: 4
  • FMT_MTD.1.1: 3
  • FMT_MTD.1: 13
  • FMT_SMF.1: 23
  • FMT_SMR.1: 30
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1.1: 1
  • FMT_SMEF.1: 3
  • FMT_SMF: 2
  • FMT_SMR: 3
  • FMT_MSA.1: 23
  • FMT_MSA.3: 25
  • FMT_MTD.1: 18
  • FMT_SMF.1: 25
  • FMT_SMR.1: 33
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1.1: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 10 23
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 19 25
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 13 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 3 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 23 25
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 30 33
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_CIP_EXP: 2
  • FPT_STM.1: 6
  • FPT_TST.1: 6
  • FPT_CIP_EXP.1: 16
  • FPT_FDI: 3
  • FPT_PHP.1: 5
  • FPT_CIP_EXP.1.1: 2
  • FPT_CIP_EXP.1.2: 3
  • FPT_FDI_EXP: 2
  • FPT_FDI_EXP.1: 8
  • FPT_FDI_EXP.1.1: 2
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1.1: 1
  • FPT_PHP: 1
  • FPT_STM: 1
  • FPT_CIP_EXP: 2
  • FPT_FDI_EXP: 3
  • FPT_STM.1: 9
  • FPT_TST.1: 6
  • FPT_CIP_EXP.1: 16
  • FPT_FDI_EXP.1: 11
  • FPT_PHP.1: 6
  • FPT_CIP_EXP.1.1: 2
  • FPT_CIP_EXP.1.2: 3
  • FPT_FDI_EXP.1.1: 2
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP 2 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 8 11
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 5 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 6 9
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 4 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 2 1
pdf_data/st_keywords/vendor/Microsoft/Microsoft 2 3
pdf_data/st_metadata
  • pdf_file_size_bytes: 1435533
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 63
  • /Author: Canon Inc.
  • /CreationDate: D:20160701165804+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /Keywords:
  • /ModDate: D:20160701165811+09'00'
  • /Producer: Adobe LiveCycle PDFGenerator
  • /Subject:
  • /Title: Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model Security Target
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1200786
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 68
  • /Author: Satoshi HIROTA
  • /CreationDate: D:20110623065012Z
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110630170507+09'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: 文書ID:
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Canon Inc. Satoshi HIROTA
pdf_data/st_metadata//CreationDate D:20160701165804+09'00' D:20110623065012Z
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 Microsoft® Office Word 2007
pdf_data/st_metadata//ModDate D:20160701165811+09'00' D:20110630170507+09'00'
pdf_data/st_metadata//Producer Adobe LiveCycle PDFGenerator Microsoft® Office Word 2007
pdf_data/st_metadata//Title Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model Security Target 文書ID:
pdf_data/st_metadata/pdf_file_size_bytes 1435533 1200786
pdf_data/st_metadata/pdf_number_of_pages 63 68
dgst 13ee853e5878a7f7 dd424fd022726329