name |
Canon imageRUNNER ADVANCE C355/C255 Series 2600 model 1.0
|
Canon imageRUNNER ADVANCE 4000 Series 2600.1 model Version: 1.0
|
category |
Multi-Function Devices
|
Multi-Function Devices
|
not_valid_before |
2017-06-28
|
2011-11-29
|
not_valid_after |
2022-06-28
|
2015-03-17
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0560_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0329_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Canon Inc.
|
Canon Inc.
|
manufacturer_web |
https://www.canon.com/
|
https://www.canon.com/
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0560_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0329_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0560kz_eimg.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
03edac70d1dd0d6b24121dbd476406a0cd537be4d55091b9ebd88f74f0c26bcb
|
None
|
state/cert/txt_hash |
413f51f0fdb0a023d0044445c09a5f75f8bde48b2dfab96c743ffb3e089bbf4d
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
5211a90f51461744642d1741971adfdcbf20a9d0227dd00e7b745d228b97589c
|
41d7171569d382e83ad3d11d9ad256a0df3f74663f582eea1fa38f1358290367
|
state/report/txt_hash |
4164541a8a68c4b9d5d43c7b5af0ff28fd659145443697e54fd8013f3bbd9236
|
874ca603ba65ed973848739b1664a3e74f172c26599d13bb12a8d1ad386c57f4
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
d390ecf1a836b19fdbca350a3b9598832229753834fee1a2ff90002995a06306
|
ea012b8b29d5d50e8943f5eb227441e8a75ed60869641d0f23e6e3c40274eec2
|
state/st/txt_hash |
5e40a5066e9494e8b5ac12f553c68870b5fa37f4e60444a31515b667be583207
|
b670eb7ce570c835f43c35ad66e140adcd20a08c98004149fc50ba8e5aeae5a6
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0560
|
JISEC-CC-CRP-C0329
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- cert_id:
C0560
- supplier:
Canon Inc.
- toe_overseas_name:
Canon imageRUNNER ADVANCE C355/ C255 Series 2600 model1.1
- expiration_date:
2022-07
- claim:
EAL2+ALC_FLR.2
PP
- revalidations: frozendict({'date': '2017-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0560_it6612_01.html'})
- certification_date:
2017-06
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0560_it6612.html
- toe_japan_name:
Canon imageRUNNER ADVANCE C355/ C255 Series 2600 model1.0
- enhanced:
- product:
Canon imageRUNNER ADVANCE C355/C255 Series 2600 model
- toe_version:
1.0
- product_type:
Multifunction Product
- certification_date:
2017-06-28
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- vendor:
Canon Inc.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0560_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0560_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0560_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function Function for identifying and authenticating the user.
-
Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function Function for encrypting all data stored in the HDD.
-
LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function Function for testing the integrity of the executable code at startup.
-
Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function Function for restricting device settings that influence security to be made only by the administrator.
|
- cert_id:
C0460
- supplier:
Canon Inc.
- toe_overseas_name:
Canon imageRUNNER ADVANCE 4000 Series 2600.1 model
1.3
- expiration_date:
2020-01
- claim:
EAL3+
ALC_FLR.2
PP
- certification_date:
2014-12
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0460_it4515.html
- toe_japan_name:
Canon imageRUNNER ADVANCE 4000 Series 2600.1 model
1.3
- enhanced:
- product:
Canon imageRUNNER ADVANCE 4000
Series 2600.1 model
- toe_version:
1.3
- product_type:
Multifunction Product
- certification_date:
2014-12-25
- cc_version:
3.1 Release4
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1™;-2009
- vendor:
Canon Inc.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
- cert_link:
https://www.ipa.go.jp/en/security/c0460_eimg.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/cert_id |
C0560
|
C0460
|
heuristics/scheme_data/certification_date |
2017-06
|
2014-12
|
heuristics/scheme_data/claim |
EAL2+ALC_FLR.2
PP
|
EAL3+
ALC_FLR.2
PP
|
heuristics/scheme_data/enhanced |
- product:
Canon imageRUNNER ADVANCE C355/C255 Series 2600 model
- toe_version:
1.0
- product_type:
Multifunction Product
- certification_date:
2017-06-28
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- vendor:
Canon Inc.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- report_link: https://www.ipa.go.jp/en/security/c0560_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0560_eimg.pdf
- target_link: https://www.ipa.go.jp/en/security/c0560_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function Function for identifying and authenticating the user.
-
Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function Function for encrypting all data stored in the HDD.
-
LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function Function for testing the integrity of the executable code at startup.
-
Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function Function for restricting device settings that influence security to be made only by the administrator.
|
- product:
Canon imageRUNNER ADVANCE 4000
Series 2600.1 model
- toe_version:
1.3
- product_type:
Multifunction Product
- certification_date:
2014-12-25
- cc_version:
3.1 Release4
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1™;-2009
- vendor:
Canon Inc.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
- cert_link:
https://www.ipa.go.jp/en/security/c0460_eimg.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL2 Augmented with ALC_FLR.2
|
EAL3 Augmented with ALC_FLR.2
|
heuristics/scheme_data/enhanced/cc_version |
3.1 Release4
|
3.1 Release4
|
heuristics/scheme_data/enhanced/cert_link |
https://www.ipa.go.jp/en/security/c0560_eimg.pdf
|
https://www.ipa.go.jp/en/security/c0460_eimg.pdf
|
heuristics/scheme_data/enhanced/certification_date |
2017-06-28
|
2014-12-25
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function Function for identifying and authenticating the user.
-
Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function Function for encrypting all data stored in the HDD.
-
LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function Function for testing the integrity of the executable code at startup.
-
Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function Function for restricting device settings that influence security to be made only by the administrator.
|
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/enhanced/evaluation_facility |
ECSEC Laboratory Inc.
Evaluation Center
|
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
|
heuristics/scheme_data/enhanced/product |
Canon imageRUNNER ADVANCE C355/C255 Series 2600 model
|
Canon imageRUNNER ADVANCE 4000
Series 2600.1 model
|
heuristics/scheme_data/enhanced/product_type |
Multifunction Product
|
Multifunction Product
|
heuristics/scheme_data/enhanced/protection_profile |
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
|
IEEE Std 2600.1™;-2009
|
heuristics/scheme_data/enhanced/toe_version |
1.0
|
1.3
|
heuristics/scheme_data/enhanced/vendor |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/expiration_date |
2022-07
|
2020-01
|
heuristics/scheme_data/supplier |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/toe_japan_name |
Canon imageRUNNER ADVANCE C355/ C255 Series 2600 model1.0
|
Canon imageRUNNER ADVANCE 4000 Series 2600.1 model
1.3
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0560_it6612.html
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0460_it4515.html
|
heuristics/scheme_data/toe_overseas_name |
Canon imageRUNNER ADVANCE C355/ C255 Series 2600 model1.1
|
Canon imageRUNNER ADVANCE 4000 Series 2600.1 model
1.3
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
c0560kz_eimg.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
476750
- pdf_is_encrypted:
True
- pdf_number_of_pages:
1
- /CreationDate:
D:20180322153209+09'00'
- /Creator:
Microsoft® Word 2010
- /ModDate:
D:20180322153257+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
c0560_erpt.pdf
|
c0329_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0560-01:
1
- Certification No. C0560:
1
|
- CRP-C0329-01:
1
- Certification No. C0329:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.DOC:
4
- T.FUNC:
2
- T.PROT:
2
- T.CONF:
4
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
- T:
- T.DOC:
4
- T.FUNC:
2
- T.PROT:
2
- T.CONF:
4
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL2:
4
- EAL2 augmented:
3
|
- EAL3:
4
- EAL3 augmented:
1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol/IPsec/IPsec |
8
|
2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- FIPS:
- CC:
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
1
|
2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/Microsoft/Microsoft |
4
|
2
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20180605151045+09'00'
|
D:20120530135038+09'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//ModDate |
D:20180605151335+09'00'
|
D:20120530135111+09'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata/pdf_file_size_bytes |
307993
|
570525
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
37
|
32
|
pdf_data/st_filename |
c0560_est.pdf
|
c0329_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
pdf_data/st_keywords/cc_claims/D/D.CONF |
8
|
8
|
pdf_data/st_keywords/cc_claims/D/D.DOC |
19
|
16
|
pdf_data/st_keywords/cc_claims/D/D.FUNC |
11
|
11
|
pdf_data/st_keywords/cc_claims/D/D.PROT |
6
|
6
|
pdf_data/st_keywords/cc_claims/O |
- O.STORAGE: 7
- O.DOC:
14
- O.FUNC:
7
- O.PROT:
7
- O.CONF:
14
- O.USER:
13
- O.INTERFACE:
7
- O.SOFTWARE:
6
- O.AUDIT:
6
|
- O.HDD: 8
- O.DOC:
16
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
14
- O.INTERFACE:
8
- O.SOFTWARE:
7
- O.AUDIT:
7
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT |
6
|
7
|
pdf_data/st_keywords/cc_claims/O/O.CONF |
14
|
16
|
pdf_data/st_keywords/cc_claims/O/O.DOC |
14
|
16
|
pdf_data/st_keywords/cc_claims/O/O.FUNC |
7
|
8
|
pdf_data/st_keywords/cc_claims/O/O.INTERFACE |
7
|
8
|
pdf_data/st_keywords/cc_claims/O/O.PROT |
7
|
8
|
pdf_data/st_keywords/cc_claims/O/O.SOFTWARE |
6
|
7
|
pdf_data/st_keywords/cc_claims/O/O.USER |
13
|
14
|
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN |
6
|
8
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT |
3
|
4
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_ACCESS |
3
|
4
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_STORAGE |
3
|
4
|
pdf_data/st_keywords/cc_claims/OE/OE.INTERFACE |
3
|
4
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYISCAL |
1
|
2
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL |
2
|
2
|
pdf_data/st_keywords/cc_claims/OE/OE.USER |
12
|
14
|
pdf_data/st_keywords/cc_claims/T |
- T.DOC:
6
- T.FUNC:
3
- T.PROT:
3
- T.CONF:
6
|
- T.DOC:
6
- T.FUNC:
3
- T.PROT:
3
- T.CONF:
6
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
|
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.2:
11
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1:
1
|
- ALC_FLR.2:
12
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 |
11
|
12
|
pdf_data/st_keywords/cc_sar/APE |
|
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL2:
8
- EAL 2:
2
- EAL2 augmented:
7
- EAL 2 augmented:
1
|
- EAL3:
9
- EAL 3:
2
- EAL3 augmented:
8
- EAL 3 augmented:
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
13
|
13
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
26
|
24
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
14
|
13
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
14
|
12
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
25
|
25
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
46
|
53
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
3
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
35
|
40
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
3
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
3
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
3
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
3
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
13
|
13
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
23
|
22
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
25
|
23
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
24
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
24
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
34
|
33
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_FDI_EXP.1:
11
- FPT_FDI_EXP.1.1:
2
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
- FPT_CIP_EXP: 2
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_CIP_EXP.1: 16
- FPT_FDI_EXP.1:
10
- FPT_PHP.1: 6
- FPT_CIP_EXP.1.1: 2
- FPT_CIP_EXP.1.2: 3
- FPT_FDI_EXP.1.1:
2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 |
11
|
10
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
- physical tampering: 4
- malfunction:
1
|
pdf_data/st_keywords/side_channel_analysis/FI/malfunction |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 186-2 |
3
|
4
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 |
3
|
3
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46-3 |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
4
|
3
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES |
2
|
1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/Microsoft/Microsoft |
2
|
3
|
pdf_data/st_keywords/vendor/Microsoft/Microsoft Corporation |
1
|
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Canon Inc.
|
Satoshi HIROTA
|
pdf_data/st_metadata//CreationDate |
D:20180531145254+09'00'
|
D:20120404052647
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//ModDate |
D:20180531152635+09'00'
|
D:20120404052647
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Title |
Canon imageRUNNER ADVANCE C355/C255 Series 2600 model Security Target
|
文書ID:
|
pdf_data/st_metadata/pdf_file_size_bytes |
1178405
|
1274957
|
pdf_data/st_metadata/pdf_hyperlinks |
mailto:[email protected] |
|
pdf_data/st_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
61
|
71
|
dgst |
17033c77d1e3c928
|
9ad03abccd2e9709
|