name |
Concepteers Teleconsole™ Version 2.0 |
Canon imagePRESS V900/V800/V700 with PDL 103 |
category |
Access Control Devices and Systems |
Multi-Function Devices |
scheme |
CA |
JP |
status |
archived |
active |
not_valid_after |
15.05.2017 |
11.01.2028 |
not_valid_before |
18.07.2011 |
11.01.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0770_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-177%20CR%20v1.1e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0770_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Concepteers%20Teleconsole%20EAL3%20ST%20v1-2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0770_est.pdf |
manufacturer |
Concepteers LLC |
Canon Inc. |
manufacturer_web |
https://www.concepteers.com |
https://www.canon.com/ |
security_level |
EAL3 |
{} |
dgst |
2ad25b4c7f906dcb |
2a55cb5ba361c364 |
heuristics/cert_id |
383-4-177 |
JISEC-CC-CRP-C0770-01-2023 |
heuristics/cert_lab |
CANADA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
2.0 |
103 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0770
- certification_date: 01.01.2023
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0770
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000m7y-att/c0770_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Product that has print, scan, copy and document storage and retrieval function. The TOE provides the security functionality required by the protection profile for Multifunction Product, “Protection Profile for Hardcopy Devices 1.0”. TOE security functionality The TOE provides the following security functions: User Authentication Functions Access Control Functions SSD Data Encryption Function LAN Data Protection Function Signature Verification/Generation Function Management Functions Audit Log Function Highly Reliable Update Function Self-Testing Function
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: Canon imagePRESS V900/V800/V700 with PDL
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000m7y-att/c0770_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000m7y-att/c0770_est.pdf
- toe_version: 103
- vendor: Canon Inc.
- expiration_date:
- supplier: Canon Inc.
- toe_japan_name: Canon imagePRESS V900 / V800 / V700 with PDL103
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0770_it2826.html
- toe_overseas_name: Canon imagePRESS V900 / V800 / V700 with PDL103
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b2cfec7a92fa2940 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
pdf_data/cert_filename |
|
c0770_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0770-01-2023: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20230208142956+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20230208143215+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 87428
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
383-4-177 CR v1.1e.pdf |
c0770_erpt.pdf |
pdf_data/report_frontpage |
- CA:
- cert_id: 383-4-177-CR
- cert_lab: CANADA
|
|
pdf_data/report_keywords/cc_cert_id |
- CA:
- 383-4-177: 1
- 383-4-177-CR: 1
|
- JP:
- JISEC-CC-CRP-C0770-01-2023: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140-2: 2
- FIPS 180-3: 1
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- ISO:
- PKCS:
|
- CC:
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1 Revision 3
- /CC date: July 2009
- /CEM Version: 3.1 Revision 3
- /CEM date: July 2009
- /CR_Date: 18 July 2011
- /CR_Version: 1.0
- /Client City: Jersey City
- /Client Country: USA
- /Client Full Name: Concepteers, LLC
- /Client Postal Code: 07302
- /Client Short Name: Concepteers
- /Client State: New Jersey
- /Client Street: 121 Newark Ave, Suite 204
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company: Microsoft
- /CreationDate: D:20110721141436-04'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer Long Name: Concepteers, LLC
- /Developer Short Name: Concepteers
- /EAL Level: 3
- /EAL Level Base: 3
- /EAL Level Text: 3
- /EAL Long: 3
- /EAL Short: EAL 3
- /ER Document Date: 15 September 2010
- /ER Version: Version 1.0
- /ETPlan_Doc#: 1688-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: TBD
- /ETPlan_date: TBD
- /ETProcRes_Date: TBD
- /ETProcRes_Doc#: 1688-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: TBD
- /ETProc_Date: TBD
- /ETProc_Doc#: 1688-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: TBD
- /ETReport_Date: 13 July 2011
- /ETReport_Doc#: 1688-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_TitleShort: ETR
- /ETReport_Version: 1.3
- /EWP_Date: 10 November 2010
- /EWP_Doc#: 1688-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.0
- /Eval number: 383-4-177
- /Eval_End_Date: 1 September 2011
- /Eval_Start_Date: 1 September 2010
- /LeadEvaluator: Kim Braun
- /LeadEvaluatorInitials: KB
- /ModDate: D:20110721141454-04'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1688
- /ST_Date: 22 June 2011
- /ST_Title: Security Target Concepteers Teleconsole Family Version 2.0
- /ST_Version: 1.2
- /SVC_Date: TBD
- /SVC_Doc#: 1688-000-D007
- /SVC_Title: Site Visit Checklist
- /SVC_Version: TBD
- /SVR_Date: TBD
- /SVR_Doc#: 1688-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: TBD
- /SV_City: Jersey City
- /Security Classification: EWA-Canada & Concepteers Proprietary
- /SourceModified: D:20110721181411
- /Sponsor: Concepteers
- /Sponsor City: Jersey City
- /Sponsor Country: USA
- /Sponsor Postal Code: 07302
- /Sponsor State: New Jersey
- /Sponsor Street: 121 Newark Ave, Suite 204
- /TOE: Concepteers Teleconsole™ Version 2.0
- /TOE Short: Teleconsole™ Version 2.0
- /TOE Short with version: Teleconsole™ Version 2.0
- /TOE Short-NoTM: Teleconsole Version 2.0
- /TOE Version: 2.0
- /TOE with version: Concepteers Teleconsole™ Version 2.0
- /TOE-NoTM: Concepteers Teleconsole Family Version 2.0
- /Title: EAL X+ Evaluation of [Developer Long Name]
- pdf_file_size_bytes: 105018
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /CreationDate: D:20230227150945+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20230227151120+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 447640
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
pdf_data/st_filename |
Concepteers Teleconsole EAL3 ST v1-2.pdf |
c0770_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL1: 1
- EAL1 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.3: 2
- ADV_TDS.2: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.3: 2
- ALC_CMS.3: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 1
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IDC.2: 3
- FDP_IFC: 1
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 3
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 2
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MSA: 3
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 3
- FMT_SAE: 2
- FMT_SAE.1: 4
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTP:
- FTP_TRP: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 15
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FAU_STG_EXT: 5
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 47
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 6
- FCS_CKM_EXT.4: 31
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 137
- FCS_COP.1.1: 7
- FCS_KDF_EXT.1: 8
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 7
- FCS_KYC_EXT.1.1: 2
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 31
- FCS_RBG_EXT.1.1: 4
- FCS_RBG_EXT.1.2: 4
- FCS_SMC_EXT: 4
- FCS_SMC_EXT.1: 16
- FCS_SMC_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 2
- FCS_TLS_EXT.1: 21
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 2
- FDP_DSK_EXT.1: 5
- FDP_DSK_EXT.1.1: 3
- FDP_DSK_EXT.1.2: 3
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 2
- FIA_PSK_EXT.1: 10
- FIA_PSK_EXT.1.1: 3
- FIA_PSK_EXT.1.2: 3
- FIA_PSK_EXT.1.3: 3
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 18
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 13
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 3
- FPT_TUD_EXT.1.2: 3
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 2
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 12
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.GENPUR: 2
- A.NOEVIL: 2
- A.PHYSEC: 2
- A.PUBLIC: 2
- A.SINGEN: 2
- O:
- O.ACCOUN: 9
- O.AUDREC: 8
- O.ENCRYP: 11
- O.IDAUTH: 10
- O.MEDIAT: 15
- O.SECFUN: 18
- O.SECKEY: 9
- O.SECSTA: 13
- O.SELPRO: 9
- O.SINUSE: 8
- OE:
- OE.ADMTRA: 4
- OE.GENPUR: 3
- OE.GUIDAN: 4
- OE.PHYSEC: 3
- OE.PUBLIC: 3
- OE.SINGEN: 3
- T:
- T.AUDACC: 4
- T.AUDFUL: 4
- T.MEDIAT: 3
- T.NOAUTH: 3
- T.OLDINF: 3
- T.PROCOM: 4
- T.REPLAY: 3
- T.SELPRO: 4
- T.TUSAGE: 4
|
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 21
- SHA-384: 11
- SHA-512: 12
- SHA2: 1
- SHA256: 9
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 19
- IKEv1: 22
- IKEv2: 9
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 69
- TLS 1.0: 3
- TLS 1.1: 3
- TLS 1.2: 5
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 30
- P-384: 14
- P-521: 8
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 5
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 4
- FIPS 180-3: 1
- FIPS 186-3: 1
- FIPS 197: 2
- FIPS 46-3: 2
- PKCS:
- RFC:
|
- FIPS:
- FIPS PUB 180-3: 2
- FIPS PUB 186-4: 40
- FIPS PUB 197: 9
- FIPS PUB 198-1: 3
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 18031:2011: 8
- ISO/IEC 18033-3: 2
- ISO/IEC 19772: 4
- NIST:
- NIST SP 800-38A: 4
- NIST SP 800-38B: 2
- NIST SP 800-38C: 2
- NIST SP 800-38D: 2
- NIST SP 800-90A: 8
- RFC:
- RFC 2246: 3
- RFC 2818: 4
- RFC 3602: 11
- RFC 4106: 9
- RFC 4109: 4
- RFC 4301: 5
- RFC 4303: 3
- RFC 4304: 6
- RFC 4346: 3
- RFC 4868: 9
- RFC 5246: 5
- RFC 5282: 3
- RFC3602: 1
- RFC4304: 1
- RFC4868: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /AAPL:Keywords: []
- /Author: RAY POTTER
- /CreationDate: D:20110622235326Z00'00'
- /Creator: Microsoft Word
- /Keywords:
- /ModDate: D:20110622235326Z00'00'
- /Producer: Mac OS X 10.6.7 Quartz PDFContext
- /Title: Microsoft Word - Concepteers Teleconsole EAL3 ST v1-2.docx
- pdf_file_size_bytes: 536081
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /Author: Canon Inc.
- /CreationDate: D:20230222134820+09'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230222134958+09'00'
- /Producer: Microsoft® Word 2016
- /Title: Canon imagePRESS V900/V800/V700 with PDL Security Target
- pdf_file_size_bytes: 1114267
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 93
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
True |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |