Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belden Hirschmann IT MTS Series Ethernet Switchesv9.7.202.3 (for box switch), v9.7.202.3 (for chassis switch)
None
Canon iR5570/iR6570 Series Encrypted Printing Software-B1 Version 1.01
JISEC-CC-CRP-C0027
name Belden Hirschmann IT MTS Series Ethernet Switchesv9.7.202.3 (for box switch), v9.7.202.3 (for chassis switch) Canon iR5570/iR6570 Series Encrypted Printing Software-B1 Version 1.01
category Network and Network-Related Devices and Systems Multi-Function Devices
scheme SG JP
status active archived
not_valid_after 20.04.2028 07.01.2013
not_valid_before 20.04.2023 03.06.2005
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20Belden%20Hirschmann%20IT%20MTS%20Series%20CC%20Certificate.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20Belden%20Hirschmann%20IT%20MTS%20Series%20Certificate%20Report.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0027_ecvr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[DD]%20MTS_Security%20target%20v2.4.pdf
manufacturer Belden Hirschmann Industries (Suzhou) Ltd Canon Inc.
manufacturer_web https://hirschmann.com/en/index.phtml https://www.canon.com/
security_level EAL2+, ALC_FLR.2 EAL2
dgst 3dc6ace2d6cd57c2 ca11951ff35cba31
heuristics/cert_id JISEC-CC-CRP-C0027
heuristics/extracted_sars ALC_FLR.2 {}
heuristics/extracted_versions 9.7.202.3 1.01
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0562
  • certification_date: 01.06.2017
  • claim: EAL2+ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE 6500 Series 2600 model
    • product_type: Multifunction Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • toe_version: 2.0
    • vendor: Canon Inc.
  • expiration_date: 01.07.2022
  • revalidations: [frozendict({'date': '2017-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0562_it6614_01.html'})]
  • supplier: Canon Inc.
  • toe_japan_name: Canon imageRUNNER ADVANCE 6500 Series 2600 model2.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0562_it6614.html
  • toe_overseas_name: Canon imageRUNNER ADVANCE 6500 Series 2600 model2.1
pdf_data/report_filename c0027_ecvr.pdf
pdf_data/report_frontpage
      pdf_data/report_keywords/cc_cert_id
      • JP:
        • Certification No. C0027: 1
      pdf_data/report_keywords/cc_protection_profile_id
      pdf_data/report_keywords/cc_security_level
      • EAL:
        • EAL2: 1
      pdf_data/report_keywords/cc_sar
      pdf_data/report_keywords/cc_sfr
      pdf_data/report_keywords/cc_claims
      pdf_data/report_keywords/vendor
      pdf_data/report_keywords/eval_facility
      pdf_data/report_keywords/symmetric_crypto
      pdf_data/report_keywords/asymmetric_crypto
      pdf_data/report_keywords/pq_crypto
      pdf_data/report_keywords/hash_function
      pdf_data/report_keywords/crypto_scheme
      pdf_data/report_keywords/crypto_protocol
      pdf_data/report_keywords/randomness
      pdf_data/report_keywords/cipher_mode
      pdf_data/report_keywords/ecc_curve
      pdf_data/report_keywords/crypto_engine
      pdf_data/report_keywords/tls_cipher_suite
      pdf_data/report_keywords/crypto_library
      pdf_data/report_keywords/vulnerability
      pdf_data/report_keywords/side_channel_analysis
      pdf_data/report_keywords/technical_report_id
      pdf_data/report_keywords/device_model
      pdf_data/report_keywords/tee_name
      pdf_data/report_keywords/os_name
      pdf_data/report_keywords/cplc_data
      pdf_data/report_keywords/ic_data_group
      pdf_data/report_keywords/standard_id
      pdf_data/report_keywords/javacard_version
      pdf_data/report_keywords/javacard_api_const
      pdf_data/report_keywords/javacard_packages
      pdf_data/report_keywords/certification_process
      pdf_data/report_metadata
      • /CreationDate: D:20050615165030+09'00'
      • /ModDate: D:20050615165030+09'00'
      • /Producer: Acrobat Distiller 6.0.1 (Windows)
      • /Title: untitled
      • pdf_file_size_bytes: 13122
      • pdf_hyperlinks: {}
      • pdf_is_encrypted: False
      • pdf_number_of_pages: 1
      pdf_data/st_filename [DD] MTS_Security target v2.4.pdf
      pdf_data/st_keywords/cc_cert_id
      pdf_data/st_keywords/cc_protection_profile_id
      pdf_data/st_keywords/cc_security_level
      • EAL:
        • EAL2: 2
        • EAL2 augmented: 1
      pdf_data/st_keywords/cc_sar
      • ALC:
        • ALC_FLR.2: 3
      pdf_data/st_keywords/cc_sfr
      • FAU:
        • FAU_GEN.1: 12
        • FAU_GEN.1.1: 1
        • FAU_GEN.1.2: 1
        • FAU_GEN.2: 5
        • FAU_GEN.2.1: 1
        • FAU_SAR.1: 7
        • FAU_SAR.1.1: 1
        • FAU_SAR.1.2: 1
        • FAU_SAR.3: 4
        • FAU_SAR.3.1: 1
        • FAU_STG.1: 7
        • FAU_STG.1.1: 1
        • FAU_STG.1.2: 1
        • FAU_STG.3: 4
        • FAU_STG.3.1: 2
      • FCS:
        • FCS_CKM: 17
        • FCS_CKM.1: 11
        • FCS_CKM.2: 6
        • FCS_CKM.4: 20
        • FCS_CKM.4.1: 1
        • FCS_COP: 12
        • FCS_COP.1: 9
      • FDP:
        • FDP_ACC.1: 9
        • FDP_ACC.1.1: 1
        • FDP_ACF.1: 6
        • FDP_ACF.1.1: 1
        • FDP_ACF.1.2: 1
        • FDP_ACF.1.3: 1
        • FDP_ACF.1.4: 1
        • FDP_IFC.1: 10
        • FDP_IFC.1.1: 1
        • FDP_IFF.1: 5
        • FDP_IFF.1.1: 1
        • FDP_IFF.1.2: 1
        • FDP_IFF.1.3: 1
        • FDP_IFF.1.4: 1
        • FDP_IFF.1.5: 1
        • FDP_ITC.1: 9
        • FDP_ITC.1.1: 1
        • FDP_ITC.1.2: 1
        • FDP_ITC.1.3: 1
        • FDP_ITC.2: 4
      • FIA:
        • FIA_AFL.1: 6
        • FIA_AFL.1.1: 2
        • FIA_AFL.1.2: 2
        • FIA_ATD.1: 4
        • FIA_ATD.1.1: 1
        • FIA_SOS.1: 1
        • FIA_SOS.1.1: 1
        • FIA_UAU.1: 7
        • FIA_UAU.1.1: 1
        • FIA_UAU.1.2: 1
        • FIA_UID.1: 12
        • FIA_UID.1.1: 1
        • FIA_UID.1.2: 1
      • FMT:
        • FMT_MOF.1: 4
        • FMT_MOF.1.1: 2
        • FMT_MSA.1: 1
        • FMT_MSA.3: 10
        • FMT_SMF.1: 9
        • FMT_SMF.1.1: 1
        • FMT_SMR.1: 7
        • FMT_SMR.1.1: 1
        • FMT_SMR.1.2: 1
      • FPT:
        • FPT_STM.1: 3
      • FTA:
        • FTA_SSL.3: 5
        • FTA_SSL.3.1: 1
        • FTA_TSE.1: 5
        • FTA_TSE.1.1: 1
      • FTP:
        • FTP_TRP.1: 7
        • FTP_TRP.1.1: 1
        • FTP_TRP.1.2: 1
        • FTP_TRP.1.3: 1
      pdf_data/st_keywords/cc_claims
      • A:
        • A.NOEVIL: 2
      pdf_data/st_keywords/vendor
      pdf_data/st_keywords/eval_facility
      pdf_data/st_keywords/symmetric_crypto
      • AES_competition:
        • AES:
          • AES: 12
      pdf_data/st_keywords/asymmetric_crypto
      pdf_data/st_keywords/pq_crypto
      pdf_data/st_keywords/hash_function
      • SHA:
        • SHA2:
          • SHA256: 7
      pdf_data/st_keywords/crypto_scheme
      • MAC:
        • MAC: 2
      pdf_data/st_keywords/crypto_protocol
      • SSH:
        • SSH: 21
        • SSHv2: 3
      pdf_data/st_keywords/randomness
      pdf_data/st_keywords/cipher_mode
      • CTR:
        • CTR: 1
      pdf_data/st_keywords/ecc_curve
      pdf_data/st_keywords/crypto_engine
      pdf_data/st_keywords/tls_cipher_suite
      pdf_data/st_keywords/crypto_library
      pdf_data/st_keywords/vulnerability
      pdf_data/st_keywords/side_channel_analysis
      pdf_data/st_keywords/technical_report_id
      pdf_data/st_keywords/device_model
      pdf_data/st_keywords/tee_name
      pdf_data/st_keywords/os_name
      pdf_data/st_keywords/cplc_data
      pdf_data/st_keywords/ic_data_group
      pdf_data/st_keywords/standard_id
      • FIPS:
        • FIPS 197: 1
      • RFC:
        • RFC 2104: 1
        • RFC 4253: 1
        • RFC 4344: 1
        • RFC 4716: 2
      pdf_data/st_keywords/javacard_version
      pdf_data/st_keywords/javacard_api_const
      pdf_data/st_keywords/javacard_packages
      pdf_data/st_keywords/certification_process
      pdf_data/st_metadata
      • /Author: Belden Hirschmann © 2020
      • /CreationDate: D:20230411152414+08'00'
      • /Creator: Microsoft® Word for Microsoft 365
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_ActionId: 14c29ab4-45a5-47eb-906a-0d5a47261c5c
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_ContentBits: 0
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_Enabled: true
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_Method: Privileged
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_Name: Official (Open)
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_SetDate: 2023-04-27T08:44:35Z
      • /MSIP_Label_5434c4c7-833e-41e4-b0ab-cdb227a2f6f7_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
      • /ModDate: D:20230426095156+08'00'
      • /Producer: Microsoft® Word for Microsoft 365
      • /Title: security target for MTS serial switch v2.2
      • pdf_file_size_bytes: 683425
      • pdf_hyperlinks: {}
      • pdf_is_encrypted: False
      • pdf_number_of_pages: 43
      state/report/convert_ok False True
      state/report/download_ok False True
      state/report/extract_ok False True
      state/report/pdf_hash Different Different
      state/report/txt_hash Different Different
      state/st/convert_ok True False
      state/st/download_ok True False
      state/st/extract_ok True False
      state/st/pdf_hash Different Different
      state/st/txt_hash Different Different