name |
Canon iR5570/iR6570 Series Encrypted Printing Software-B1 Version 1.01 |
KOMSCO JK11 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
KR |
status |
archived |
archived |
not_valid_after |
07.01.2013 |
01.06.2019 |
not_valid_before |
03.06.2005 |
12.10.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0027_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-ISIS-0272-2010(KOMSCO%20JK11)_e.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KOMSCO%20JK11%20Security%20Target%20Lite_e.pdf |
manufacturer |
Canon Inc. |
KOMSCO |
manufacturer_web |
|
https://www.komsco.com |
security_level |
EAL2 |
EAL4+, AVA_VAN.4, ATE_DPT.2 |
dgst |
3edbe85a07cdaa0d |
794dbdddfa49f688 |
heuristics/cert_id |
JISEC-CC-CRP-C0027 |
KECS-ISIS-0272-2010 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ADV_TDS.3, ASE_REQ.2, AVA_VLA.4, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
heuristics/extracted_versions |
1.01 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0027
- certification_date: 01.06.2005
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- description: PRODUCT DESCRIPTION In today's office environments, people create a variety of documents for business purposes using applications on their PC, and those documents are usually printed on a network-connected printing device (e.g., a shared multi-functional peripheral (MFP) or a shared printer). This product encompasses the Canon iR5570/iR6570-series multifunctional peripheral and a Windows-compatible software program to execute print operations, and provides the following functions: - Protect print job data during transmission to a printing device from a user's PC. - Allow print job data to be printed after verifying at the printing device that the same IC card that was used at the PC to start printing is being used.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.Evaluation Center
- product: Canon iR5570/iR6570 Series Encrypted Printing Software-B1
- product_type: IT Product ( data protection function in digital MFD )
- toe_version: Version 1.01
- vendor: Canon Inc.
- expiration_date: 01.03.2013
- supplier: Canon Inc.
- toe_japan_name: Canon iR5570/iR6570 Series Encrypted Printing Software-B1 Version 1.01
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0027_it4032.html
- toe_overseas_name: Canon iR5570/iR6570 Series Encrypted Printing Software-B1 Version 1.01
|
- category: SmartCard Operating System
- cert_id: KECS-ISIS-0272-2010
- certification_date: 12.10.2010
- enhanced:
- level: EAL4+
- product: KOMSCO JK11
- product_link: https://itscc.kr/certprod/view.do?product_id=272&product_class=4
- vendor: KOMSCO Co., Ltd.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0438-2007 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0438-2007 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0027_ecvr.pdf |
KECS-ISIS-0272-2010(KOMSCO JK11)_e.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0027: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.2: 2
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20050615165030+09'00'
- /ModDate: D:20050615165030+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13122
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: ITSCC
- /CreationDate: D:20110729144857+09'00'
- /Creator: PDFCreator Version 1.2.0
- /Keywords:
- /ModDate: D:20110729144857+09'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: KECS-ISIS-0272-2010(KOMSCO JK11)_e.hwp
- pdf_file_size_bytes: 306165
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
|
KOMSCO JK11 Security Target Lite_e.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0438-2007: 1
- BSI-DSZ-CC-0501-2008-MA-04: 1
- BSI-DSZ-CC-0624-2010-MA-04: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4+: 1
- EAL4: 12
- EAL4+: 6
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 16
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 15
- ADV_IMP.1: 11
- ADV_IMP.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 21
- AGD:
- AGD_OPE.1: 17
- AGD_PRE.1: 10
- ALC:
- ALC_CMC.4: 17
- ALC_CMS.1: 1
- ALC_CMS.4: 8
- ALC_DEL.1: 7
- ALC_DVS.1: 8
- ALC_DVS.2: 1
- ALC_LCD.1: 9
- ALC_TAT.1: 10
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 14
- ASE_INT.1: 16
- ASE_OBJ.2: 13
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD.1: 10
- ASE_TSS.1: 7
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 7
- ATE_DPT.1: 1
- ATE_DPT.2: 14
- ATE_FUN.1: 14
- ATE_IND.2: 9
- AVA:
- AVA_MSU.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 15
- AVA_VLA.4: 1
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 7
- FAU_ARP.1.1: 1
- FAU_GEN.1: 3
- FAU_SAA.1: 10
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 18
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 15
- FDP_ACC.2: 15
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 20
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 8
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 2
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 13
- FIA_ATD.1.1: 2
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 22
- FIA_UAU.1.1: 7
- FIA_UAU.1.2: 3
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA.1: 15
- FMT_MSA.1.1: 3
- FMT_MSA.3: 10
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_MTD.2: 7
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 5
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 6
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_RCV.2: 1
- FPT_RCV.3: 6
- FPT_RCV.3.1: 1
- FPT_RCV.3.2: 1
- FPT_RCV.3.3: 1
- FPT_RCV.3.4: 1
- FPT_RCV.4: 5
- FPT_RCV.4.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 6
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
|
- A:
- D:
- D.APP_CODE: 1
- D.APP_DATA: 1
- D.CRYPTO: 1
- D.PIN: 1
- D.SEC_DATA: 1
- D.TS_CODE: 1
- D.TS_DATA: 1
- O:
- O.IDENTIFICATI: 1
- O.JAVAOBJECT: 2
- OE:
- OP:
- OP.ARRAY_ACCESS: 5
- OP.CREATE: 3
- OP.DELETE: 10
- OP.INSTALL: 10
- OP.INSTANCE_FIELD: 5
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 5
- OP.JAVA: 3
- OP.LOAD: 10
- OP.THROW: 5
- OP.TYPE_ACCESS: 7
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 7
- Physical tampering: 2
- malfunction: 2
- SCA:
- DPA: 1
- SPA: 1
- timing attack: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- the application although it is possible that load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE TOE is the JavaCard Platform that supports the analysis of: 1
|
pdf_data/st_metadata |
|
- /Author: ITSCC
- /CreationDate: D:20110729101020+09'00'
- /Creator: PDFCreator Version 1.2.0
- /Keywords:
- /ModDate: D:20110729101020+09'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: [????] Security Target Lite_e
- pdf_file_size_bytes: 1626173
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 90
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |