name |
Groove Cryptographic Services, (GrooveMisc.dll 2.5.0.1774, cryptopp.dll 5.0.4.0) |
Canon iR3025/iR3030/iR3035/iR3045 Series HDD Data Erase Kit-B1 Version: 1.00 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
06.09.2012 |
07.10.2013 |
not_valid_before |
17.09.2003 |
26.12.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID3010-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080310_c0136_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID3010-VR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080310_c0136_est.pdf |
manufacturer |
Groove Networks, Inc |
Canon Inc. |
manufacturer_web |
https://www.groove.net/ |
https://www.canon.com/ |
security_level |
EAL2+, ADV_SPM.1 |
EAL3 |
dgst |
410294ae4446185b |
72fee335b0e807c6 |
heuristics/cert_id |
|
JISEC-CC-CRP-C0136 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, AVA_MSU.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1, ADV_SPM.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
2.5.0.1774, 5.0.4.0 |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Sensitive Data Protection
- certification_date: 17.09.2003
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date:
- id: CCEVS-VR-VID3010
- product: Groove Cryptographic Services, (GrooveMisc.dll 2.5.0.1774, cryptopp.dll 5.0.4.0)
- scheme: US
- url: https://www.niap-ccevs.org/product/3010
- vendor: Groove Networks, Inc.
|
- cert_id: JISEC-CC-CRP-C0136
- certification_date: 01.12.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0136_eimg.pdf
- description: PRODUCT DESCRIPTION This product is software to be installed and used on the Canon multifunction product series iR3025/iR3030/iR3035/iR3045. The Canon iR3025/iR3030/iR3035/iR3045 series is a digital copier that offers a variety of functions including Copy, Send (Universal Send), Fax Reception, Mail Box, Print, and so on. It is also equipped with a large-capacity HDD and temporarily stores image data created during copying, printing, and other document handling operations on the HDD. In most standard multifunction products, such temporary image data is deleted only logically after use, i.e., upon completion of copying or printing, and residual information of deleted image data is not erased at all, being left exposed to the risk of reuse. The TOE is used for protecting any residual information of temporary image data from being reused.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Canon iR3025/iR3030/iR3035/iR3045 Series HDD Data Erase Kit-B1
- product_type: IT Product (data erase function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0136_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0136_est.pdf
- toe_version: Version 1.00
- vendor: Canon Inc.
- expiration_date: 01.10.2013
- supplier: Canon Inc.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0136_it7156.html
- toe_overseas_name: Canon iR3025/iR3030/iR3035/iR3045 Series HDD Data Erase Kit-B1 Version 1.00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ST_VID3010-ST.pdf |
20080310_c0136_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0136-01: 1
- Certification No. C0136: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_CAP: 1
- ACM_CAP.2: 3
- ACM_SCP: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.1: 3
- ADO_IGS.1: 7
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.1: 3
- ADV_RCR.1: 3
- ADV_SPM.1: 14
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 7
- AGD_USR: 1
- AGD_USR.1: 3
- ALC:
- ASE:
- ATE:
- ATE_COV: 1
- ATE_COV.1: 3
- ATE_DPT: 1
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.2: 1
- AVA_SOF: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 3
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 41
- FCS_CKM.1.1: 5
- FCS_CKM.4: 43
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 68
- FCS_COP.1.1: 11
- FDP:
- FDP_ACC.1: 20
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ETC.1: 10
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ITC.1: 32
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 14
- FIA_UID.1: 8
- FIA_UID.2: 16
- FMT:
- FMT_MOF: 1
- FMT_MSA.1: 15
- FMT_MSA.1.1: 1
- FMT_MSA.2: 46
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 2
- FPT_PHP: 1
- FPT_RCV: 1
- FPT_SEP.2: 1
- FPT_SEP.3: 1
- FPT_TST.1: 2
|
|
pdf_data/report_keywords/cc_claims |
- O:
- O.ALGORITHMS: 8
- O.SELF_TEST: 7
- O.TRUSTED_ADMIN: 1
- OE:
- OE.DAC: 8
- OE.DESTRUCT: 8
- OE.EXPORT: 7
- OE.IMPORT: 7
- OE.INIT_SECURE: 7
- OE.LIMIT_ACTIONS: 8
- OE.OS: 6
- OE.SECURE: 7
- OE.SECURITY_MGT: 8
- OE.SECURITY_ROLES: 7
- OE.TRUSTED_ADMIN: 5
- T:
- T.HACK_CRYPTO: 4
- T.MALFUNCTION: 4
|
- A:
- A.ADMIN: 1
- A.ADMIN_PWD: 1
- A.NETWORK: 1
- T:
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 12
- Diffie-Hellman: 15
- DSA:
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
- KA:
- Key Agreement: 3
- Key agreement: 3
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 3
- FIPS 180-1: 2
- FIPS 186-2: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 140-2: 3
- FIPS PUB 197: 2
- FIPS PUB 198: 2
- FIPS PUB 46-3: 2
- ISO:
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Kris Rogers
- /CreationDate: D:20030925151409-04'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20030925151946-03'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: APPENDIX E (CERTIFICATE POLICY TAXONOMY)
- pdf_file_size_bytes: 738149
- pdf_hyperlinks: http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
- /CreationDate: D:20080307122247+09'00'
- /ModDate: D:20080307122247+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 290251
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
ST_VID3010-VR.pdf |
20080310_c0136_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL2: 4
|
|
pdf_data/st_keywords/cc_sar |
- ADO:
- ADV:
- AGD:
- ALC:
- ASE:
- ATE:
|
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 4
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 4
- ADV_HLD.2: 3
- ADV_RCR.1: 4
- AGD:
- AGD_ADM.1: 4
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 4
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
|
- FDP:
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- T:
- T.HACK_CRYPTO: 1
- T.MALFUNCTION: 1
|
- A:
- A.ADMIN: 3
- A.ADMIN_PWD: 1
- A.NETWORK: 4
- A.PWD_MANAGE: 1
- O:
- O.ADMIN_AUTH: 4
- O.AUTH_BOX: 1
- O.RESIDUAL: 5
- OE:
- OE.ADMIN: 2
- OE.ADMIN_PWD: 2
- OE.NETWORK: 2
- T:
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 180-1: 1
- FIPS 46-3: 1
- ISO:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Jim Brosey
- /CreationDate: D:20030930100341-04'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20030930100448-03'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: 1 Executive Summary
- pdf_file_size_bytes: 335135
- pdf_hyperlinks: http://www.rsa.com/, http://www.smat.us/crypto/inet-crypto/#pgfId=32767
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /CreationDate: D:20080307122051+09'00'
- /ModDate: D:20080307122051+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 322243
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |