Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon imageRUNNER ADVANCE DX 6870i/6870/6860i/6860/6855i with Fax & PDL1822
JISEC-CC-CRP-C0761-01-2022
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58)
ANSSI-CC-2023/58
name Canon imageRUNNER ADVANCE DX 6870i/6870/6860i/6860/6855i with Fax & PDL1822 Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58)
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 15.09.2027 28.12.2028
not_valid_before 15.09.2022 28.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0761_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_58en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0761_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_58en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0761_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_58en.pdf
manufacturer Canon Inc. Apple Inc.
manufacturer_web https://www.canon.com/ https://www.apple.com/
security_level {} EAL2+, ADV_FSP.3
dgst 4284c83103bdc985 a5696b3d01538604
heuristics/cert_id JISEC-CC-CRP-C0761-01-2022 ANSSI-CC-2023/58
heuristics/cpe_matches cpe:2.3:a:canon:imagerunner_6870:-:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:*
heuristics/related_cves CVE-2008-0303, CVE-2006-4680 CVE-2024-54510, CVE-2025-24237, CVE-2024-23262, CVE-2024-23220, CVE-2025-24159, CVE-2023-28191, CVE-2024-27807, CVE-2024-44131, CVE-2024-40780, CVE-2024-44308, CVE-2023-38593, CVE-2024-44276, CVE-2025-30434, CVE-2024-44233, CVE-2024-44126, CVE-2024-54514, CVE-2024-27851, CVE-2023-32359, CVE-2023-32411, CVE-2023-41980, CVE-2025-24107, CVE-2024-23212, CVE-2024-54497, CVE-2024-44241, CVE-2024-44158, CVE-2023-40423, CVE-2024-40824, CVE-2023-42939, CVE-2024-27871, CVE-2024-23290, CVE-2025-30467, CVE-2023-42839, CVE-2024-44192, CVE-2024-23222, CVE-2025-24244, CVE-2023-40419, CVE-2025-24264, CVE-2025-31192, CVE-2025-24201, CVE-2024-44204, CVE-2023-32376, CVE-2023-28826, CVE-2024-44198, CVE-2024-40782, CVE-2024-44274, CVE-2023-32416, CVE-2024-44296, CVE-2024-27855, CVE-2024-27874, CVE-2024-27834, CVE-2024-54513, CVE-2024-44124, CVE-2025-31183, CVE-2024-40853, CVE-2023-41071, CVE-2024-54469, CVE-2023-35074, CVE-2024-54478, CVE-2023-40385, CVE-2024-40826, CVE-2023-38604, CVE-2023-41993, CVE-2024-54468, CVE-2025-31201, CVE-2023-40438, CVE-2025-24167, CVE-2025-24149, CVE-2024-23210, CVE-2024-27802, CVE-2023-32396, CVE-2023-40432, CVE-2024-54541, CVE-2025-30471, CVE-2023-42934, CVE-2025-24179, CVE-2023-38603, CVE-2024-27815, CVE-2024-27845, CVE-2023-32381, CVE-2023-38261, CVE-2024-23287, CVE-2024-44194, CVE-2024-54494, CVE-2024-40785, CVE-2025-24158, CVE-2023-42957, CVE-2023-41063, CVE-2025-24182, CVE-2025-30438, CVE-2023-40396, CVE-2023-41232, CVE-2023-38590, CVE-2024-44201, CVE-2024-27796, CVE-2024-27879, CVE-2024-44263, CVE-2023-42883, CVE-2025-31200, CVE-2023-38605, CVE-2023-42949, CVE-2024-27811, CVE-2024-27869, CVE-2024-23264, CVE-2023-34352, CVE-2023-42870, CVE-2023-41995, CVE-2023-32372, CVE-2023-42890, CVE-2023-42922, CVE-2023-38565, CVE-2023-42956, CVE-2025-24091, CVE-2024-27801, CVE-2024-44171, CVE-2024-23263, CVE-2024-40806, CVE-2023-32420, CVE-2024-44147, CVE-2023-38614, CVE-2024-27819, CVE-2024-54564, CVE-2023-40395, CVE-2024-40856, CVE-2025-24208, CVE-2025-24127, CVE-2024-27805, CVE-2025-24283, CVE-2024-23214, CVE-2023-42961, CVE-2024-40857, CVE-2024-44261, CVE-2025-24243, CVE-2025-24251, CVE-2024-27823, CVE-2024-23239, CVE-2025-24214, CVE-2024-27831, CVE-2024-44187, CVE-2025-24104, CVE-2025-31203, CVE-2023-40400, CVE-2024-40786, CVE-2023-42878, CVE-2023-32407, CVE-2023-39434, CVE-2024-44155, CVE-2024-23213, CVE-2024-54551, CVE-2024-40798, CVE-2025-31202, CVE-2023-40454, CVE-2024-40833, CVE-2023-40384, CVE-2023-40448, CVE-2024-40809, CVE-2025-30426, CVE-2025-24173, CVE-2023-42916, CVE-2024-40867, CVE-2024-0258, CVE-2023-32428, CVE-2024-54507, CVE-2023-42974, CVE-2024-44227, CVE-2024-44123, CVE-2023-32361, CVE-2024-40851, CVE-2023-32399, CVE-2023-32384, CVE-2024-27832, CVE-2024-40793, CVE-2023-40442, CVE-2024-23217, CVE-2024-23270, CVE-2024-23242, CVE-2025-30469, CVE-2024-27838, CVE-2024-27839, CVE-2024-54492, CVE-2025-24163, CVE-2025-30427, CVE-2023-41983, CVE-2024-54486, CVE-2024-40863, CVE-2024-27816, CVE-2024-23251, CVE-2024-54500, CVE-2023-28202, CVE-2024-44252, CVE-2025-24210, CVE-2023-35984, CVE-2024-27852, CVE-2023-40424, CVE-2024-44229, CVE-2023-41976, CVE-2024-44242, CVE-2023-38133, CVE-2023-40429, CVE-2024-44206, CVE-2023-41968, CVE-2024-23205, CVE-2024-27848, CVE-2024-44273, CVE-2023-42855, CVE-2023-32432, CVE-2025-30456, CVE-2023-40452, CVE-2025-24131, CVE-2024-40822, CVE-2024-40771, CVE-2023-32404, CVE-2023-42953, CVE-2023-32371, CVE-2023-42866, CVE-2025-24211, CVE-2025-24154, CVE-2023-40427, CVE-2023-40399, CVE-2025-24097, CVE-2024-23289, CVE-2023-41065, CVE-2024-40854, CVE-2023-41174, CVE-2022-3970, CVE-2023-38611, CVE-2025-24145, CVE-2024-27806, CVE-2024-40840, CVE-2024-23278, CVE-2023-32367, CVE-2023-42899, CVE-2024-23288, CVE-2024-44239, CVE-2023-40437, CVE-2024-44180, CVE-2025-24160, CVE-2024-23246, CVE-2023-42946, CVE-2023-42917, CVE-2024-40779, CVE-2023-32390, CVE-2023-41977, CVE-2023-32388, CVE-2023-40443, CVE-2025-24193, CVE-2023-42848, CVE-2024-54538, CVE-2023-40394, CVE-2023-42823, CVE-2023-42873, CVE-2023-40403, CVE-2024-40835, CVE-2023-32365, CVE-2024-54470, CVE-2024-23257, CVE-2025-30428, CVE-2024-27880, CVE-2023-42950, CVE-2025-24213, CVE-2024-27789, CVE-2025-30463, CVE-2024-27800, CVE-2024-27850, CVE-2025-24162, CVE-2023-42951, CVE-2023-41069, CVE-2024-40795, CVE-2023-32409, CVE-2024-54485, CVE-2024-23231, CVE-2024-23296, CVE-2024-54503, CVE-2023-27930, CVE-2025-24137, CVE-2023-41992, CVE-2025-30470, CVE-2023-42962, CVE-2023-32412, CVE-2025-31184, CVE-2025-30433, CVE-2024-23284, CVE-2024-27817, CVE-2023-35990, CVE-2024-23228, CVE-2024-54526, CVE-2024-40852, CVE-2023-32434, CVE-2023-42834, CVE-2023-41974, CVE-2024-44302, CVE-2025-24252, CVE-2025-24209, CVE-2024-54508, CVE-2023-40409, CVE-2023-42841, CVE-2024-27821, CVE-2024-40813, CVE-2025-24161, CVE-2023-41997, CVE-2023-38592, CVE-2024-27863, CVE-2024-44212, CVE-2023-42969, CVE-2024-27836, CVE-2024-23254, CVE-2024-44282, CVE-2023-32437, CVE-2024-54502, CVE-2024-27804, CVE-2024-44164, CVE-2024-44290, CVE-2025-30432, CVE-2024-54517, CVE-2024-44269, CVE-2023-41254, CVE-2024-54535, CVE-2025-24126, CVE-2024-23208, CVE-2025-30430, CVE-2023-40428, CVE-2024-44234, CVE-2025-24150, CVE-2025-24113, CVE-2024-27828, CVE-2023-42846, CVE-2023-42952, CVE-2023-38600, CVE-2023-42942, CVE-2025-24178, CVE-2023-32439, CVE-2024-40830, CVE-2023-42849, CVE-2024-54658, CVE-2024-40776, CVE-2024-44165, CVE-2023-42914, CVE-2023-40420, CVE-2024-40796, CVE-2024-44145, CVE-2023-36495, CVE-2024-27803, CVE-2024-40777, CVE-2024-27856, CVE-2024-23282, CVE-2023-42893, CVE-2023-38424, CVE-2023-40413, CVE-2023-40410, CVE-2024-44205, CVE-2023-40434, CVE-2023-38594, CVE-2023-42936, CVE-2024-23243, CVE-2025-24202, CVE-2024-27810, CVE-2024-27799, CVE-2023-40431, CVE-2025-30447, CVE-2025-31197, CVE-2023-41982, CVE-2024-44185, CVE-2025-24177, CVE-2023-41986, CVE-2023-42896, CVE-2024-23283, CVE-2025-24180, CVE-2024-54488, CVE-2023-37450, CVE-2023-42824, CVE-2025-24124, CVE-2025-31191, CVE-2025-24086, CVE-2023-41984, CVE-2025-24198, CVE-2025-24190, CVE-2024-54525, CVE-2023-32402, CVE-2024-4558, CVE-2024-54558, CVE-2024-54550, CVE-2025-24221, CVE-2025-24123, CVE-2025-30439, CVE-2025-24117, CVE-2024-40787, CVE-2024-44258, CVE-2025-24200, CVE-2023-42852, CVE-2024-54501, CVE-2024-44191, CVE-2023-41070, CVE-2023-41061, CVE-2024-23259, CVE-2023-40447, CVE-2025-24271, CVE-2024-23293, CVE-2025-24270, CVE-2024-40788, CVE-2024-40844, CVE-2023-40529, CVE-2024-44255, CVE-2024-23280, CVE-2024-23240, CVE-2025-24194, CVE-2023-42857, CVE-2024-40778, CVE-2024-40789, CVE-2024-44139, CVE-2023-38597, CVE-2023-42977, CVE-2023-40416, CVE-2023-42925, CVE-2024-23297, CVE-2024-44176, CVE-2023-40408, CVE-2024-27835, CVE-2023-32357, CVE-2024-23250, CVE-2023-42970, CVE-2024-44169, CVE-2023-32415, CVE-2025-24085, CVE-2023-42833, CVE-2024-44183, CVE-2023-32400, CVE-2023-41068, CVE-2023-38136, CVE-2023-41981, CVE-2023-40417, CVE-2024-27840, CVE-2024-23291, CVE-2023-41991, CVE-2024-44259, CVE-2025-30454, CVE-2025-24128, CVE-2024-40850, CVE-2024-54467, CVE-2024-44278, CVE-2023-40412, CVE-2024-44235, CVE-2023-38610, CVE-2023-32422, CVE-2024-44218, CVE-2023-38595, CVE-2024-44170, CVE-2023-41074, CVE-2025-24216, CVE-2023-38410, CVE-2024-23265, CVE-2024-27820, CVE-2024-44127, CVE-2023-38598, CVE-2023-32413, CVE-2024-23206, CVE-2024-44254, CVE-2024-54534, CVE-2023-32389, CVE-2024-23219, CVE-2024-44277, CVE-2023-42923, CVE-2025-24205, CVE-2024-27841, CVE-2023-32392, CVE-2023-42937, CVE-2023-38580, CVE-2024-44202, CVE-2024-44167, CVE-2023-40391, CVE-2023-41060, CVE-2024-40815, CVE-2024-23286, CVE-2024-27833, CVE-2023-40528, CVE-2024-54512, CVE-2023-42869, CVE-2024-23271, CVE-2024-23218, CVE-2024-23226, CVE-2024-54505, CVE-2024-27876, CVE-2024-23225, CVE-2024-44217, CVE-2025-24141, CVE-2024-23256, CVE-2024-27808, CVE-2024-40839, CVE-2024-27884, CVE-2024-40812, CVE-2023-42875, CVE-2023-40441, CVE-2024-27873, CVE-2024-44299, CVE-2023-32394, CVE-2024-44207, CVE-2024-44184, CVE-2024-54518, CVE-2025-24206, CVE-2023-38596, CVE-2023-40520, CVE-2024-23215, CVE-2025-24129, CVE-2025-30445, CVE-2023-32403, CVE-2023-38606, CVE-2025-24257, CVE-2023-41064, CVE-2023-38572, CVE-2023-42884, CVE-2023-42843, CVE-2025-24230, CVE-2024-44232, CVE-2024-40791, CVE-2024-44244, CVE-2023-42919, CVE-2024-40805, CVE-2023-40414, CVE-2024-1580, CVE-2024-40774, CVE-2023-42947, CVE-2023-32354, CVE-2024-40818, CVE-2023-32441, CVE-2024-23211, CVE-2025-30425, CVE-2023-42928, CVE-2025-24217, CVE-2024-23255, CVE-2023-42871, CVE-2023-32373, CVE-2024-27791, CVE-2024-44136, CVE-2025-24212, CVE-2023-32734, CVE-2023-34425, CVE-2024-44215, CVE-2024-40794, CVE-2024-54523, CVE-2023-32368, CVE-2024-27857, CVE-2024-44200, CVE-2023-38425, CVE-2024-54522, CVE-2024-27826, CVE-2024-23235, CVE-2023-38612, CVE-2024-44297, CVE-2024-54499, CVE-2024-40784, CVE-2024-27818, CVE-2024-27859, CVE-2023-32408, CVE-2025-24238, CVE-2023-42941, CVE-2023-38599, CVE-2025-31182, CVE-2023-32423, CVE-2024-23292, CVE-2025-24095, CVE-2023-42888, CVE-2023-32385, CVE-2024-44179, CVE-2023-28204, CVE-2024-23201, CVE-2024-40829, CVE-2023-32352, CVE-2023-45866, CVE-2024-40836, CVE-2024-23241, CVE-2024-54479, CVE-2024-54542, CVE-2023-40392, CVE-2024-54530, CVE-2023-40439, CVE-2024-23223, CVE-2024-27847, CVE-2023-32445, CVE-2023-40456, CVE-2023-42872, CVE-2024-54543, CVE-2024-44144, CVE-2023-35993, CVE-2025-24192, CVE-2023-32391, CVE-2025-30429, CVE-2023-32419, CVE-2023-41073, CVE-2023-40449, CVE-2024-44309, CVE-2024-27830, CVE-2023-40446, CVE-2023-32398, CVE-2024-23273, CVE-2023-32425, CVE-2023-32433, CVE-2024-40799, CVE-2023-42836, CVE-2024-54560, CVE-2024-44251, CVE-2024-44240, CVE-2024-54527
heuristics/extracted_sars AGD_OPE.1, ASE_SPD.1, ADV_FSP.1, ASE_REQ.1, ASE_OBJ.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, AGD_PRE.1, ALC_CMS.1, ALC_CMC.1, ASE_INT.1, ASE_TSS.1, ATE_IND.1 ADV_ARC.1, ATE_IND.2, ADV_FSP.3, AGD_PRE.1, AGD_OPE.1, ASE_REQ.2, ADV_TDS.1, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ATE_FUN.1
heuristics/extracted_versions 6870, 6860 16.4.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0761
  • certification_date: 01.09.2022
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0761
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000jny-att/c0761_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Product that has print, scan, copy, fax, and document storage and retrieval function. The TOE provides the security functionality required by the protection profile for Multifunction Product, “Protection Profile for Hardcopy Devices 1.0”. TOE security functionality The TOE provides the following security functions: User Authentication Functions Access Control Functions SSD Data Encryption Function LAN Data Protection Function Signature Verification/Generation Function Management Functions Audit Log Function Highly Reliable Update Function Self-Testing Function PSTN Fax-Network Separation Function
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE DX 6870i/6870/6860i/6860/6855i with Fax & PDL
    • product_type: Multifunction Product
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000jny-att/c0761_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000jny-att/c0761_est.pdf
    • toe_version: 1822
    • vendor: Canon Inc.
  • expiration_date:
  • supplier: Canon Inc.
  • toe_japan_name: Canon imageRUNNER ADVANCE DX 6870i / 6870 / 6860i / 6860 / 6855i with Fax & PDL1822
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0761_it2813.html
  • toe_overseas_name: Canon imageRUNNER ADVANCE DX 6870i / 6870 / 6860i / 6860 / 6855i with Fax & PDL1822
heuristics/protection_profiles b2cfec7a92fa2940 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf {}
pdf_data/cert_filename c0761_eimg.pdf certificat-CC-2023_58en.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0761-01-2022: 1
  • FR:
    • ANSSI-CC-2023/58: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
  • Thales:
    • THALES/CNES: 2
pdf_data/cert_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/cert_metadata
  • /CreationDate: D:20221006115317+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20221006115543+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 87167
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20240222154440+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155211+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 138204
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename c0761_erpt.pdf ANSSI-CC-2023_58en.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0761-01-2022: 1
  • FR:
    • ANSSI-CC-2023/58: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 3
    • EAL2 augmented: 1
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Basic: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 3
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • Thales:
    • THALES/CNES: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 9
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 1
  • XEX:
    • XEX: 1
  • XTS:
    • XTS: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 12
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
  • /CreationDate: D:20221011155652+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20221011155759+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 456728
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
pdf_data/st_filename c0761_est.pdf ANSSI-cible-CC-2023_58en.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 1
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ASE:
    • ASE_SPD.1: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP: 1
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 2
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 8
    • FAU_GEN.1: 5
    • FAU_GEN.2: 1
    • FAU_SAR: 2
    • FAU_SAR.2: 1
    • FAU_STG: 9
    • FAU_STG.4: 2
  • FCS:
    • FCS_CKM: 27
    • FCS_CKM.1: 13
    • FCS_CKM.4: 4
    • FCS_COP: 30
    • FCS_COP.1: 28
    • FCS_HTT: 5
    • FCS_HTTP: 4
    • FCS_IPS: 4
    • FCS_IPSE: 16
    • FCS_KYC: 5
    • FCS_RBG: 9
    • FCS_SMC: 5
    • FCS_TLS: 4
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 2
    • FDP_ACF: 3
    • FDP_ACF.1: 7
    • FDP_DSK: 6
    • FDP_FXS: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 2
    • FIA_ATD: 2
    • FIA_ATD.1: 1
    • FIA_PMG: 5
    • FIA_PSK: 4
    • FIA_UAU: 6
    • FIA_UAU.1: 2
    • FIA_UID: 3
    • FIA_UID.1: 7
    • FIA_USB: 4
  • FMT:
    • FMT_MOF: 1
    • FMT_MSA: 12
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD: 4
    • FMT_SMF: 6
    • FMT_SMF.1: 1
    • FMT_SMR: 5
    • FMT_SMR.1: 3
  • FPT:
    • FPT_KYP: 1
    • FPT_SKP: 4
    • FPT_STM: 2
    • FPT_STM.1: 2
    • FPT_TST: 4
    • FPT_TUD: 7
  • FTA:
    • FTA_SSL: 3
    • FTA_SSL.3: 2
  • FTP:
    • FTP_ITC: 5
    • FTP_ITC.1: 4
    • FTP_TRP: 4
    • FTP_TRP.1: 1
  • FDP:
    • FDP_ACC: 23
    • FDP_ACC.1: 9
    • FDP_ACC.2: 4
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 19
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 8
    • FDP_ETC.2: 2
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 7
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 4
    • FDP_ITT.1.1: 1
    • FDP_RIP.1: 15
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 10
    • FDP_SDI.1.1: 1
    • FDP_UCT: 4
    • FDP_UCT.1: 1
    • FDP_UIT: 4
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 7
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 11
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 4
    • FPT_RPL.1: 2
  • FTP:
    • FTP_ITC: 6
    • FTP_ITC.1: 5
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.PHYSIC: 1
    • A.TRAINE: 1
  • D:
    • D.TSF: 6
    • D.USER: 5
  • OE:
    • OE.AD: 2
    • OE.PH: 1
  • T:
    • T.NET_CO: 1
    • T.TSF_FA: 1
    • T.UNAUT: 1
  • A:
    • A.CDCVM: 3
    • A.DE-: 1
    • A.DEVICE_AUTH: 2
    • A.PERSO: 3
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • T:
    • T.COR-: 1
    • T.CORRUPT: 1
    • T.PHYSI-: 1
    • T.PHYSICAL: 1
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIM-: 1
    • T.SKIMMING: 1
    • T.USURP: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • STMicroelectronics:
    • STM: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 25
      • AES-: 1
  • constructions:
    • MAC:
      • HMAC: 12
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • DH: 18
    • DSA:
      • DSA: 10
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 12
      • SHA1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 11
      • SHA-384: 5
      • SHA-512: 4
      • SHA2: 2
      • SHA256: 8
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 20
    • IKEv1: 18
    • IKEv2: 6
  • IPsec:
    • IPsec: 19
  • SSH:
    • SSH: 8
  • TLS:
    • TLS:
      • TLS: 66
      • TLS 1.0: 3
      • TLS 1.1: 3
      • TLS 1.2: 1
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 20
    • PRNG: 2
  • RNG:
    • RBG: 14
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 7
  • XTS:
    • XTS: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 18
    • P-384: 14
    • P-521: 8
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
  • IBM:
    • SE: 66
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 3: 1
    • FIPS 60: 1
    • FIPS PUB 1: 1
    • FIPS PUB 186: 20
    • FIPS PUB 19: 2
  • ISO:
    • ISO/IEC 1011: 2
  • NIST:
    • NIST SP 800-3: 4
    • SP 800-3: 1
    • SP 800-38: 1
    • SP 800-38A: 1
    • SP 800-90A: 1
  • RFC:
    • RFC 2246: 2
    • RFC 28: 1
    • RFC 2818: 2
    • RFC 3: 4
    • RFC 3602: 2
    • RFC 4: 3
    • RFC 41: 1
    • RFC 4106: 1
    • RFC 4109: 2
    • RFC 43: 4
    • RFC 4301: 2
    • RFC 4303: 2
    • RFC 4304: 4
    • RFC 4868: 7
    • RFC 524: 2
    • RFC 5246: 2
    • RFC 5282: 1
    • RFC 5996: 1
    • RFC3: 1
    • RFC4304: 1
    • RFC4868: 1
  • FIPS:
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Passcode D.User_Bio D.Card_Data T.RECOVER Card Re- covery An attacker attempts to recover: 1
pdf_data/st_metadata
  • /Author: Canon Inc.
  • /CreationDate: D:20221006094106+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /Keywords:
  • /ModDate: D:20221006094111+09'00'
  • /Producer: Adobe LiveCycle PDFGenerator
  • /Subject:
  • /Title: Canon imageRUNNER ADVANCE DX 6870i/6870/6860i/6860/6855i with Fax & PDL Security Target
  • pdf_file_size_bytes: 1987576
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 101
  • /CreationDate: D:20231108181326Z
  • /Creator: Word
  • /ModDate: D:20231108181351Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] iPhone_A15Bionic_iPhoneSE3_iOS16_SecurityTarget_v1.4.docx
  • pdf_file_size_bytes: 2448380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different