name |
Canon imageRUNNER ADVANCE C3300 Series 2600.1 model 1.0 |
bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software Version: A0R50Y0-0100-G00-11 (System Controller), A0R50Y0-1D00-G00-10 (BIOS Controller) |
category |
Multi-Function Devices |
Other Devices and Systems |
scheme |
JP |
JP |
status |
archived |
archived |
not_valid_after |
21.12.2020 |
09.12.2013 |
not_valid_before |
21.12.2015 |
30.10.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0495_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0190_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0495_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0190_est.pdf |
manufacturer |
Canon Inc. |
Konica Minolta Business Technologies, Inc |
manufacturer_web |
https://www.canon.com/ |
https://www.konicaminolta.com/ |
security_level |
EAL3+, ALC_FLR.2 |
EAL3 |
dgst |
4566e806bc0995e4 |
fe2f02fb20d5a072 |
heuristics/cert_id |
JISEC-CC-CRP-C0495 |
JISEC-CC-CRP-C0190 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, AVA_VLA.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
1.0, 2600.1 |
421, 11, 0100, 10, 501, 361 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0495
- certification_date: 01.12.2015
- claim: EAL3+ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL3 Augmented with ALC_FLR.2
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0495_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: Canon imageRUNNER ADVANCE C3300 Series 2600.1 model
- product_type: Multifunction Product
- protection_profile: IEEE Std 2600.1™-2009
- report_link: https://www.ipa.go.jp/en/security/c0495_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0495_est.pdf
- toe_version: 1.0
- vendor: Canon Inc.
- expiration_date: 01.01.2021
- revalidations: [frozendict({'date': '2017-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0495_it5552_01.html'})]
- supplier: Canon Inc.
- toe_japan_name: Canon imageRUNNER ADVANCE C3300 Series 2600.1 model1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0495_it5552.html
- toe_overseas_name: Canon imageRUNNER ADVANCE C33900KG/C3300KG/C3300 Series 2600.1 model1.1
|
- cert_id: JISEC-CC-CRP-C0190
- certification_date: 01.10.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0190_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functions TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Zentai Control Software English: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0190_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0190_est.pdf
- toe_version: A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.12.2013
- revalidations: [frozendict({'date': '2009-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0190_it8215_01.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Zentai Control Software A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0190_it8215.html
- toe_overseas_name: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
32475ccb695b1644 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0495_erpt.pdf |
c0190_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0495-01: 1
- Certification No. C0495: 1
|
- JP:
- CRP-C0190-01: 1
- Certification No. C0190: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 4
- EAL3 augmented: 3
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 2
- T.DOC: 2
- T.FUNC: 1
- T.PROT: 1
|
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-GROUP-B: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-NET-SET: 1
- T.ACCESS-PRIVATE: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTOR: 1
- T.BACKUP-RESTORE: 1
- T.BRING-OUT-CF: 2
- T.BRING-OUT-STOR: 1
- T.BRING-OUT-STORAGE: 1
- T.DISCARD-MFP: 2
- T.UNEXPECTEC-TRANSMISSION: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS 186-2: 1
- FIPS PUB 186-2: 1
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20160713090616+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160713155748+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 338540
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 35
|
- /CreationDate: D:20081211163158+09'00'
- /ModDate: D:20081211163158+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 308979
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
pdf_data/st_filename |
c0495_est.pdf |
c0190_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 2
- EAL 3 augmented: 1
- EAL3: 9
- EAL3 augmented: 8
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 12
- ALC_LCD.1: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR: 2
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 21
- FCS_CKM.1.1: 1
- FCS_CKM.2: 12
- FCS_CKM.2.1: 1
- FCS_CKM.4: 12
- FCS_COP: 5
- FCS_COP.1: 21
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 15
- FDP_ACC.1: 26
- FDP_ACC.1.1: 3
- FDP_ACE: 1
- FDP_ACE.1: 1
- FDP_ACF: 9
- FDP_ACF.1: 22
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ACFI: 1
- FDP_IFC: 1
- FDP_IFC.1: 3
- FDP_IFF: 1
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU: 3
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 5
- FIA_UID.1: 21
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 14
- FMT_MSA.1: 10
- FMT_MSA.1.1: 2
- FMT_MSA.3: 18
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 4
- FMT_MTD.1: 14
- FMT_MTD.1.1: 2
- FMT_SME.1: 2
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 30
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_CIP: 1
- FPT_CIP_EXP: 2
- FPT_CIP_EXP.1: 15
- FPT_CIP_EXP.1.1: 2
- FPT_CIP_EXP.1.2: 3
- FPT_FDI: 1
- FPT_FDI_EXP: 2
- FPT_FDI_EXP.1: 10
- FPT_FDI_EXP.1.1: 2
- FPT_PHP.1: 4
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_STM: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 13
- FTA_SSL.3.1: 2
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 11
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 4
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 57
- FDP_ACC.1.1: 3
- FDP_ACF.1: 41
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ACP.1: 1
- FDP_IFC.1: 6
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 61
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 8
- FIA_ATD.1: 26
- FIA_ATD.1.1: 1
- FIA_EID: 2
- FIA_EID.1: 16
- FIA_EID.1.1: 3
- FIA_EID.1.2: 1
- FIA_NEW.1.2: 2
- FIA_SOS: 1
- FIA_SOS.1: 47
- FIA_SOS.1.1: 6
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU.1: 23
- FIA_UAU.2: 67
- FIA_UAU.2.1: 6
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 18
- FIA_UAU.7.1: 1
- FIA_UID.1: 31
- FIA_UID.2: 49
- FIA_UID.2.1: 7
- FIA_USB.1: 22
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 31
- FMT_MOF.1.1: 4
- FMT_MSA: 3
- FMT_MSA.1: 32
- FMT_MSA.1.1: 3
- FMT_MSA.3: 31
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 5
- FMT_MTD.1: 101
- FMT_MTD.1.1: 12
- FMT_SMF.1: 107
- FMT_SMF.1.1: 1
- FMT_SMR.1: 164
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SMS.1: 1
- FMT_SOS.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 2
- A.ADMIN: 4
- A.USER: 3
- D:
- D.CONF: 10
- D.DOC: 16
- D.DOC_: 1
- D.FUNC: 12
- D.PROT: 6
- O:
- O.AUDIT: 3
- O.CONF: 9
- O.DOC: 8
- O.FUNC: 5
- O.HDD: 5
- O.INTERFACE: 4
- O.PROT: 6
- O.SOFTWARE: 4
- O.USER: 11
- O._: 1
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 4
- OE.AUDIT_ACCESS: 4
- OE.AUDIT_STORAGE: 4
- OE.INTERFACE: 2
- OE.PHYSICAL: 2
- OE.USER: 10
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
- A:
- A.ADMIN: 3
- A.NETWORK: 4
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.AUTH-CAPABILITY: 9
- O.CHECK-CF: 4
- O.CHECK-HDD: 6
- O.CONFIG: 11
- O.CRYPT-KEY: 5
- O.CRYPTO-CAPABILITY: 4
- O.CRYPTO-MAIL: 4
- O.GROUP-BOX: 5
- O.LOCK-CF-CAPABILITY: 4
- O.LOCK-HDD-CAPABILITY: 6
- O.OVERWRITE-ALL: 6
- O.PRIVATE-BOX: 5
- O.PUBLIC-BOX: 7
- O.REGISTERED-USER: 13
- O.SECURE-PRINT: 7
- O.TRUSTED-PASS: 6
- OE:
- OE.ADMIN: 2
- OE.CRYPT: 3
- OE.CRYPTO: 1
- OE.FEED-BACK: 10
- OE.LOCK-CF: 3
- OE.LOCK-HDD: 3
- OE.NETWORK: 2
- OE.SECRET: 2
- OE.SERVER: 5
- OE.SERVICE: 2
- OE.SESSION: 2
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS-GROUP-BOX: 3
- T.ACCESS-NET-SETTING: 1
- T.ACCESS-PRIVATE-BOX: 3
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-CF: 2
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTEC-TRANSMISSION: 1
- T.UNEXPECTED-TRANSMISSION: 1
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 2
- Microsoft Corporation: 1
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- malfunction: 1
- physical tampering: 4
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 186-2: 4
- FIPS PUB 197: 3
- FIPS PUB 46-3: 1
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186: 1
- FIPS 186-1: 1
- FIPS 186-2: 4
- FIPS PUB 197: 3
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- the main body of MFP or through the network. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in: 1
|
pdf_data/st_metadata |
- /Author: Canon Inc.
- /CreationDate: D:20160701154943+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords:
- /ModDate: D:20160701154949+09'00'
- /Producer: Adobe LiveCycle PDFGenerator
- /Subject:
- /Title: Canon imageRUNNER ADVANCE C3300 Series 2600.1 model Security Target
- pdf_file_size_bytes: 1426774
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 65
|
- /Author: e02518
- /CreationDate: D:20081205143523+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20081205143523+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: Microsoft Word - 【C0190】英文ST掲載用081205.doc
- pdf_file_size_bytes: 735960
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 108
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
True |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |