name |
Canon imageRUNNER ADVANCE C9200 PRO Series / C7200 Series 2600.1 model (EX) Version:1.1
|
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model Version:1.0
|
category |
Multi-Function Devices
|
Multi-Function Devices
|
not_valid_before |
2013-07-11
|
2012-11-15
|
not_valid_after |
2018-08-07
|
2015-03-17
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0397_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0377_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Canon Inc.
|
Canon Inc.
|
manufacturer_web |
https://www.canon.com/
|
https://www.canon.com/
|
security_level |
ALC_FLR.2, EAL3+ |
ALC_FLR.2, EAL3+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0397_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0377_erpt.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) |
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
633636dca1347eda8eb30ddfbcc66396cc056f57bbf9aa5dd50bc04fbbe2b7a4
|
21f3608d095093c825b2aeedf3e0efbbfb425f3e1afc7475faf93bbbb3a23184
|
state/report/txt_hash |
164938b5ab6695052842231107ed4ba9701f9ec1f19a2358de5280e502ce3e10
|
a89e1b61ae3fd9e9fb7c0723d0edbae6d00c8a43fde2f1e1c4aa4055c16bf476
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
892ca90c7310a045b1fd3fec301593ace455c4e564a8feb0ea8c36c8e80bee98
|
583b769ea6ae2c094456e6954cc202ab48e8e91a05551db6ec78ebcd48fbc13b
|
state/st/txt_hash |
65d4a5154151ac09e5262b61642f8a6bae370bce0c64d0b4e9ebf5599ab9fa7d
|
f5225da4b415a630730674c33e93ccbb821eae3a4eaeed7259d94e084035d1f3
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0397
|
JISEC-CC-CRP-C0377
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_FLR.2, ALC_DVS.1, ALC_CMS.3, ADV_FSP.3, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, AGD_OPE.1, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ALC_CMC.3, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ADV_TDS.2, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2 |
ALC_FLR.2, ALC_DVS.1, ALC_CMS.3, ADV_FSP.3, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, AGD_OPE.1, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ALC_CMC.3, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ADV_TDS.2, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data/cert_id |
C0397
|
C0377
|
heuristics/scheme_data/certification_date |
2013-07
|
2012-11(Surveillance completed in 2014/07)
|
heuristics/scheme_data/claim |
EAL3+ALC_FLR.2
PP
|
EAL3+
ALC_FLR.2
PP
|
heuristics/scheme_data/enhanced |
- product:
Canon imageRUNNER ADVANCE C9200 PRO Series / C7200 Series 2600.1 model (EX)
- toe_version:
1.1
- product_type:
Multifunction Product
- certification_date:
2013-07-11
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor:
Canon Inc.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- report_link: https://www.ipa.go.jp/en/security/c0397_erpt.pdf
- cert_link: https://www.ipa.go.jp/en/security/c0397_eimg.pdf
- target_link: https://www.ipa.go.jp/en/security/c0397_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
- product:
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model
- toe_version:
1.0
- product_type:
Multifunction Product
- certification_date:
2012-11-15
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor:
Canon Inc.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL3 Augmented with ALC_FLR.2
|
EAL3 Augmented with ALC_FLR.2
|
heuristics/scheme_data/enhanced/cc_version |
3.1
|
3.1
|
heuristics/scheme_data/enhanced/certification_date |
2013-07-11
|
2012-11-15
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/enhanced/evaluation_facility |
ECSEC Laboratory Inc.
Evaluation Center
|
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
|
heuristics/scheme_data/enhanced/product |
Canon imageRUNNER ADVANCE C9200 PRO Series / C7200 Series 2600.1 model (EX)
|
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model
|
heuristics/scheme_data/enhanced/product_type |
Multifunction Product
|
Multifunction Product
|
heuristics/scheme_data/enhanced/protection_profile |
IEEE Std 2600.1-2009
|
IEEE Std 2600.1-2009
|
heuristics/scheme_data/enhanced/toe_version |
1.1
|
1.0
|
heuristics/scheme_data/enhanced/vendor |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/expiration_date |
2018-08
|
2015-03
|
heuristics/scheme_data/supplier |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/toe_japan_name |
-----
|
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model
1.0
(Certification of this product has been revoked 2015-03)
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0397_it3447.html
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0377_it1378.html
|
heuristics/scheme_data/toe_overseas_name |
Canon imageRUNNER ADVANCE C9200 PRO Series / C7200 Series 2600.1 model (EX)1.1
|
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model
1.0
(Certification of this product has been revoked 2015-03)
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
c0397_erpt.pdf
|
c0377_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0397-01:
1
- Certification No. C0397:
1
|
- CRP-C0377-01:
1
- Certification No. C0377:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.DOC:
4
- T.FUNC:
2
- T.PROT:
2
- T.CONF:
4
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
- T:
- T.DOC:
4
- T.FUNC:
2
- T.PROT:
2
- T.CONF:
4
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3:
4
- EAL3 augmented:
2
|
- EAL:
- EAL3:
4
- EAL3 augmented:
2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
pdf_data/report_keywords/standard_id/FIPS |
- FIPS PUB 186-2:
1
- FIPS 186-2: 1
|
|
pdf_data/report_keywords/standard_id/FIPS/FIPS PUB 186-2 |
1
|
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/Microsoft/Microsoft |
4
|
2
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20140911142543+09'00'
|
D:20121217134041+09'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//ModDate |
D:20140911142704+09'00'
|
D:20121217134143+09'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata/pdf_file_size_bytes |
312444
|
302163
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
35
|
32
|
pdf_data/st_filename |
c0397_est.pdf
|
c0377_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
pdf_data/st_keywords/cc_claims/D/D.CONF |
8
|
8
|
pdf_data/st_keywords/cc_claims/D/D.DOC |
20
|
16
|
pdf_data/st_keywords/cc_claims/D/D.FUNC |
11
|
11
|
pdf_data/st_keywords/cc_claims/D/D.PROT |
6
|
6
|
pdf_data/st_keywords/cc_claims/O |
- O.HDD:
8
- O.DOC:
16
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
14
- O.INTERFACE:
8
- O.SOFTWARE:
7
- O.AUDIT:
7
|
- O.HDD:
8
- O.DOC:
16
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
14
- O.INTERFACE:
8
- O.SOFTWARE:
7
- O.AUDIT:
7
|
pdf_data/st_keywords/cc_claims/OE |
- OE.AUDIT_STORAGE:
4
- OE.AUDIT_ACCESS:
4
- OE.INTERFACE:
4
- OE.PHYSICAL:
2
- OE.USER:
14
- OE.ADMIN:
8
- OE.AUDIT:
4
- OE.PHYISCAL:
2
|
- OE.AUDIT_STORAGE:
4
- OE.AUDIT_ACCESS:
4
- OE.INTERFACE:
4
- OE.PHYSICAL:
2
- OE.USER:
14
- OE.ADMIN:
8
- OE.AUDIT:
4
- OE.PHYISCAL:
2
|
pdf_data/st_keywords/cc_claims/T |
- T.DOC:
6
- T.FUNC:
3
- T.PROT:
3
- T.CONF:
6
|
- T.DOC:
6
- T.FUNC:
3
- T.PROT:
3
- T.CONF:
6
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.2:
12
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- APE:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.2:
12
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- APE:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3:
9
- EAL 3:
2
- EAL3 augmented:
8
- EAL 3 augmented:
1
|
- EAL:
- EAL3:
9
- EAL 3:
2
- EAL3 augmented:
8
- EAL 3 augmented:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
13
- FAU_GEN.2:
6
- FAU_SAR.1:
8
- FAU_SAR.2:
6
- FAU_STG.1:
8
- FAU_STG.4:
6
- FAU_GEN:
2
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
|
- FAU_GEN.1:
13
- FAU_GEN.2:
6
- FAU_SAR.1:
8
- FAU_SAR.2:
6
- FAU_STG.1:
8
- FAU_STG.4:
6
- FAU_GEN:
2
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
25
|
24
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
13
|
13
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
11
|
12
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
25
|
25
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
45
|
53
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
3
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
34
|
40
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
3
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
3
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
3
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
3
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_ATD.1:
9
- FIA_UAU.1:
13
- FIA_UID.1:
22
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_SOS.1:
6
- FIA_UAU.7:
7
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS.1.1:
1
|
- FIA_ATD.1:
9
- FIA_UAU.1:
13
- FIA_UID.1:
22
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_SOS.1:
6
- FIA_UAU.7:
7
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
25
|
23
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
24
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
25
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
33
|
33
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_CIP_EXP:
2
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_CIP_EXP.1:
16
- FPT_FDI_EXP.1:
11
- FPT_PHP.1:
6
- FPT_CIP_EXP.1.1:
2
- FPT_CIP_EXP.1.2:
3
- FPT_FDI_EXP.1.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
- FPT_CIP_EXP:
2
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_CIP_EXP.1:
16
- FPT_FDI_EXP.1:
11
- FPT_PHP.1:
6
- FPT_CIP_EXP.1.1:
2
- FPT_CIP_EXP.1.2:
3
- FPT_FDI_EXP.1.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- physical tampering:
4
- malfunction:
1
|
- FI:
- physical tampering:
4
- malfunction:
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 197:
3
- FIPS PUB 46-3:
1
- FIPS PUB 186-2:
4
|
- FIPS:
- FIPS PUB 197:
3
- FIPS PUB 46-3:
1
- FIPS PUB 186-2:
4
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft:
2
- Microsoft Corporation:
1
|
- Microsoft:
- Microsoft:
2
- Microsoft Corporation:
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
858676
- pdf_is_encrypted:
True
- pdf_number_of_pages:
65
- /Author:
- /CreationDate:
D:20140829144156+09'00'
- /Creator:
PScript5.dll Version 5.2.2
- /Keywords:
- /ModDate:
D:20140829144158+09'00'
- /Producer:
Adobe LiveCycle PDFGenerator
- /Subject:
- /Title:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
594622
- pdf_is_encrypted:
True
- pdf_number_of_pages:
66
- /Author:
- /CreationDate:
D:20121214132705+09'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20121214132705+09'00'
- /Producer:
Acrobat Distiller 10.1.4 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
|
|
pdf_data/st_metadata//CreationDate |
D:20140829144156+09'00'
|
D:20121214132705+09'00'
|
pdf_data/st_metadata//Creator |
PScript5.dll Version 5.2.2
|
PScript5.dll Version 5.2.2
|
pdf_data/st_metadata//ModDate |
D:20140829144158+09'00'
|
D:20121214132705+09'00'
|
pdf_data/st_metadata//Producer |
Adobe LiveCycle PDFGenerator
|
Acrobat Distiller 10.1.4 (Windows)
|
pdf_data/st_metadata//Title |
|
|
pdf_data/st_metadata/pdf_file_size_bytes |
858676
|
594622
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/st_metadata/pdf_number_of_pages |
65
|
66
|
dgst |
46f57303e91ecb57
|
9a348b23f2d8d73f
|