Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon imageRUNNER ADVANCE DX 6980i with PDL310
JISEC-CC-CRP-C0794-01-2023
Red Hat Enterprise Linux 7.6
CCEVS-VR-VID-11039-2020
name Canon imageRUNNER ADVANCE DX 6980i with PDL310 Red Hat Enterprise Linux 7.6
category Multi-Function Devices Operating Systems
scheme JP US
status active archived
not_valid_after 27.10.2028 17.07.2022
not_valid_before 27.10.2023 17.07.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0794_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11039-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0794_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11039-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0794_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11039-st.pdf
manufacturer Canon Inc. Red Hat, Inc.
manufacturer_web https://www.canon.com/ https://www.redhat.com
dgst 539fc4878d6e6b1e cc3d2ca9465d2b00
heuristics/cert_id JISEC-CC-CRP-C0794-01-2023 CCEVS-VR-VID-11039-2020
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:7.6:*:*:*:*:*:*:*, cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_aus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.6_s390x:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2018-18492, CVE-2011-2767, CVE-2017-3144, CVE-2018-20615, CVE-2014-7169, CVE-2018-2815, CVE-2018-17961, CVE-2017-1000111, CVE-2017-12899, CVE-2018-8786, CVE-2016-3715, CVE-2018-18356, CVE-2017-10078, CVE-2018-2640, CVE-2017-3136, CVE-2015-0797, CVE-2019-14287, CVE-2017-10274, CVE-2015-7529, CVE-2017-3157, CVE-2017-15129, CVE-2018-12373, CVE-2016-2775, CVE-2015-0382, CVE-2017-10087, CVE-2019-9506, CVE-2017-5203, CVE-2017-12902, CVE-2016-1838, CVE-2016-5018, CVE-2017-12987, CVE-2015-3276, CVE-2018-14645, CVE-2018-1301, CVE-2014-0384, CVE-2018-17972, CVE-2014-2497, CVE-2019-3855, CVE-2016-8610, CVE-2018-12372, CVE-2015-7852, CVE-2017-3243, CVE-2018-12386, CVE-2017-5208, CVE-2017-9775, CVE-2020-27779, CVE-2018-1106, CVE-2017-10102, CVE-2018-12377, CVE-2017-10356, CVE-2018-3760, CVE-2015-5739, CVE-2017-6011, CVE-2018-16511, CVE-2018-14618, CVE-2019-2422, CVE-2015-4752, CVE-2018-8777, CVE-2018-14362, CVE-2018-17456, CVE-2016-7426, CVE-2017-10074, CVE-2019-3816, CVE-2016-5444, CVE-2017-6009, CVE-2018-2798, CVE-2018-12364, CVE-2018-5950, CVE-2015-4830, CVE-2018-19134, CVE-2018-14633, CVE-2018-18498, CVE-2017-10346, CVE-2018-2952, CVE-2017-10107, CVE-2017-3533, CVE-2016-9446, CVE-2018-12359, CVE-2016-8743, CVE-2018-14638, CVE-2015-3214, CVE-2017-3143, CVE-2021-20225, CVE-2017-1000116, CVE-2018-12385, CVE-2018-15688, CVE-2018-12390, CVE-2018-2814, CVE-2017-3302, CVE-2017-3651, CVE-2017-3135, CVE-2018-12379, CVE-2018-2665, CVE-2018-16540, CVE-2018-17183, CVE-2017-0902, CVE-2018-18445, CVE-2017-3265, CVE-2016-2857, CVE-2015-0374, CVE-2019-6454, CVE-2016-3718, CVE-2013-5704, CVE-2017-3291, CVE-2016-3710, CVE-2018-2668, CVE-2015-5165, CVE-2018-2761, CVE-2018-5345, CVE-2017-7668, CVE-2018-12374, CVE-2017-10135, CVE-2014-8139, CVE-2018-2781, CVE-2015-8896, CVE-2016-2518, CVE-2017-10378, CVE-2016-4578, CVE-2015-4757, CVE-2018-19475, CVE-2016-6794, CVE-2014-9584, CVE-2018-18494, CVE-2017-3142, CVE-2018-18559, CVE-2015-1779, CVE-2016-5403, CVE-2016-0762, CVE-2016-4020, CVE-2016-7035, CVE-2018-5379, CVE-2018-5740, CVE-2017-3453, CVE-2018-12393, CVE-2017-10350, CVE-2018-18314, CVE-2016-10165, CVE-2018-2771, CVE-2016-9401, CVE-2018-19409, CVE-2017-10384, CVE-2018-12383, CVE-2017-3137, CVE-2018-10850, CVE-2018-5155, CVE-2020-14372, CVE-2018-16864, CVE-2018-2800, CVE-2017-16541, CVE-2016-5612, CVE-2018-5146, CVE-2018-2678, CVE-2017-15710, CVE-2016-3627, CVE-2018-12366, CVE-2017-6010, CVE-2018-16850, CVE-2019-12384, CVE-2017-10268, CVE-2016-2125, CVE-2018-5168, CVE-2014-5353, CVE-2015-0381, CVE-2014-8964, CVE-2018-3169, CVE-2015-7702, CVE-2017-10349, CVE-2014-2431, CVE-2017-10115, CVE-2018-11763, CVE-2020-25647, CVE-2022-0330, CVE-2017-17405, CVE-2015-2648, CVE-2018-8088, CVE-2018-5750, CVE-2017-3238, CVE-2017-18017, CVE-2014-8141, CVE-2018-2813, CVE-2015-3152, CVE-2018-12389, CVE-2018-1000140, CVE-2018-18397, CVE-2018-2755, CVE-2018-18500, CVE-2018-5185, CVE-2017-3258, CVE-2015-2571, CVE-2018-7550, CVE-2018-2602, CVE-2017-5848, CVE-2016-3712, CVE-2018-2618, CVE-2019-6116, CVE-2018-14354, CVE-2020-25632, CVE-2018-5162, CVE-2015-3281, CVE-2014-9585, CVE-2014-2419, CVE-2018-1000156, CVE-2015-2573, CVE-2015-2808, CVE-2015-0499, CVE-2019-1010238, CVE-2018-2579, CVE-2015-4792, CVE-2018-10873, CVE-2017-10110, CVE-2017-10108, CVE-2014-6271, CVE-2015-4816, CVE-2017-10193, CVE-2014-6568, CVE-2016-5011, CVE-2014-4341, CVE-2017-15715, CVE-2014-8140, CVE-2014-3468, CVE-2018-2622, CVE-2018-18506, CVE-2018-12378, CVE-2018-2790, CVE-2018-5157, CVE-2016-5126, CVE-2017-3653, CVE-2018-12387, CVE-2018-14646, CVE-2018-2629, CVE-2017-9287, CVE-2017-10198, CVE-2017-15121, CVE-2018-11806, CVE-2018-18073, CVE-2018-14357, CVE-2015-5160, CVE-2016-9600, CVE-2017-3464, CVE-2016-5624, CVE-2018-8778, CVE-2018-5748, CVE-2019-3813, CVE-2018-16802, CVE-2018-7225, CVE-2018-5407, CVE-2018-12396, CVE-2018-16866, CVE-2018-6797, CVE-2018-3214, CVE-2018-12360, CVE-2018-12376, CVE-2015-0441, CVE-2018-2599, CVE-2014-2430, CVE-2016-9811, CVE-2018-15909, CVE-2018-3139, CVE-2017-10978, CVE-2017-3167, CVE-2018-16865, CVE-2017-10053, CVE-2017-10285, CVE-2017-3145, CVE-2018-2641, CVE-2018-1000001, CVE-2014-2440, CVE-2014-8160, CVE-2019-3835, CVE-2014-3469, CVE-2017-12617, CVE-2014-2438, CVE-2016-1833, CVE-2017-1000251, CVE-2017-10357, CVE-2015-4826, CVE-2017-1000115, CVE-2019-3856, CVE-2018-2796, CVE-2018-7566, CVE-2015-0505, CVE-2018-5733, CVE-2019-10160, CVE-2018-2677, CVE-2018-15127, CVE-2018-5170, CVE-2017-10090, CVE-2018-2817, CVE-2019-14816, CVE-2018-2588, CVE-2018-12405, CVE-2015-0391, CVE-2016-1839, CVE-2017-5645, CVE-2018-5183, CVE-2016-1837, CVE-2018-12365, CVE-2019-3838, CVE-2016-6796, CVE-2015-7703, CVE-2016-6797, CVE-2018-16539, CVE-2018-5188, CVE-2018-6574, CVE-2015-4643, CVE-2021-3656, CVE-2019-11811, CVE-2014-2432, CVE-2017-10345, CVE-2018-6871, CVE-2017-5333, CVE-2018-9568, CVE-2014-7815, CVE-2017-0899, CVE-2016-5387, CVE-2018-1283, CVE-2015-2590, CVE-2016-3492, CVE-2018-14665, CVE-2016-5824, CVE-2018-8787, CVE-2017-5205, CVE-2018-7858, CVE-2015-3195, CVE-2017-10379, CVE-2017-5332, CVE-2015-8631, CVE-2015-2582, CVE-2016-5440, CVE-2018-1312, CVE-2017-15041, CVE-2018-3639, CVE-2015-4815, CVE-2017-17833, CVE-2021-4034, CVE-2018-12392, CVE-2015-4861, CVE-2016-1908, CVE-2017-3539, CVE-2019-14835, CVE-2017-9776, CVE-2018-16871, CVE-2017-10295, CVE-2018-2634, CVE-2015-8391, CVE-2015-5740, CVE-2018-6927, CVE-2021-20233, CVE-2017-10388, CVE-2017-0903, CVE-2018-5683, CVE-2017-3244, CVE-2019-3878, CVE-2018-16863, CVE-2016-1762, CVE-2015-7701, CVE-2018-12363, CVE-2017-3308, CVE-2018-16396, CVE-2018-2819, CVE-2019-0223, CVE-2017-10355, CVE-2017-12896, CVE-2018-14622, CVE-2017-3309, CVE-2015-0501, CVE-2018-10675, CVE-2019-8308, CVE-2015-4913, CVE-2017-15906, CVE-2018-1000805, CVE-2016-4448, CVE-2016-3427, CVE-2018-5158, CVE-2015-3196, CVE-2018-14634, CVE-2018-15911, CVE-2018-18312, CVE-2019-11235, CVE-2017-3641, CVE-2018-2562, CVE-2019-10182, CVE-2014-7844, CVE-2016-1834, CVE-2018-5156, CVE-2017-10348, CVE-2017-10111, CVE-2015-7692, CVE-2015-4495, CVE-2018-18501, CVE-2019-7221, CVE-2016-7091, CVE-2018-6914, CVE-2015-4836, CVE-2018-18493, CVE-2018-19476, CVE-2014-7840, CVE-2015-8126, CVE-2018-5161, CVE-2016-1836, CVE-2019-6133, CVE-2017-3318, CVE-2018-1068, CVE-2019-3863, CVE-2016-0651, CVE-2019-11135, CVE-2017-12613, CVE-2017-5202, CVE-2020-27749, CVE-2017-1000407, CVE-2017-1000366, CVE-2017-10067, CVE-2018-3180, CVE-2018-2797, CVE-2018-5150, CVE-2015-4870, CVE-2018-5154, CVE-2018-2767, CVE-2018-14650, CVE-2018-2663, CVE-2015-4858, CVE-2018-12020, CVE-2018-2637, CVE-2014-2436, CVE-2018-5159, CVE-2018-2794, CVE-2018-5184, CVE-2015-2568, CVE-2018-16541, CVE-2017-10089, CVE-2018-18311, CVE-2017-10347, CVE-2017-9462, CVE-2016-9675, CVE-2018-2799, CVE-2019-10167, CVE-2015-4879, CVE-2017-7980, CVE-2016-7163, CVE-2016-6662, CVE-2017-3544, CVE-2018-5145, CVE-2017-10281, CVE-2017-10116, CVE-2018-18284, CVE-2017-3600, CVE-2016-5629, CVE-2019-3815, CVE-2018-15908, CVE-2017-10101, CVE-2014-3581, CVE-2014-3615, CVE-2017-14064, CVE-2017-10109, CVE-2015-8629, CVE-2018-19477, CVE-2016-5626, CVE-2018-3136, CVE-2018-3149, CVE-2018-17466, CVE-2018-1049, CVE-2014-9529, CVE-2017-3456, CVE-2018-2633, CVE-2017-10243, CVE-2018-18505, CVE-2015-0433, CVE-2019-10168, CVE-2015-7691, CVE-2016-9583, CVE-2017-8291, CVE-2018-2795, CVE-2017-10096, CVE-2017-12615, CVE-2017-9788, CVE-2018-12207, CVE-2016-8864, CVE-2015-2643, CVE-2017-0901, CVE-2019-6974, CVE-2018-14624, CVE-2017-0900, CVE-2018-11784, CVE-2019-3857, CVE-2018-1086, CVE-2017-5204, CVE-2017-3636, CVE-2017-1000410, CVE-2016-0642, CVE-2017-10664, CVE-2017-3317, CVE-2017-9461, CVE-2015-3147, CVE-2019-10166, CVE-2017-1000083, CVE-2018-19115, CVE-2018-2603, CVE-2015-4802, CVE-2016-1840, CVE-2016-9131, CVE-2018-3693, CVE-2016-9560, CVE-2018-3183, CVE-2016-8635, CVE-2015-4864, CVE-2015-7704, CVE-2018-12362, CVE-2018-6560, CVE-2018-5178, CVE-2018-18313, CVE-2014-3467
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1
heuristics/extracted_versions - 7.6
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0794
  • certification_date: 01.10.2023
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0794
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/kcrmqo00000000kn-att/c0794_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Product that has print, scan, copy and document storage and retrieval function. The TOE provides the security functionality required by the protection profile for Multifunction Product, “Protection Profile for Hardcopy Devices 1.0”. TOE security functionality The TOE provides the following security functions: User Authentication Functions Access Control Functions SSD Data Encryption Function LAN Data Protection Function Signature Verification/Generation Function Management Functions Audit Log Function Highly Reliable Update Function Self-Testing Function
    • evaluation_facility: ECSEC Laboratory Inc., Evaluation Center
    • product: Canon imageRUNNER ADVANCE DX 6980i with PDL
    • product_type: Multifunction Product
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/kcrmqo00000000kn-att/c0794_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/kcrmqo00000000kn-att/c0794_est.pdf
    • toe_version: 310
    • vendor: Canon Inc.
  • expiration_date:
  • supplier: Canon Inc.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0794_it3843.html
  • toe_overseas_name: Canon imageRUNNER ADVANCE DX 6980i with PDL 310
  • category: Operating System
  • certification_date: 17.07.2020
  • evaluation_facility: Acumen Security
  • expiration_date: 17.07.2022
  • id: CCEVS-VR-VID11039
  • product: Red Hat Enterprise Linux 7.6
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11039
  • vendor: Red Hat, Inc.
heuristics/protection_profiles b2cfec7a92fa2940 e34797b67a3163c5, 236bced46aeb26ba
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ssh_ep_v1.0.pdf
pdf_data/cert_filename c0794_eimg.pdf st_vid11039-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0794-01-2023: 1
  • US:
    • CCEVS-VR-VID11039-2020: 1
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/cert_metadata
  • /Author:
  • /CreationDate: D:20231205102227+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20231205102353+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20231205012130
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 165804
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20200723090200-04'00'
  • /ModDate: D:20200723090200-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181023
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0794_erpt.pdf st_vid11039-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID11039-2020
    • cert_item: for the Red Hat Enterprise Linux Version 7.6, Version 1.0
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0794-01-2023: 1
  • US:
    • CCEVS-VR-VID11039-2020: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.2: 2
    • FCS_COP.1: 7
    • FCS_DRBG_EXT.1: 1
    • FCS_SSHC_EXT.1: 5
    • FCS_SSHS_EXT.1: 2
    • FCS_TLSC_EXT.1: 4
    • FCS_TLSC_EXT.4: 1
  • FPT:
    • FPT_TST_EXT.1: 1
    • FPT_TUD_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 3
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • Acumen:
    • Acumen Security: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 2
  • ECC:
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 6
  • RSA:
    • RSA 2048: 1
    • RSA 4096: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 3
      • SHA-384: 2
      • SHA-512: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 9
  • SSH:
    • SSH: 33
    • SSHv2: 4
  • TLS:
    • TLS:
      • TLS: 13
      • TLSv1.2: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
  • XEX:
    • XEX: 1
  • XTS:
    • XTS: 2
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 16
    • P-521: 12
pdf_data/report_keywords/crypto_library
  • NSS:
    • NSS: 2
  • OpenSSL:
    • OpenSSL: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20231211095955+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20231211100059+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20231206082417
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 487698
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 30
pdf_data/st_filename c0794_est.pdf st_vid11039-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 1
    • EAL1 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 15
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 1
    • FAU_STG_EXT: 5
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 48
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 6
    • FCS_CKM_EXT.4: 31
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 137
    • FCS_COP.1.1: 7
    • FCS_KDF_EXT.1: 8
    • FCS_KYC_EXT: 4
    • FCS_KYC_EXT.1: 7
    • FCS_KYC_EXT.1.1: 2
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 31
    • FCS_RBG_EXT.1.1: 4
    • FCS_RBG_EXT.1.2: 4
    • FCS_SMC_EXT: 4
    • FCS_SMC_EXT.1: 16
    • FCS_SMC_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT: 2
    • FCS_TLS_EXT.1: 21
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT: 2
    • FDP_DSK_EXT.1: 5
    • FDP_DSK_EXT.1.1: 3
    • FDP_DSK_EXT.1.2: 3
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_PMG: 4
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 2
    • FIA_PSK_EXT.1: 10
    • FIA_PSK_EXT.1.1: 3
    • FIA_PSK_EXT.1.2: 3
    • FIA_PSK_EXT.1.3: 3
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 18
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_KYP_EXT: 2
    • FPT_KYP_EXT.1: 4
    • FPT_KYP_EXT.1.1: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 13
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 3
    • FPT_TUD_EXT.1.2: 3
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 2
  • FTP:
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 26
    • FCS_COP.1.1: 6
    • FCS_DRBG_EXT.1: 1
    • FCS_RBG_EXT.1: 3
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1: 7
    • FCS_SSHC_EXT.1.1: 2
    • FCS_SSHC_EXT.1.2: 1
    • FCS_SSHC_EXT.1.3: 1
    • FCS_SSHC_EXT.1.4: 1
    • FCS_SSHC_EXT.1.5: 1
    • FCS_SSHC_EXT.1.6: 1
    • FCS_SSHC_EXT.1.7: 1
    • FCS_SSHC_EXT.1.8: 1
    • FCS_SSHS_EXT.1: 7
    • FCS_SSHS_EXT.1.1: 2
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSH_EXT.1: 3
    • FCS_SSH_EXT.1.1: 1
    • FCS_STO_EXT.1: 3
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 8
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.4: 1
  • FDP:
    • FDP_ACF_EXT.1: 4
    • FDP_ACF_EXT.1.1: 1
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.1.1: 2
  • FPT:
    • FPT_ACF_EXT.1: 3
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT.1: 3
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT.1: 3
    • FPT_SBOP_EXT.1.1: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 2
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB.1: 3
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 3
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 9
    • D.USER: 5
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 1
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 26
      • AES-: 3
  • constructions:
    • MAC:
      • HMAC: 14
  • AES_competition:
    • AES:
      • AES: 9
      • AES-: 1
      • AES-128: 1
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 4
      • HMAC-SHA-384: 3
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 10
    • ECDSA:
      • ECDSA: 19
  • FF:
    • DH:
      • DH: 15
    • DSA:
      • DSA: 6
  • ECC:
    • ECC:
      • ECC: 7
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • Diffie-Hellman: 8
  • RSA:
    • RSA 2048: 4
    • RSA 4096: 2
    • RSA2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 14
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 21
      • SHA-384: 11
      • SHA-512: 12
      • SHA2: 1
      • SHA256: 9
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-256: 9
      • SHA-384: 7
      • SHA-512: 7
      • SHA2: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 19
    • IKEv1: 22
    • IKEv2: 9
  • IPsec:
    • IPsec: 31
  • SSH:
    • SSH: 9
  • TLS:
    • TLS:
      • TLS: 69
      • TLS 1.0: 3
      • TLS 1.1: 3
      • TLS 1.2: 5
  • SSH:
    • SSH: 92
    • SSHv2: 5
  • TLS:
    • TLS:
      • TLS: 32
      • TLS 1.2: 1
      • TLSv1.2: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 19
    • PRNG: 3
  • RNG:
    • RBG: 7
  • PRNG:
    • DRBG: 5
  • RNG:
    • RBG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • GCM:
    • GCM: 8
  • XTS:
    • XTS: 7
  • CBC:
    • CBC: 5
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 30
    • P-384: 14
    • P-521: 8
  • NIST:
    • P-256: 34
    • P-384: 36
    • P-521: 22
    • secp256r1: 1
    • secp384r1: 1
    • secp521r1: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 5
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • NSS:
    • NSS: 3
  • OpenSSL:
    • OpenSSL: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-3: 2
    • FIPS PUB 186-4: 40
    • FIPS PUB 197: 9
    • FIPS PUB 198-1: 3
  • ISO:
    • ISO/IEC 10116: 4
    • ISO/IEC 18031:2011: 8
    • ISO/IEC 18033-3: 2
    • ISO/IEC 19772: 4
  • NIST:
    • NIST SP 800-38A: 4
    • NIST SP 800-38B: 2
    • NIST SP 800-38C: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-90A: 8
  • RFC:
    • RFC 2246: 3
    • RFC 2818: 4
    • RFC 3602: 11
    • RFC 4106: 9
    • RFC 4109: 4
    • RFC 4301: 5
    • RFC 4303: 3
    • RFC 4304: 6
    • RFC 4346: 3
    • RFC 4868: 9
    • RFC 5246: 5
    • RFC 5282: 3
    • RFC3602: 1
    • RFC4304: 1
    • RFC4868: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 3
    • FIPS 197: 1
    • FIPS 198-1: 1
    • FIPS PUB 186-4: 4
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
    • SP 800-56A: 2
    • SP 800-56B: 1
  • RFC:
    • RFC 3526: 1
    • RFC 4251: 1
    • RFC 4253: 2
    • RFC 5246: 13
    • RFC 5280: 4
    • RFC 5288: 8
    • RFC 5289: 16
    • RFC 5759: 1
    • RFC 6125: 1
  • X509:
    • X.509: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Canon Inc.
  • /CreationDate: D:20231205132219+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20231205132431+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: Canon imageRUNNER ADVANCE DX 6980i with PDL Security Target
  • pdf_file_size_bytes: 894935
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 93
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different