Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon imageRUNNER ADVANCE C356/C256 Series 2600 model 1.0
JISEC-CC-CRP-C0586-01-2018
EROAD System
SERTIT-059
name Canon imageRUNNER ADVANCE C356/C256 Series 2600 model 1.0 EROAD System
category Multi-Function Devices Other Devices and Systems
scheme JP NO
not_valid_after 26.01.2023 25.06.2020
not_valid_before 26.01.2018 25.06.2015
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0586_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0586_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20150625_SERTIT-059_CR_v10.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0586_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_EROAD_v1.3_FINAL.pdf
manufacturer Canon Inc. EROAD
manufacturer_web https://www.canon.com/ https://www.eroad.com/
security_level EAL2+, ALC_FLR.2 EAL2+, ALC_FLR.1
dgst 575f398928bd6336 69552df11adc055e
heuristics/cert_id JISEC-CC-CRP-C0586-01-2018 SERTIT-059
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 1.0 -
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0586
  • certification_date: 01.01.2018
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)PP
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_id: JISEC-CC-CRP-C0586
    • cert_link: https://www.ipa.go.jp/en/security/c0586_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™「-2009) defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication FunctionFunction for identifying and authenticating the user. - Function Use Restriction FunctionFunction for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction FunctionFunction for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs FunctionFunction for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase FunctionFunction for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption FunctionFunction for encrypting all data stored in the HDD. - LAN Data Protection FunctionFunction for protecting all IP packets that are communicated with an IT device. - Self-Test FunctionFunction for testing the integrity of the executable code at startup. - Audit Log FunctionFunction for generating audit logs on security events, allowing them to be viewed by the administrator and sending them to an external file server. - Management FunctionFunction for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE C356/C256 Series 2600 model
    • product_type: Multifunction Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™「-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0586_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0586_est.pdf
    • toe_version: 1.0
    • vendor: Canon Inc.
  • expiration_date: 01.02.2023
  • supplier: Canon Inc.
  • toe_japan_name: Canon imageRUNNER ADVANCE C356/C256 Series 2600 model1.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0586_it7652.html
  • toe_overseas_name: Canon imageRUNNER ADVANCE C356/C256 Series 2600 model1.0
  • category: Other Devices and Systems
  • certification_date: 25.06.2015
  • developer: EROAD
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-059
    • certification_date: 25.06.2015
    • description: EROAD is a fully integrated technology, tolling and services provider. EROAD is the first company in the world to implement a GPS/cellular based road charging platform across an entire country. EROAD's advanced technology provides road charging, compliance and commercial services with the same platform to lower overall client and delivery costs. EROAD's goal is to offer flexible and powerful solutions based on our innovative technology platform to assist in the creation of a transport sector that is responsive to the evolving needs of business, government and the wider community. The core element of EROAD's satellite-based solution is the secure Ehubo unit which reliably and accurately measures distance and location using multiple sensors. Data is transmitted via a secure cellular link to a back office facility that supports a wide range of regulatory and value-added applications, allowing clients to manage their vehicles and assets in the same web browser. The EROAD Depot is the secure web services and payment gateway, where customers manage their tax and compliance obligations, oversee their fleets, and access a wide range of EROAD services. It provides a comprehensive and evolving suite of reports that can be viewed, saved, exported and downloaded. Within the Depot, users are assigned - roles' which give them access to different functions and, depending on their role, allow them to create and filter fleets to focus on critical information.
    • developer: EROAD
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/134947-1607951850/SERTIT/Sertifikater/2015/59/20150626_Sertit-059_C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/134944-1607951845/SERTIT/Sertifikater/2015/59/ST_EROAD_v1.3_FINAL.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134941-1607951842/SERTIT/Sertifikater/2015/59/20150625_SERTIT-059_CR_v10.pdf'})]})
    • evaluation_facility: Advanced Data Security
    • expiration_date: 25.06.2020
    • level: EAL 2, ALC_FLR.1
    • mutual_recognition: CCRA
    • product: TOE versions of EROAD OBU:Hardware version: 03Firmware version: 1.18.05;TOE versions of EROAD Application:Software version: 11-11-2014-0239
    • sponsor: EROAD
  • product: EROAD System
  • url: https://sertit.no/certified-products/product-archive/eroad-system
heuristics/protection_profiles 43ce79b420f23a00 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf {}
pdf_data/cert_filename c0586_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0586-01-2018: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20180322153832+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180322153936+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 147388
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename c0586_erpt.pdf 20150625_SERTIT-059_CR_v10.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0586-01-2018: 1
  • NO:
    • SERTIT-059: 17
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
  • EAL:
    • EAL 2: 18
    • EAL 2 augmented: 18
    • EAL 4: 1
    • EAL1: 1
    • EAL2: 1
    • EAL7: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 19
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_ITT_EXP.1: 1
    • FPT_PHP.2: 1
    • FPT_STM.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
  • A:
    • A.AREA: 1
    • A.MANAGE: 1
  • O:
    • O.ACCESS: 1
    • O.ADMINISTRATION: 1
    • O.AUDIT: 1
    • O.CRYPTOGRAPHY: 1
    • O.CRYPTO_VALIDATED: 1
    • O.ID_AUTH: 1
    • O.INTEGRITY: 1
    • O.PROTECT: 1
    • O.TAMPER_RESISTANCE: 1
  • OE:
    • OE.PERSON: 1
    • OE.PROTECTION: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • ADS:
    • Advanced Data Security: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 8
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
    • physical tampering: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 15408: 4
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • 1 SERTIT-059 CR Issue 1.0 25 June 2015 Page 15 of 16 these underlying environmental components are out of scope insofar as the TOE is concerned. TOE Documentation The supporting guidance documents evaluated in: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20180605153417+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180605153451+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 331679
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
  • /Author: Arne
  • /CreationDate: D:20150626141410+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20150626141544+02'00'
  • /Producer: Acrobat Distiller 9.5.5 (Windows)
  • /Title: Microsoft Word - 20150625 SERTIT-059 CR v.1.0
  • pdf_file_size_bytes: 561714
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename c0586_est.pdf ST_EROAD_v1.3_FINAL.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2: 8
    • EAL2 augmented: 7
  • EAL:
    • EAL2: 5
    • EAL2 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 11
  • APE:
    • APE_ECD: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 6
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 14
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 14
    • FCS_COP.1: 25
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 46
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 35
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UID.1: 23
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 25
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 19
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 25
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 15
    • FTA_SSL.3.1: 2
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 12
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 22
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 20
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 12
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT_EXP.1: 11
    • FPT_ITT_EXP.1.1: 2
    • FPT_PHP.2: 8
    • FPT_PHP.2.1: 1
    • FPT_PHP.2.2: 1
    • FPT_PHP.2.3: 1
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 8
    • D.DOC: 18
    • D.FUNC: 11
    • D.PROT: 6
  • O:
    • O.AUDIT: 6
    • O.CONF: 14
    • O.DOC: 14
    • O.FUNC: 7
    • O.INTERFACE: 7
    • O.PROT: 7
    • O.SOFTWARE: 6
    • O.STORAGE: 6
    • O.USER: 13
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.AREA: 2
    • A.MANAGE: 2
  • O:
    • O.ACCESS: 7
    • O.ADMINISTRATION: 10
    • O.AUDIT: 9
    • O.CRYPTOGRAPHY: 10
    • O.CRYPTO_VALIDATED: 6
    • O.ID_AUTH: 5
    • O.INTEGRITY: 8
    • O.PROTECT: 10
    • O.TAMPER_RESISTANCE: 6
  • OE:
    • OE.PERSON: 9
    • OE.PROTECTION: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
  • FF:
    • DH:
      • DH: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 5
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • malfunction: 6
    • physical tampering: 9
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 3
  • FIPS:
    • FIPS 140-2: 7
    • FIPS 186-4: 1
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 2
    • FIPS PUB 198: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • private, secure, and not exposed. Therefore, these underlying environmental components are out of scope insofar as the TOE is concerned. Further, EROAD security is stand alone, isolated, self-contained: 1
    • protects and secures the OBU Gateway and communications with it, but that environment is out of scope insofar as the TOE is concerned. ESP Server The ESP server and associated protocol (Ebox to Server: 1
pdf_data/st_metadata
  • /Author: Canon Inc.
  • /CreationDate: D:20180531165000+09'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20180531165218+09'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Canon imageRUNNER ADVANCE C356/C256 Series 2600 model Security Target
  • pdf_file_size_bytes: 1015794
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 61
  • /Author: Admin
  • /CreationDate: D:20150618214315-07'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20150618214315-07'00'
  • /Producer: GPL Ghostscript 8.64
  • /Title: Microsoft Word - ST EROAD v1.3 - FINAL.docx
  • pdf_file_size_bytes: 1236897
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different