Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Nexor MMHS Security
CCEVS-VR-0095-2005
EOS-1D Mark II firmware Ver.1.0.1
JISEC-CC-CRP-C0010
name Nexor MMHS Security EOS-1D Mark II firmware Ver.1.0.1
scheme US JP
not_valid_after 07.09.2012 20.12.2010
not_valid_before 14.03.2005 01.01.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4034-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0010_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4034-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0010_est.pdf
manufacturer Nexor Ltd Canon Inc.
manufacturer_web https://www.nexor.com/ https://www.canon.com/
security_level EAL2 EAL2+, ALC_DVS.1
dgst 609ea7cf6b1ef36c b0c543b69416411f
heuristics/cert_id CCEVS-VR-0095-2005 JISEC-CC-CRP-C0010
heuristics/cert_lab US []
heuristics/extracted_sars ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 ALC_DVS.1, ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1
heuristics/extracted_versions - 1.0.1
heuristics/scheme_data
  • category: Secure Messaging
  • certification_date: 14.03.2005
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date:
  • id: CCEVS-VR-VID4034
  • product: Nexor MMHS Security
  • scheme: US
  • url: https://www.niap-ccevs.org/product/4034
  • vendor: Nexor Ltd.
  • cert_id: JISEC-CC-CRP-C0010
  • certification_date: 01.08.2004
  • claim: EAL2+ ALC_DVS.1
  • enhanced:
    • assurance_level: EAL2+ALC_DVS.1
    • description: PRODUCT DESCRIPTION The product is EOS-1D Mark II digital camera in which the firmware of the digital camera (TOE) was included. Unlike the conventional 35mm film photos, the photos taken by the digital camera have various merits. For example, the photos taken by digital camera do not require development and printing, these photos do no have secular degradation, and these photos are easy to store, search and transmit. On the other hand, because of digitized photos, there are some demerits that digitized photos have the feature that processing and alteration can be easily performed using photo retouch tools. In using the photos taken by the digital camera as the evidence, the integrity of the photos is becoming a big issue. The firmware which is TOE provides the function that generate the verification data, which verify the integrity of the photos taken by EOS-1D Mark II. Please refer to "EOS-1D Mark II" on the following URLs for detail information about the product. (English) http://www.canon.co.jp/Imaging/BeBit-e.html
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.Evaluation Center
    • product: EOS-1D Mark II firmware Ver.1.0.1
    • product_type: IT product (Embedded software)
    • vendor: Canon Inc.
  • expiration_date: 01.07.2011
  • revalidations: [frozendict({'date': '2005-11', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0010_it4023_02.html'})]
  • supplier: Canon Inc.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0010_it4023.html
  • toe_japan_name: EOS-1D Mark II firmware Ver.1.0.1
  • toe_overseas_link: None
  • toe_overseas_name: EOS-1D Mark II N firmware Ver.1.0.1A
pdf_data/report_filename st_vid4034-vr.pdf c0010_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-05-0095
    • cert_item: Nexor MMHS Security
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-05-0095: 1
  • JP:
    • CRP-C0010-01: 1
    • Certification No. C0010: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 4: 1
    • EAL2: 1
  • EAL:
    • EAL2: 3
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_VLA.1: 1
  • ALC:
    • ALC_DVS.1: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.LOWEXP: 1
  • A:
    • A.TAMPER: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 24
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC4: 2
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • FIPS:
    • FIPS PUB 198: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_metadata
  • /Author: .
  • /CreationDate: D:20050404165433-04'00'
  • /Creator: Acrobat PDFMaker 5.0 for Word
  • /ModDate: D:20050404165437-03'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: National Information Assurance Partnership
  • pdf_file_size_bytes: 260096
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
  • /CreationDate: D:20051222105917+09'00'
  • /ModDate: D:20051222105917+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 86516
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename st_vid4034-st.pdf c0010_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 5
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
    • EAL2+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 13
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 7
  • ADV:
    • ADV_FSP.1: 10
    • ADV_HLD.1: 13
    • ADV_RCR.1: 6
  • AGD:
    • AGD_ADM.1: 13
    • AGD_USR.1: 11
  • ATE:
    • ATE_COV.1: 6
    • ATE_FUN.1: 11
    • ATE_IND.2: 9
  • AVA:
    • AVA_SOF.1: 8
    • AVA_VLA.1: 10
  • ACM:
    • ACM_CAP.2: 6
  • ADO:
    • ADO_DEL.1: 5
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 12
    • ADV_HLD.1: 8
    • ADV_RCR.1: 6
  • AGD:
    • AGD_ADM.1: 9
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 9
  • ATE:
    • ATE_COV.1: 6
    • ATE_FUN.1: 5
    • ATE_IND.2: 6
  • AVA:
    • AVA_SOF.1: 6
    • AVA_VLA.1: 4
pdf_data/st_keywords/cc_sfr
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.2: 7
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
    • FCO_NRR: 1
    • FCO_NRR.2: 5
    • FCO_NRR.2.1: 1
    • FCO_NRR.2.2: 1
    • FCO_NRR.2.3: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 2
    • FDP_IFC.2: 7
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 5
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 2
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 2
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.2: 6
  • FPT:
    • FPT_RVM.1: 1
  • FTP:
    • FTP_SEP.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.LOWEXP: 4
  • O:
    • O.ACCESS: 4
    • O.IDENT: 6
    • O.LABEL: 5
    • O.REPUD: 4
    • O.SIG: 5
  • OE:
    • OE.ADMIN: 3
    • OE.AUTH: 6
    • OE.LOWEXP: 2
  • T:
    • T.ACCESS: 3
    • T.NOAUTH: 3
    • T.REPUDIATION: 3
  • A:
    • A.TAMPER: 5
  • O:
    • O.GEN_KEY: 8
    • O.GEN_VD: 9
  • OE:
    • OE.LOG_TAMER: 2
    • OE.LOG_TAMPER: 8
    • OE.PHS_TAMPER: 10
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 23
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
  • FIPS:
    • FIPS PUB 198: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • cryptographic algorithm). The algorithm of the secure hash function (cryptographic algorithm) is out of scope of the strength of function: 1
    • cryptographic algorithm). The algorithm of the secure hash function (cryptographic algorithm) is out of scope of the strength of function. 6.4 Assurance Measures This section provides the TOE assurance: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: SAIC
  • /CreationDate: D:20050516141803Z
  • /Creator: Acrobat PDFMaker 5.0 for Word
  • /ModDate: D:20050516102030-04'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: NEXOR Products
  • pdf_file_size_bytes: 865652
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 37
  • /CreationDate: D:20051222105245+09'00'
  • /ModDate: D:20051222105245+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 106178
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different