name |
HDD Data Encryption Kit E-Series 2.10 |
Smart card reader SPR332 firmware version 6.01 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
25.04.2021 |
01.09.2019 |
not_valid_before |
25.04.2016 |
19.02.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0592a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0592b_pdf.pdf |
manufacturer |
Canon Inc. |
SCM Microsystems GmbH |
manufacturer_web |
https://www.canon.com/ |
https://www.scmmicro.com/ |
security_level |
EAL3 |
EAL3+ |
dgst |
62bf2f602b0262f1 |
4dea0e662a7132d0 |
heuristics/cert_id |
JISEC-CC-CRP-C0506 |
BSI-DSZ-CC-0592-2010 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, ADV_FSP.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, AVA_VAN.4, ATE_DPT.1, AVA_SOF.1, AVA_MSU.3, ADV_IMP.1 |
heuristics/extracted_versions |
2.10 |
6.01 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0394-2006 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0394-2006 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0506
- certification_date: 01.04.2016
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0506_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an optional hardware product to encrypt data to be stored in the HDD of Canon Multifunctional Product (MFP) and printer. By using this product, data to be stored in the HDD can be encrypted without compromising the scalability or processing performance of the Canon MFP and printer. TOE security functionality The TOE provides the following security functions. - HDD Data Encryption - Cryptographic Key Management - Self-Test
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: HDD Data Encryption Kit E-Series
- product_type: Cryptographic hardware for MFPs and printers
- report_link: https://www.ipa.go.jp/en/security/c0506_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0506_est.pdf
- toe_version: 2.10
- vendor: Canon Inc.
- expiration_date: 01.05.2021
- revalidations: [frozendict({'date': '2017-04', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534_02.html'})]
- supplier: Canon Inc.
- toe_japan_name: HDD Data Encryption Kit E-Series 2.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534.html
- toe_overseas_name: HDD Data Encryption Kit E-Series 2.11
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0506_erpt.pdf |
0592a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0592-2010
- cert_item: Smart card reader SPR332 firmware version 6.01
- cert_lab: BSI
- developer: SCM Microsystems GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0506-01: 1
- Certification No. C0506: 1
|
- DE:
- BSI-DSZ-CC-0394-2006: 2
- BSI-DSZ-CC-0592: 1
- BSI-DSZ-CC-0592-2010: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 2
- EAL 3 augmented: 2
- EAL 4: 4
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 6
- EAL3 augmented: 1
- EAL3+: 1
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 4
- ADO_IGS: 2
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.1: 4
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 4
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_TAT: 2
- ALC_TAT.1: 4
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VAN.4: 1
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 5
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PHYSICAL_ACCESS_MANAGED: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- BSI:
- ISO:
- ISO/IEC 15408:2005: 2
- ISO/IEC 7816-4: 1
- ISO/IEC 7816-8: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report, Version 5, 2009-12-15, EVALUATION TECHNICAL REPORT (ETR), TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 3.10, 2009-08-28, Configuration Item Record: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20160715155737+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160715155828+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 447686
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 29
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20100308113143+01'00'
- /Creator: Writer
- /Keywords: "SCM Microsystems GmbH, smart card reader SPR332 firmware version 6.01, class 2 smart card reader"
- /ModDate: D:20100309113000+01'00'
- /Producer: OpenOffice.org 3.1
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0592-2010
- pdf_file_size_bytes: 756117
- pdf_hyperlinks: https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
c0506_est.pdf |
0592b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_IMP: 1
- ADV_IMP.1: 3
- ADV_LLD.1: 4
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 2
- ALC_TAT: 1
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 3
- AVA_SOF.1: 1
- AVA_VLA.4: 4
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FPT:
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.4: 4
- FCS_COP: 16
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 7
- FDP_ACF: 1
- FDP_ACF.1: 13
- FDP_ITC.1: 4
- FDP_RIP: 1
- FDP_RIP.2: 6
- FMT:
- FMT_MOF.1: 2
- FMT_MSA.2: 4
- FMT_MSA.3: 2
- FPT:
- FTA:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL_ACCESS_MANAGED: 3
- O:
- O.CORRECT_TSF_OPERATION: 4
- O.CORRECT_TSF_OPETATION: 2
- O.CRYPTO: 7
- OE:
- OE.PHYSICAL_ACCESS_MANAGED: 6
- T:
|
- O:
- O.DOWNLOAD: 3
- O.INS_BYTE: 4
- O.REVEAL: 5
- O.SEAL: 5
- O.SIGNAL: 4
- O.STORE: 3
- O.TRANSFER: 2
- OE:
- OE.FWLOAD: 3
- OE.ISO_EMV: 1
- OE.KEYPAD: 1
- OE.LED: 2
- OE.SEAL: 3
- OE.SIG_APP: 1
- OE.STORE: 2
- OE.UNOBSERV: 1
- OE.USAGE: 2
- OE.VERSION: 1
- OP:
- OP.F_DOWNLD: 2
- OP.L_CONTROL: 2
- OP.P_ENTRY: 2
- OP.P_VERIFY: 1
- T:
- T.DOWNLOAD: 3
- T.REVEAL: 3
- T.SEAL: 2
- T.STORE: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- FIPS:
- ISO:
- ISO/IEC 10118-3: 1
- ISO/IEC 14888-: 1
- ISO/IEC 7816: 2
- ISO/IEC 7816-4: 15
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Canon Inc.
- /CreationDate: D:20160715151953+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords:
- /ModDate: D:20160715151954+09'00'
- /Producer: Adobe LiveCycle PDFGenerator
- /Subject:
- /Title: HDD Data Encryption Kit E-Series Security Target
- pdf_file_size_bytes: 420636
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 21
|
- /Author: SCM Microsystems GmbH
- /CreationDate: D:20090903094043Z
- /Creator: FreePDF XP 3.24 - http://shbox.de
- /Keywords: smart card reader, evaluation, SPR332, Common Criteria, Security Target
- /ModDate: D:20100308145215+01'00'
- /Producer: AFPL Ghostscript 8.54
- /Subject: Security Target for the smart card reader SPR 332
- /Title: Security_Target_SPR332_135
- pdf_file_size_bytes: 315728
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |