name |
Canon iR3225/iR3230/iR3235/iR3245 Series HDD Data Erase Kit-B2 Version 1.00 |
xFusion Server intelligent Baseboard Management Controller iBMC version 3.3.10.7 |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
active |
not_valid_after |
08.04.2014 |
28.02.2028 |
not_valid_before |
24.12.2008 |
28.02.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-23-0573644-CR.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0198_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-23-0573644-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0198_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-23-0573644-ST%20V2.0[60].pdf |
manufacturer |
Canon Inc. |
xFusion Digital Technologies Co., Ltd |
manufacturer_web |
https://www.canon.com/ |
https://www.xfusion.com |
security_level |
EAL3 |
EAL4+, ALC_FLR.1 |
dgst |
8279b5ee82292487 |
32365f4c8f6de09b |
heuristics/cert_id |
JISEC-CC-CRP-C0198 |
NSCIB-CC-0573644-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
AGD_OPE.1, ALC_FLR.1 |
heuristics/extracted_versions |
1.00 |
3.3.10.7 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0198
- certification_date: 01.12.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0198_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is optional software which adds security features to Canon iR3225/iR3230/iR3235/iR3245 series digital multifunction products. Installing this TOE replaces the system software (e.g., control software) on any of the aforementioned digital multi-function devices. As a basic function of the TOE, it controls functions of the MFP such as Copy, Print, Fax Reception, Mail Box and so on, and temporarily stores image data created during copying, printing, and other document handling operations on the HDD. In most standard multifunction products, such temporary image data is deleted only logically after use, i.e., upon completion of copying or printing, and residual information of deleted image data is not erased at all, being left exposed to the risk of reuse. TOE security functions This TOE comes with a security feature called the HDD Data Erase function, which completely deletes the HDD data, thereby eliminating any risk of the residual information of temporary image data from being reused. The TOE additionally includes the System Administrator Identification and Authentication function and the System Management function, for managing the HDD Data Erase function.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Canon iR3225/iR3230/ iR3235/iR3245 Series HDD Data Erase Kit-B2
- product_type: IT product(data erase function in digital MFP)
- report_link: https://www.ipa.go.jp/en/security/c0198_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0198_est.pdf
- toe_version: Version 1.00
- vendor: Canon Inc.
- expiration_date: 01.04.2014
- supplier: Canon Inc.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0198_it8218.html
- toe_overseas_name: Canon iR3225/iR3230/iR3235/iR3245 Series HDD Data Erase Kit-B2 Version 1.00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
NSCIB-CC-23-0573644-CR.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 6
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0198_erpt.pdf |
NSCIB-CC-23-0573644-CR.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-0573644-CR
- cert_item: xFusion Server intelligent Baseboard Management Controller iBMC version 3.3.10.7
- cert_lab: UL
- developer: xFusion Digital Technologies Co., Ltd
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0198-01: 1
- Certification No. C0198: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 6
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.ADMIN_PWD: 1
- A.NETWORK: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20120425153253+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20120425153352+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 587707
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 21
|
|
pdf_data/st_filename |
c0198_est.pdf |
NSCIB-CC-23-0573644-ST V2.0[60].pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 4
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 4
- ADV_HLD.2: 3
- ADV_RCR.1: 4
- AGD:
- AGD_ADM.1: 4
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 4
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 10
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 6
- FAU_STG.3.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 10
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_COP: 28
- FCS_COP.1: 15
- FDP:
- FDP_ACC.1: 13
- FDP_IFC.1: 12
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_ROL: 1
- FDP_UCT.1: 6
- FDP_UCT.1.1: 1
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 6
- FIA_UAU.2: 15
- FIA_UAU.2.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID.1: 15
- FIA_UID.2: 14
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 12
- FMT_MOF.1.1: 1
- FMT_MSA.1: 11
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 22
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ARB: 4
- FPT_ARB.1: 11
- FPT_ARB.1.1: 2
- FPT_ARB.1.2: 2
- FPT_ARB.1.3: 2
- FPT_FLS: 3
- FPT_FLS_EXT.1: 31
- FPT_FLS_EXT.1.1: 1
- FPT_FLS_EXT.2: 14
- FPT_FLS_EXT.2.1: 1
- FPT_ITC.1: 2
- FPT_RCV.2: 13
- FPT_RCV.3: 11
- FPT_RCV.3.1: 1
- FPT_RCV.3.2: 1
- FPT_RCV.3.3: 1
- FPT_RCV.3.4: 1
- FPT_SMR.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 1
- FPT_TST_EXT.1: 12
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 5
- FRU:
- FRU_FLT.1: 17
- FRU_FLT.1.1: 1
- FTA:
- FTA_SSL.3: 12
- FTA_SSL.3.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTA_TSE.1: 8
- FTA_TSE.1.1: 1
- FTP:
- FTP_FLS_EXT.1: 1
- FTP_ITC.1: 14
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 13
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.ADMIN_PWD: 1
- A.NETWORK: 4
- A.PWD_MANAGE: 1
- O:
- O.ADMIN_AUTH: 4
- O.AUTH_BOX: 1
- O.RESIDUAL: 5
- OE:
- OE.ADMIN: 2
- OE.ADMIN_PWD: 2
- OE.NETWORK: 2
- T:
|
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-512: 1
- SHA512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- SSH:
- TLS:
- TLS:
- TLS: 28
- TLS 1.2: 3
- TLS 1.3: 3
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_DSS_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_DSS_WITH_AES_256_GCM_SHA384: 1
- TLS_DHE_RSA_WITH_AES_128_CCM: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CCM: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 1
- FIPS 197: 1
- FIPS 198-1: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- NIST SP 800-56B: 1
- NIST SP 800-57: 4
- PKCS:
- PKCS #1: 1
- PKCS#1: 1
- PKCS#3: 1
- RFC:
- RFC 2104: 2
- RFC 3174: 2
- RFC 3268: 2
- RFC 3526: 2
- RFC 4250: 2
- RFC 4251: 4
- RFC 4252: 4
- RFC 4253: 4
- RFC 4254: 4
- RFC 4344: 1
- RFC 4346: 2
- RFC 4419: 2
- RFC 4432: 2
- RFC 4462: 2
- RFC 4634: 2
- RFC 5246: 5
- RFC 5288: 2
- RFC 5647: 2
- RFC 5656: 2
- RFC 6234: 2
- RFC 6655: 2
- RFC 6668: 2
- RFC 7251: 1
- RFC 7905: 2
- RFC 8017: 2
- RFC 8332: 2
- RFC 8446: 5
- RFC 8492: 2
- RFC 8709: 2
- RFC 8731: 2
- RFC-4344: 3
- RFC-5647: 2
- RFC-6668: 4
- RFC-7905: 1
- RFC-8332: 2
- RFC-8709: 1
- RFC-8731: 2
- RFC4253: 2
- RFC4419: 2
- RFC4432: 2
- RFC4462: 2
- RFC5288: 12
- RFC5656: 2
- RFC6655: 2
- RFC7251: 3
- RFC7905: 3
- RFC8446: 6
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 2
- server’s service plane usually conducts other services and interfaces with other components out of scope of the TOE, it is essential to define that no other management functionality or application shall: 1
- with the management operation of the TOE. Such seamless and non-conflicting operational policy is out of scope of the TOE and belongs to the administrator of the cloud or data centre. 3.5.5 OE: 1
|
pdf_data/st_metadata |
- /Author: Satoshi Hirota
- /CreationDate: D:20120307154318+09'00'
- /Creator: PScript5.dll Version 5.2
- /Keywords:
- /ModDate: D:20120307154318+09'00'
- /Producer: Adobe LiveCycle PDFG 7.2
- /Subject:
- /Title: HDD Data Erase Kit-B1 Security Target
- pdf_file_size_bytes: 290588
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |