Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon iR3225/iR3230/iR3235/iR3245 Series HDD Data Erase Kit-B2 Version 1.00
JISEC-CC-CRP-C0198
McAfee Hercules Policy Auditor and McAfee Hercules Remediation Manager Version 4.5
383-4-88
name Canon iR3225/iR3230/iR3235/iR3245 Series HDD Data Erase Kit-B2 Version 1.00 McAfee Hercules Policy Auditor and McAfee Hercules Remediation Manager Version 4.5
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme JP CA
not_valid_after 08.04.2014 29.09.2015
not_valid_before 24.12.2008 11.04.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0198_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080429_mcafee-cert-e.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0198_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080429_mcafee-sec-e.pdf
manufacturer Canon Inc. McAfee, Inc.
manufacturer_web https://www.canon.com/ https://www.mcafee.com/
dgst 8279b5ee82292487 49e3a67c3ee21149
heuristics/cert_id JISEC-CC-CRP-C0198 383-4-88
heuristics/cert_lab [] CANADA
heuristics/extracted_versions 1.00 4.5
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0198
  • certification_date: 01.12.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cert_link: https://www.ipa.go.jp/en/security/c0198_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is optional software which adds security features to Canon iR3225/iR3230/iR3235/iR3245 series digital multifunction products. Installing this TOE replaces the system software (e.g., control software) on any of the aforementioned digital multi-function devices. As a basic function of the TOE, it controls functions of the MFP such as Copy, Print, Fax Reception, Mail Box and so on, and temporarily stores image data created during copying, printing, and other document handling operations on the HDD. In most standard multifunction products, such temporary image data is deleted only logically after use, i.e., upon completion of copying or printing, and residual information of deleted image data is not erased at all, being left exposed to the risk of reuse. TOE security functions This TOE comes with a security feature called the HDD Data Erase function, which completely deletes the HDD data, thereby eliminating any risk of the residual information of temporary image data from being reused. The TOE additionally includes the System Administrator Identification and Authentication function and the System Management function, for managing the HDD Data Erase function.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Canon iR3225/iR3230/ iR3235/iR3245 Series HDD Data Erase Kit-B2
    • product_type: IT product(data erase function in digital MFP)
    • report_link: https://www.ipa.go.jp/en/security/c0198_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0198_est.pdf
    • toe_version: Version 1.00
    • vendor: Canon Inc.
  • expiration_date: 01.04.2014
  • supplier: Canon Inc.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0198_it8218.html
  • toe_overseas_name: Canon iR3225/iR3230/iR3235/iR3245 Series HDD Data Erase Kit-B2 Version 1.00
pdf_data/report_filename c0198_erpt.pdf 20080429_mcafee-cert-e.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
    • cert_id: 383-4-88-CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0198-01: 1
    • Certification No. C0198: 1
  • CA:
    • 383-4-88: 1
    • 383-4-88-CR: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 3: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.ADMIN_PWD: 1
    • A.NETWORK: 1
  • T:
    • T.HDD_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 4
  • Microsoft:
    • Microsoft: 7
    • Microsoft Corporation: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_metadata
  • /CreationDate: D:20120425153253+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20120425153352+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 587707
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 21
  • /Author: glague
  • /CC Version: 2.3
  • /CC date: December 2004
  • /CC document number: NOR-001v2, NOR-002v2, NOR-003v2
  • /CCEF: Electronic Warfare Associates-Canada, Ltd.
  • /CCEF abbr: EWA-Canada's Information Technology Security Evaluation and Test (ITSET) Facility
  • /CCEF location: Ottawa, Ontario
  • /CEM date: December 2004
  • /CEM document number: NOR-004v2
  • /CEM version: 2.3
  • /Comments: PCR Template Version 1.3
  • /Completion date: 20 March 2008
  • /CreationDate: D:20080424094814-04'00'
  • /Creator: Acrobat PDFMaker 6.0 for Word
  • /Developer Long Name: McAfee Inc.
  • /Developer Short Name: McAfee
  • /Developer name: McAfee Inc.
  • /Developer name - noun: McAfee Incorporated
  • /EAL Level: 3
  • /EAL Level Base: 3
  • /EAL Long: EAL 3
  • /EAL Short: EAL 3
  • /ETPRoc_Date: day month yyyy
  • /ETPlan_Doc#: 1xxx-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: [0.0]
  • /ETPlan_date: day month yyyy
  • /ETProcRes_Date: day month yyyy
  • /ETProcRes_Doc#: 1xxx-000-D005
  • /ETProcRes_Title: Evaluation Test Results
  • /ETProcRes_Version: [0.0]
  • /ETProc_Doc#: 1xxx-000-D004
  • /ETProc_Title: Evaluation Test Procedures
  • /ETProc_Version: [0.0]
  • /ETR Version: 1.0
  • /ETR date: 20 March 2008
  • /ETReport_Date: 20 March 2008
  • /ETReport_Doc#: 1566-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_Version: 1.0
  • /EWP_Date: 26 June 2006
  • /EWP_Doc#: 1566-000-D001
  • /EWP_Title: Evaluation Work Plan for EAL 3 Evaluation of Citadel Hercules® Enterprise Vulnerability Management (EVM) Version 4.1
  • /EWP_Version: 1.7
  • /Eval number: 383-4-88
  • /Evaluation date: 1 September 2005
  • /Evaluation number: 383-4-88
  • /ModDate: D:20080424094934-04'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /ST date: 3 March 2008
  • /ST version: 1.2
  • /ST_Date: 3 March 2008
  • /ST_Title: Security Target McAfee® Hercules® Policy Auditor and McAfee® Hercules® Remediation Manager (McAfee® Hercules®) Version 4.5
  • /ST_Version: 1.2
  • /SVR_Date: [day month yyyy]
  • /SVR_Doc#: 1xxx-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: [0.0]
  • /Security Classification: EWA-Canada & McAfee Proprietary]
  • /ShortTitle: McAfee Hercules® Policy Auditor and McAfee Hercules® Remediation Manager
  • /SourceModified: D:20080424123421
  • /TOE Version: 4.5
  • /TOE name: McAfee Hercules® Policy Auditor v4.5 and McAfee Hercules® Remediation Manager v4.5
  • /TOE short name: McAfee Hercules®
  • /Technical oversight date: 3 October 2002
  • /Technical oversight version: 1.0
  • /Title: PCR
  • /Version: 1.0
  • /_AdHocReviewCycleID: -121948091
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: White, Debra E.
  • /_EmailSubject: Partial Post to Full Post - McAfee Hercules
  • pdf_file_size_bytes: 179169
  • pdf_hyperlinks: http://www.cse-cst.gc.ca/services/common-criteria/trusted-products-e.html, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename c0198_est.pdf 20080429_mcafee-sec-e.pdf
pdf_data/st_keywords/cc_cert_id
  • CA:
    • 383-4-88: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 9
  • EAL:
    • EAL 3: 5
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 4
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 4
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 4
    • ADV_HLD.2: 3
    • ADV_RCR.1: 4
  • AGD:
    • AGD_ADM.1: 4
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.1: 3
    • ATE_FUN.1: 4
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 4
    • AVA_SOF.1: 3
    • AVA_VLA.1: 4
  • ACM:
    • ACM_CAP.3: 5
    • ACM_SCP.1: 4
  • ADO:
    • ADO_DEL.1: 5
    • ADO_IGS.1: 5
  • ADV:
    • ADV_FSP.1: 13
    • ADV_HLD.1: 6
    • ADV_HLD.2: 10
    • ADV_RCR.1: 5
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 8
  • ALC:
    • ALC_DVS.1: 5
  • ATE:
    • ATE_COV.2: 5
    • ATE_DPT.1: 4
    • ATE_FUN.1: 5
    • ATE_IND.2: 4
  • AVA:
    • AVA_MSU.1: 5
    • AVA_SOF.1: 5
    • AVA_VLA.1: 5
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 10
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 9
    • FPT_RVM.1.1: 1
  • FAU:
    • FAU_GEN: 7
    • FAU_GEN.1: 19
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 11
    • FAU_GEN.2.1: 1
    • FAU_SAR: 5
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SEL: 5
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 13
    • FDP_ACC.2: 13
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 9
    • FDP_IFC.1: 56
    • FDP_IFC.1.1: 4
    • FDP_IFF: 8
    • FDP_IFF.1: 33
    • FDP_IFF.1.1: 4
    • FDP_IFF.1.2: 4
    • FDP_IFF.1.3: 4
    • FDP_IFF.1.4: 4
    • FDP_IFF.1.5: 4
    • FDP_IFF.1.6: 4
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT: 3
    • FDP_ITT.1.1: 1
    • FDP_ROL.1: 6
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 10
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 9
    • FIA_UID.2: 17
    • FIA_UID.2.1: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 19
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 8
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 21
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 6
    • FPT_ITT.1.1: 1
    • FPT_RVM: 5
    • FPT_RVM.1: 8
    • FPT_RVM.1.1: 2
    • FPT_SEP: 5
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM: 7
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.ADMIN_PWD: 1
    • A.NETWORK: 4
    • A.PWD_MANAGE: 1
  • O:
    • O.ADMIN_AUTH: 4
    • O.AUTH_BOX: 1
    • O.RESIDUAL: 5
  • OE:
    • OE.ADMIN: 2
    • OE.ADMIN_PWD: 2
    • OE.NETWORK: 2
  • T:
    • T.HDD: 1
    • T.HDD_ACCESS: 2
  • A:
    • A.BACKUP: 4
    • A.CMS: 4
    • A.CONFIG: 4
    • A.GOODOS: 4
    • A.KNOWLEDGE: 4
    • A.NOEVIL: 4
    • A.PHYSICAL: 4
    • A.TOEUSER: 5
  • O:
    • O.ADMIN: 6
    • O.CLIENTPROT: 6
    • O.CLIENTREM: 4
    • O.HMI: 6
    • O.KNOWN: 3
    • O.NETATK: 7
    • O.REMDATA: 3
    • O.SCANDATA: 7
    • O.USERAUTH: 3
    • O.USERDATA: 3
  • OE:
    • OE.AUTHUSER: 6
    • OE.BACKUP: 3
    • OE.DOMAIN: 6
    • OE.GOODOS: 3
    • OE.GOODUSER: 8
    • OE.GUIDANCE: 3
    • OE.PROTCOM: 8
    • OE.SECURECOM: 3
  • T:
    • T.BADDATA: 3
    • T.CLIENT: 3
    • T.CONSOLE: 3
    • T.EXPLOIT: 3
    • T.NETEXPLOIT: 3
    • T.OS: 3
    • T.REMSERVER: 3
    • T.SNIFF: 3
    • T.SNIFFSCAN: 3
    • T.SPOOF: 3
    • T.SPOOFCLIENT: 3
    • T.SPOOFSCAN: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 1
  • Cisco:
    • Cisco Systems: 2
  • Microsoft:
    • Microsoft: 9
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/standard_id
  • ISO:
    • ISO/IEC 15408:2005: 1
pdf_data/st_metadata
  • /Author: Satoshi Hirota
  • /CreationDate: D:20120307154318+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /Keywords:
  • /ModDate: D:20120307154318+09'00'
  • /Producer: Adobe LiveCycle PDFG 7.2
  • /Subject:
  • /Title: HDD Data Erase Kit-B1 Security Target
  • pdf_file_size_bytes: 290588
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
  • /Author: bcuthbert
  • /CreationDate: D:20080409134228-04'00'
  • /Creator: PDFCreator Version 0.9.5
  • /Keywords:
  • /ModDate: D:20080415141639-04'00'
  • /Producer: GPL Ghostscript 8.61
  • /Subject:
  • /Title: McAfee_PA_RM_v4.5_ST_v1.3
  • pdf_file_size_bytes: 403262
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different