name |
Canon imageRUNNER ADVANCE 8500 Series 2600 model 1.0
|
Canon imageRUNNER ADVANCE C356/C256 Series 2600 model 1.0
|
category |
Multi-Function Devices
|
Multi-Function Devices
|
not_valid_before |
2016-08-29
|
2018-01-26
|
not_valid_after |
2021-08-29
|
2023-01-26
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0520_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0586_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Canon Inc.
|
Canon Inc.
|
manufacturer_web |
https://www.canon.com/
|
https://www.canon.com/
|
security_level |
ALC_FLR.2, EAL2+ |
ALC_FLR.2, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0520_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0586_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0520_eimg.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0586_eimg.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
522de4c2cf050b6f4c7051c71bd552d593ab2ccfbd35bf96ecda70e236a051e7
|
a7d728908f06c598e128a76299288673d92ee5dd6730852f683f173ca0f75c91
|
state/cert/txt_hash |
b742ac935de7e8c956455699501a31cc6c6dbce0b517188787bdb3e1daf8f315
|
5bb70d376c8f3a5a06e943f521791000cf09fd1645acf7eeb1f07314578ccc22
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
f8a41597b583cd587e2771457fe7342b3d44fd6a7acd0af966c38b725acf160e
|
c45f89318de13c9f0bb9dc72130b58d0c43acf5bf13c3c7ec8354070a1386d83
|
state/report/txt_hash |
b9dbb0502fc493b58e8dc7404b626ea86556d6c65b820104dbb04b938cd1c58f
|
b89ba3514b3b6bf2fefcb762e0b452736eb2a269a6dca4e58ccbda17b11038cf
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
489346e8d16e39f1b2e607384b632c280714c2e262641266274ec0ec26bc2e54
|
164dd038f700aeb32daac1e4d5a91907e9283cfb6cb38633051d17102c1323bb
|
state/st/txt_hash |
b134a176e1198ae72b0cedd23a478741cb2cb482f136e2a3bdc265fe7dc62944
|
50ae95be1879069fe0a855a182f5b0cd8ccb87b00220a3bf8435fc330c59ebbd
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0520
|
JISEC-CC-CRP-C0586-01-2018
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
cpe:2.3:a:canon:imagerunner_8500:-:*:*:*:*:*:*:* |
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_FLR.2, ADV_FSP.2, ALC_CMC.2, ASE_CCL.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ALC_CMS.2, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2 |
ALC_FLR.2, ADV_FSP.2, ALC_CMC.2, ASE_CCL.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ALC_CMS.2, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2 |
heuristics/extracted_versions |
1.0 |
1.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
CVE-2008-0303, CVE-2006-4680 |
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data/cert_id |
C0520
|
C0586
|
heuristics/scheme_data/certification_date |
2016-08
|
2018-01
|
heuristics/scheme_data/claim |
EAL2+ALC_FLR.2PP
|
PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)PP
|
heuristics/scheme_data/enhanced |
- product:
Canon imageRUNNER ADVANCE 8500 Series 2600 model
- toe_version:
1.0
- product_type:
Multifunction Product
- certification_date:
2016-08-29
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- vendor:
Canon Inc.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- description:
Certification/Validation Report : (376 KB)(2017-01-25) CC Certificate Image : (466 KB)(2016-09-15) Security Target : (813 KB)(2017-01-25)
|
- product:
Canon imageRUNNER ADVANCE C356/C256 Series 2600 model
- toe_version:
1.0
- product_type:
Multifunction Product
- cert_id: JISEC-C0586
- certification_date:
2018-01-26
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented by ALC_FLR.2
- protection_profile:
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™「-2009)
- vendor:
Canon Inc.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- report_link: https://www.ipa.go.jp/en/security/c0586_erpt.pdf
- cert_link: https://www.ipa.go.jp/en/security/c0586_eimg.pdf
- target_link: https://www.ipa.go.jp/en/security/c0586_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™「-2009) defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication FunctionFunction for identifying and authenticating the user.
-
Function Use Restriction FunctionFunction for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction FunctionFunction for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs FunctionFunction for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase FunctionFunction for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption FunctionFunction for encrypting all data stored in the HDD.
-
LAN Data Protection FunctionFunction for protecting all IP packets that are communicated with an IT device.
-
Self-Test FunctionFunction for testing the integrity of the executable code at startup.
-
Audit Log FunctionFunction for generating audit logs on security events, allowing them to be viewed by the administrator and sending them to an external file server.
-
Management FunctionFunction for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL2 Augmented with ALC_FLR.2
|
EAL2 Augmented by ALC_FLR.2
|
heuristics/scheme_data/enhanced/cc_version |
3.1 Release4
|
3.1 Release4
|
heuristics/scheme_data/enhanced/certification_date |
2016-08-29
|
2018-01-26
|
heuristics/scheme_data/enhanced/description |
Certification/Validation Report : (376 KB)(2017-01-25) CC Certificate Image : (466 KB)(2016-09-15) Security Target : (813 KB)(2017-01-25)
|
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™「-2009) defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication FunctionFunction for identifying and authenticating the user.
-
Function Use Restriction FunctionFunction for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction FunctionFunction for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs FunctionFunction for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase FunctionFunction for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption FunctionFunction for encrypting all data stored in the HDD.
-
LAN Data Protection FunctionFunction for protecting all IP packets that are communicated with an IT device.
-
Self-Test FunctionFunction for testing the integrity of the executable code at startup.
-
Audit Log FunctionFunction for generating audit logs on security events, allowing them to be viewed by the administrator and sending them to an external file server.
-
Management FunctionFunction for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/enhanced/evaluation_facility |
ECSEC Laboratory Inc.
Evaluation Center
|
ECSEC Laboratory Inc.
Evaluation Center
|
heuristics/scheme_data/enhanced/product |
Canon imageRUNNER ADVANCE 8500 Series 2600 model
|
Canon imageRUNNER ADVANCE C356/C256 Series 2600 model
|
heuristics/scheme_data/enhanced/product_type |
Multifunction Product
|
Multifunction Product
|
heuristics/scheme_data/enhanced/protection_profile |
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
|
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™「-2009)
|
heuristics/scheme_data/enhanced/toe_version |
1.0
|
1.0
|
heuristics/scheme_data/enhanced/vendor |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/expiration_date |
2021-09
|
2023-02
|
heuristics/scheme_data/supplier |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/toe_japan_name |
Canon imageRUNNER ADVANCE 8500 Series 2600 model1.0
|
Canon imageRUNNER ADVANCE C356/C256 Series 2600 model1.0
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0520_it6590.html
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0586_it7652.html
|
heuristics/scheme_data/toe_overseas_name |
Canon imageRUNNER ADVANCE 8500 Series 2600 model1.0
|
Canon imageRUNNER ADVANCE C356/C256 Series 2600 model1.0
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
c0520_eimg.pdf
|
c0586_eimg.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0586-01-2018:
1
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata//CreationDate |
D:20160914093959+09'00'
|
D:20180322153832+09'00'
|
pdf_data/cert_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/cert_metadata//ModDate |
D:20160914094027+09'00'
|
D:20180322153936+09'00'
|
pdf_data/cert_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/cert_metadata/pdf_file_size_bytes |
476466
|
147388
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/cert_metadata/pdf_number_of_pages |
1
|
2
|
pdf_data/report_filename |
c0520_erpt.pdf
|
c0586_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0520-01:
1
- Certification No. C0520:
1
|
- JISEC-CC-CRP-C0586-01-2018:
1
|
pdf_data/report_keywords/cc_claims/A |
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_claims/T/T.CONF |
2
|
4
|
pdf_data/report_keywords/cc_claims/T/T.DOC |
2
|
4
|
pdf_data/report_keywords/cc_claims/T/T.FUNC |
1
|
2
|
pdf_data/report_keywords/cc_claims/T/T.PROT |
1
|
2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL2:
3
- EAL3: 1
- EAL2 augmented:
2
- EAL3 augmented: 1
|
- EAL2:
4
- EAL2 augmented:
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
3
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 augmented |
2
|
3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS PUB 186-2:
1
- FIPS 186-2:
1
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20170123115844+09'00'
|
D:20180605153417+09'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//ModDate |
D:20170123115901+09'00'
|
D:20180605153451+09'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata/pdf_file_size_bytes |
384718
|
331679
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
35
|
37
|
pdf_data/st_filename |
c0520_est.pdf
|
c0586_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
pdf_data/st_keywords/cc_claims/D |
- D.DOC:
18
- D.FUNC:
11
- D.PROT:
6
- D.CONF:
8
|
- D.DOC:
18
- D.FUNC:
11
- D.PROT:
6
- D.CONF:
8
|
pdf_data/st_keywords/cc_claims/O |
- O.DOC:
14
- O.FUNC:
7
- O.PROT:
7
- O.CONF:
14
- O.USER:
13
- O.INTERFACE:
7
- O.SOFTWARE:
6
- O.AUDIT:
6
|
- O.STORAGE: 6
- O.DOC:
14
- O.FUNC:
7
- O.PROT:
7
- O.CONF:
14
- O.USER:
13
- O.INTERFACE:
7
- O.SOFTWARE:
6
- O.AUDIT:
6
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT |
6
|
6
|
pdf_data/st_keywords/cc_claims/O/O.CONF |
14
|
14
|
pdf_data/st_keywords/cc_claims/O/O.DOC |
14
|
14
|
pdf_data/st_keywords/cc_claims/O/O.FUNC |
7
|
7
|
pdf_data/st_keywords/cc_claims/O/O.INTERFACE |
7
|
7
|
pdf_data/st_keywords/cc_claims/O/O.PROT |
7
|
7
|
pdf_data/st_keywords/cc_claims/O/O.SOFTWARE |
6
|
6
|
pdf_data/st_keywords/cc_claims/O/O.USER |
13
|
13
|
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN |
8
|
6
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_ACCESS |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_STORAGE |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.INTERFACE |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYISCAL |
2
|
1
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL |
2
|
2
|
pdf_data/st_keywords/cc_claims/OE/OE.USER |
14
|
12
|
pdf_data/st_keywords/cc_claims/T |
- T.DOC:
6
- T.FUNC:
3
- T.PROT:
3
- T.CONF:
6
|
- T.DOC:
6
- T.FUNC:
3
- T.PROT:
3
- T.CONF:
6
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
|
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 |
12
|
11
|
pdf_data/st_keywords/cc_sar/APE |
|
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 2 |
2
|
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 2 augmented |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL2 |
9
|
8
|
pdf_data/st_keywords/cc_security_level/EAL/EAL2 augmented |
8
|
7
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
13
|
13
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
28
|
26
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
14
|
14
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
15
|
14
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
26
|
25
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
46
- FDP_ACF.1:
35
- FDP_RIP.1:
6
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_IFC.1:
4
- FDP_ACC.1.1:
3
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
3
- FDP_ACF.1.4:
3
- FDP_RIP.1.1:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
6
|
- FDP_ACC.1:
46
- FDP_ACF.1:
35
- FDP_RIP.1:
6
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_IFC.1:
4
- FDP_ACC.1.1:
3
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
3
- FDP_ACF.1.4:
3
- FDP_RIP.1.1:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
6
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_ATD.1:
9
- FIA_UAU.1:
13
- FIA_UID.1:
23
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_SOS.1:
6
- FIA_UAU.7:
7
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS.1.1:
1
|
- FIA_ATD.1:
9
- FIA_UAU.1:
13
- FIA_UID.1:
23
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_SOS.1:
6
- FIA_UAU.7:
7
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.1:
25
- FMT_MSA.3:
23
- FMT_MTD.1:
18
- FMT_SMF.1:
25
- FMT_SMR.1:
36
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
|
- FMT_MSA.1:
25
- FMT_MSA.3:
24
- FMT_MTD.1:
19
- FMT_SMF.1:
25
- FMT_SMR.1:
34
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1.1:
2
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMF.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
25
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
23
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
18
|
19
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
25
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
36
|
34
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_CIP_EXP: 2
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_CIP_EXP.1: 16
- FPT_FDI_EXP.1:
11
- FPT_CIP_EXP.1.1: 2
- FPT_CIP_EXP.1.2: 3
- FPT_FDI_EXP.1.1:
2
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_FDI_EXP.1:
11
- FPT_FDI_EXP.1.1:
2
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS PUB 197:
3
- FIPS PUB 46-3: 1
- FIPS PUB 186-2: 3
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 |
3
|
3
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft:
2
- Microsoft Corporation:
1
|
- Microsoft:
- Microsoft:
2
- Microsoft Corporation:
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
832302
- pdf_is_encrypted:
False
- pdf_number_of_pages:
64
- /Subject:
- /Producer:
Adobe LiveCycle PDFGenerator
- /Keywords:
- /Author:
Canon Inc.
- /ModDate:
D:20170116170919+09'00'
- /Creator:
PScript5.dll Version 5.2.2
- /Title:
Canon imageRUNNER ADVANCE 8500 Series 2600 model Security Target
- /CreationDate:
D:20170116170919+09'00'
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1015794
- pdf_is_encrypted:
True
- pdf_number_of_pages:
61
- /Author:
Canon Inc.
- /CreationDate:
D:20180531165000+09'00'
- /Creator:
Microsoft® Word 2016
- /ModDate:
D:20180531165218+09'00'
- /Producer:
Microsoft® Word 2016
- /Title:
Canon imageRUNNER ADVANCE C356/C256 Series 2600 model Security Target
- pdf_hyperlinks:
mailto:[email protected]
|
pdf_data/st_metadata//Author |
Canon Inc.
|
Canon Inc.
|
pdf_data/st_metadata//CreationDate |
D:20170116170919+09'00'
|
D:20180531165000+09'00'
|
pdf_data/st_metadata//Creator |
PScript5.dll Version 5.2.2
|
Microsoft® Word 2016
|
pdf_data/st_metadata//ModDate |
D:20170116170919+09'00'
|
D:20180531165218+09'00'
|
pdf_data/st_metadata//Producer |
Adobe LiveCycle PDFGenerator
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Title |
Canon imageRUNNER ADVANCE 8500 Series 2600 model Security Target
|
Canon imageRUNNER ADVANCE C356/C256 Series 2600 model Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
832302
|
1015794
|
pdf_data/st_metadata/pdf_hyperlinks |
|
mailto:[email protected] |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
True
|
pdf_data/st_metadata/pdf_number_of_pages |
64
|
61
|
dgst |
8aaae880ff485171
|
575f398928bd6336
|