name |
Canon imageRUNNER ADVANCE 8500 Series 2600 model 1.0
|
Canon imageRUNNER ADVANCE 45900KG/4500 Series 2600 model 1.0
|
category |
Multi-Function Devices
|
Multi-Function Devices
|
not_valid_before |
2016-08-29
|
2017-06-28
|
not_valid_after |
2021-08-29
|
2022-06-28
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0520_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0561_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Canon Inc.
|
Canon Inc.
|
manufacturer_web |
https://www.canon.com/
|
https://www.canon.com/
|
security_level |
ALC_FLR.2, EAL2+ |
ALC_FLR.2, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0520_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0561_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0520_eimg.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0561kz_eimg.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
522de4c2cf050b6f4c7051c71bd552d593ab2ccfbd35bf96ecda70e236a051e7
|
e6372ad064ec695fb23fa969c77e46e64dde2387eb902e76b4a094ba5df2603b
|
state/cert/txt_hash |
b742ac935de7e8c956455699501a31cc6c6dbce0b517188787bdb3e1daf8f315
|
504ad9c5c754908f20801420d556325a483188e5bb8b617448ce75f71e6743ad
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
f8a41597b583cd587e2771457fe7342b3d44fd6a7acd0af966c38b725acf160e
|
f769b4bef6ae2789152c17ae2c82ae4346cde2f10813d44da2438ea0c9e0c586
|
state/report/txt_hash |
b9dbb0502fc493b58e8dc7404b626ea86556d6c65b820104dbb04b938cd1c58f
|
6d93dc8f0284c82daad9f1f775a72eac6da691cd02837516aadb309a91fbf65d
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
489346e8d16e39f1b2e607384b632c280714c2e262641266274ec0ec26bc2e54
|
1b51d922d032ef9a2dd2830d5c6778564183e6b84ef12a55b9edf391f0965e80
|
state/st/txt_hash |
b134a176e1198ae72b0cedd23a478741cb2cb482f136e2a3bdc265fe7dc62944
|
44803ba738ea9df0884bac66a25fcbf4a679b8acd2eadc5b6a566735afa6050c
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0520
|
JISEC-CC-CRP-C0561
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
cpe:2.3:a:canon:imagerunner_8500:-:*:*:*:*:*:*:* |
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_FLR.2, ADV_FSP.2, ALC_CMC.2, ASE_CCL.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ALC_CMS.2, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2 |
ALC_FLR.2, ADV_FSP.2, ALC_CMC.2, ASE_CCL.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ALC_CMS.2, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2 |
heuristics/extracted_versions |
1.0 |
1.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
CVE-2008-0303, CVE-2006-4680 |
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- cert_id:
C0520
- supplier:
Canon Inc.
- toe_overseas_name:
Canon imageRUNNER ADVANCE 8500 Series 2600 model1.0
- expiration_date:
2021-09
- claim:
EAL2+ALC_FLR.2PP
- certification_date:
2016-08
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0520_it6590.html
- toe_japan_name:
Canon imageRUNNER ADVANCE 8500 Series 2600 model1.0
- enhanced:
- product:
Canon imageRUNNER ADVANCE 8500 Series 2600 model
- toe_version:
1.0
- product_type:
Multifunction Product
- certification_date:
2016-08-29
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- vendor:
Canon Inc.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- description:
Certification/Validation Report : (376 KB)(2017-01-25) CC Certificate Image : (466 KB)(2016-09-15) Security Target : (813 KB)(2017-01-25)
|
- cert_id:
C0561
- supplier:
Canon Inc.
- toe_overseas_name:
Canon imageRUNNER ADVANCE 45900KG/4500 Series 2600 model1.1
- expiration_date:
2022-07
- claim:
EAL2+ALC_FLR.2
PP
- revalidations: frozendict({'date': '2017-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0561_it6613_01.html'})
- certification_date:
2017-06
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0561_it6613.html
- toe_japan_name:
Canon imageRUNNER ADVANCE 45900KG/4500 Series 2600 model1.0
- enhanced:
- product:
Canon imageRUNNER ADVANCE 45900KG/4500 Series 2600 model
- toe_version:
1.0
- product_type:
Multifunction Product
- certification_date:
2017-06-28
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- vendor:
Canon Inc.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0561_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0561_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0561_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function Function for identifying and authenticating the user.
-
Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function Function for encrypting all data stored in the HDD.
-
LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function Function for testing the integrity of the executable code at startup.
-
Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/cert_id |
C0520
|
C0561
|
heuristics/scheme_data/certification_date |
2016-08
|
2017-06
|
heuristics/scheme_data/claim |
EAL2+ALC_FLR.2PP
|
EAL2+ALC_FLR.2
PP
|
heuristics/scheme_data/enhanced |
- product:
Canon imageRUNNER ADVANCE 8500 Series 2600 model
- toe_version:
1.0
- product_type:
Multifunction Product
- certification_date:
2016-08-29
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- vendor:
Canon Inc.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- description:
Certification/Validation Report : (376 KB)(2017-01-25) CC Certificate Image : (466 KB)(2016-09-15) Security Target : (813 KB)(2017-01-25)
|
- product:
Canon imageRUNNER ADVANCE 45900KG/4500 Series 2600 model
- toe_version:
1.0
- product_type:
Multifunction Product
- certification_date:
2017-06-28
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- vendor:
Canon Inc.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- report_link: https://www.ipa.go.jp/en/security/c0561_erpt.pdf
- cert_link: https://www.ipa.go.jp/en/security/c0561_eimg.pdf
- target_link: https://www.ipa.go.jp/en/security/c0561_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function Function for identifying and authenticating the user.
-
Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function Function for encrypting all data stored in the HDD.
-
LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function Function for testing the integrity of the executable code at startup.
-
Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL2 Augmented with ALC_FLR.2
|
EAL2 Augmented with ALC_FLR.2
|
heuristics/scheme_data/enhanced/cc_version |
3.1 Release4
|
3.1 Release4
|
heuristics/scheme_data/enhanced/certification_date |
2016-08-29
|
2017-06-28
|
heuristics/scheme_data/enhanced/description |
Certification/Validation Report : (376 KB)(2017-01-25) CC Certificate Image : (466 KB)(2016-09-15) Security Target : (813 KB)(2017-01-25)
|
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function Function for identifying and authenticating the user.
-
Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function Function for encrypting all data stored in the HDD.
-
LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function Function for testing the integrity of the executable code at startup.
-
Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/enhanced/evaluation_facility |
ECSEC Laboratory Inc.
Evaluation Center
|
ECSEC Laboratory Inc.
Evaluation Center
|
heuristics/scheme_data/enhanced/product |
Canon imageRUNNER ADVANCE 8500 Series 2600 model
|
Canon imageRUNNER ADVANCE 45900KG/4500 Series 2600 model
|
heuristics/scheme_data/enhanced/product_type |
Multifunction Product
|
Multifunction Product
|
heuristics/scheme_data/enhanced/protection_profile |
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
|
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
|
heuristics/scheme_data/enhanced/toe_version |
1.0
|
1.0
|
heuristics/scheme_data/enhanced/vendor |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/expiration_date |
2021-09
|
2022-07
|
heuristics/scheme_data/supplier |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/toe_japan_name |
Canon imageRUNNER ADVANCE 8500 Series 2600 model1.0
|
Canon imageRUNNER ADVANCE 45900KG/4500 Series 2600 model1.0
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0520_it6590.html
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0561_it6613.html
|
heuristics/scheme_data/toe_overseas_name |
Canon imageRUNNER ADVANCE 8500 Series 2600 model1.0
|
Canon imageRUNNER ADVANCE 45900KG/4500 Series 2600 model1.1
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
c0520_eimg.pdf
|
c0561kz_eimg.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata//CreationDate |
D:20160914093959+09'00'
|
D:20180322153355+09'00'
|
pdf_data/cert_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/cert_metadata//ModDate |
D:20160914094027+09'00'
|
D:20180322153439+09'00'
|
pdf_data/cert_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/cert_metadata/pdf_file_size_bytes |
476466
|
477125
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/cert_metadata/pdf_number_of_pages |
1
|
1
|
pdf_data/report_filename |
c0520_erpt.pdf
|
c0561_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0520-01:
1
- Certification No. C0520:
1
|
- CRP-C0561-01:
1
- Certification No. C0561:
1
|
pdf_data/report_keywords/cc_claims/A |
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_claims/T/T.CONF |
2
|
4
|
pdf_data/report_keywords/cc_claims/T/T.DOC |
2
|
4
|
pdf_data/report_keywords/cc_claims/T/T.FUNC |
1
|
2
|
pdf_data/report_keywords/cc_claims/T/T.PROT |
1
|
2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL2:
3
- EAL3: 1
- EAL2 augmented:
2
- EAL3 augmented: 1
|
- EAL2:
4
- EAL2 augmented:
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
3
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 augmented |
2
|
3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS PUB 186-2:
1
- FIPS 186-2:
1
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20170123115844+09'00'
|
D:20180605151924+09'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//ModDate |
D:20170123115901+09'00'
|
D:20180605152042+09'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata/pdf_file_size_bytes |
384718
|
308105
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
35
|
37
|
pdf_data/st_filename |
c0520_est.pdf
|
c0561_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
pdf_data/st_keywords/cc_claims/D/D.CONF |
8
|
8
|
pdf_data/st_keywords/cc_claims/D/D.DOC |
18
|
19
|
pdf_data/st_keywords/cc_claims/D/D.FUNC |
11
|
11
|
pdf_data/st_keywords/cc_claims/D/D.PROT |
6
|
6
|
pdf_data/st_keywords/cc_claims/O |
- O.DOC:
14
- O.FUNC:
7
- O.PROT:
7
- O.CONF:
14
- O.USER:
13
- O.INTERFACE:
7
- O.SOFTWARE:
6
- O.AUDIT:
6
|
- O.STORAGE: 6
- O.DOC:
12
- O.FUNC:
6
- O.PROT:
6
- O.CONF:
12
- O.USER:
12
- O.INTERFACE:
6
- O.SOFTWARE:
5
- O.AUDIT:
5
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT |
6
|
5
|
pdf_data/st_keywords/cc_claims/O/O.CONF |
14
|
12
|
pdf_data/st_keywords/cc_claims/O/O.DOC |
14
|
12
|
pdf_data/st_keywords/cc_claims/O/O.FUNC |
7
|
6
|
pdf_data/st_keywords/cc_claims/O/O.INTERFACE |
7
|
6
|
pdf_data/st_keywords/cc_claims/O/O.PROT |
7
|
6
|
pdf_data/st_keywords/cc_claims/O/O.SOFTWARE |
6
|
5
|
pdf_data/st_keywords/cc_claims/O/O.USER |
13
|
12
|
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN |
8
|
6
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_ACCESS |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_STORAGE |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.INTERFACE |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYISCAL |
2
|
1
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL |
2
|
2
|
pdf_data/st_keywords/cc_claims/OE/OE.USER |
14
|
12
|
pdf_data/st_keywords/cc_claims/T |
- T.DOC:
6
- T.FUNC:
3
- T.PROT:
3
- T.CONF:
6
|
- T.DOC:
6
- T.FUNC:
3
- T.PROT:
3
- T.CONF:
6
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
|
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 |
12
|
11
|
pdf_data/st_keywords/cc_sar/APE |
|
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 2 |
2
|
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 2 augmented |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL2 |
9
|
8
|
pdf_data/st_keywords/cc_security_level/EAL/EAL2 augmented |
8
|
7
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
13
|
13
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
28
|
26
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
14
|
14
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
15
|
14
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
26
|
25
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
46
- FDP_ACF.1:
35
- FDP_RIP.1:
6
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_IFC.1:
4
- FDP_ACC.1.1:
3
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
3
- FDP_ACF.1.4:
3
- FDP_RIP.1.1:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
6
|
- FDP_ACC.1:
46
- FDP_ACF.1:
35
- FDP_RIP.1:
6
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_IFC.1:
4
- FDP_ACC.1.1:
3
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
3
- FDP_ACF.1.4:
3
- FDP_RIP.1.1:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
6
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_ATD.1:
9
- FIA_UAU.1:
13
- FIA_UID.1:
23
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_SOS.1:
6
- FIA_UAU.7:
7
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS.1.1:
1
|
- FIA_ATD.1:
9
- FIA_UAU.1:
13
- FIA_UID.1:
23
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_SOS.1:
6
- FIA_UAU.7:
7
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.1:
25
- FMT_MSA.3:
23
- FMT_MTD.1:
18
- FMT_SMF.1:
25
- FMT_SMR.1:
36
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
|
- FMT_MSA.1:
25
- FMT_MSA.3:
24
- FMT_MTD.1:
18
- FMT_SMF.1:
24
- FMT_SMR.1:
34
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1.1:
2
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMF.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
25
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
23
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
25
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
36
|
34
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_CIP_EXP: 2
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_CIP_EXP.1: 16
- FPT_FDI_EXP.1:
11
- FPT_CIP_EXP.1.1: 2
- FPT_CIP_EXP.1.2: 3
- FPT_FDI_EXP.1.1:
2
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_FDI_EXP.1:
11
- FPT_FDI_EXP.1.1:
2
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 197:
3
- FIPS PUB 46-3:
1
- FIPS PUB 186-2:
3
|
- FIPS:
- FIPS PUB 197:
3
- FIPS PUB 46-3:
1
- FIPS PUB 186-2:
3
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft:
2
- Microsoft Corporation:
1
|
- Microsoft:
- Microsoft:
2
- Microsoft Corporation:
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
832302
- pdf_is_encrypted:
False
- pdf_number_of_pages:
64
- /Subject:
- /Producer:
Adobe LiveCycle PDFGenerator
- /Keywords:
- /Author:
Canon Inc.
- /ModDate:
D:20170116170919+09'00'
- /Creator:
PScript5.dll Version 5.2.2
- /Title:
Canon imageRUNNER ADVANCE 8500 Series 2600 model Security Target
- /CreationDate:
D:20170116170919+09'00'
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1468033
- pdf_is_encrypted:
True
- pdf_number_of_pages:
61
- /Author:
Canon Inc.
- /CreationDate:
D:20180531144951+09'00'
- /Creator:
Microsoft® Word 2016
- /ModDate:
D:20180531152635+09'00'
- /Producer:
Microsoft® Word 2016
- /Title:
Canon imageRUNNER ADVANCE C45900KG/4500 Series 2600 model Security Target
- pdf_hyperlinks:
mailto:[email protected]
|
pdf_data/st_metadata//Author |
Canon Inc.
|
Canon Inc.
|
pdf_data/st_metadata//CreationDate |
D:20170116170919+09'00'
|
D:20180531144951+09'00'
|
pdf_data/st_metadata//Creator |
PScript5.dll Version 5.2.2
|
Microsoft® Word 2016
|
pdf_data/st_metadata//ModDate |
D:20170116170919+09'00'
|
D:20180531152635+09'00'
|
pdf_data/st_metadata//Producer |
Adobe LiveCycle PDFGenerator
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Title |
Canon imageRUNNER ADVANCE 8500 Series 2600 model Security Target
|
Canon imageRUNNER ADVANCE C45900KG/4500 Series 2600 model Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
832302
|
1468033
|
pdf_data/st_metadata/pdf_hyperlinks |
|
mailto:[email protected] |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
True
|
pdf_data/st_metadata/pdf_number_of_pages |
64
|
61
|
dgst |
8aaae880ff485171
|
81ee3555062b13ba
|