name |
Canon imageRUNNER ADVANCE 8500 Series 2600 model 1.0
|
Canon imageRUNNER ADVANCE 6500 Series 2600 model 1.0
|
category |
Multi-Function Devices
|
Multi-Function Devices
|
not_valid_before |
2016-08-29
|
2016-08-29
|
not_valid_after |
2021-08-29
|
2021-08-29
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0520_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0519_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Canon Inc.
|
Canon Inc.
|
manufacturer_web |
https://www.canon.com/
|
https://www.canon.com/
|
security_level |
ALC_FLR.2, EAL2+ |
ALC_FLR.2, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0520_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0519_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0520_eimg.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0519_eimg.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
522de4c2cf050b6f4c7051c71bd552d593ab2ccfbd35bf96ecda70e236a051e7
|
9ae7279f59129ce9dd8a1790c9c2976a94d8728fbf7d23b068a5ebce5fbcc412
|
state/cert/txt_hash |
b742ac935de7e8c956455699501a31cc6c6dbce0b517188787bdb3e1daf8f315
|
fd98a0e4f07b24e799e6ddee838ce890606e9c47be78949908192ad4be710e0e
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
f8a41597b583cd587e2771457fe7342b3d44fd6a7acd0af966c38b725acf160e
|
818a971b000ea4fcb4e942b7f86378bec770da6c39f6566702289390dda26984
|
state/report/txt_hash |
b9dbb0502fc493b58e8dc7404b626ea86556d6c65b820104dbb04b938cd1c58f
|
3db8ccc88e81787ced050c7fa3de04ca444e29a36f7c76c3c9df101aadc9d27d
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
489346e8d16e39f1b2e607384b632c280714c2e262641266274ec0ec26bc2e54
|
c5b47457a56c583453f50843c976c6cc801f8906a1b2b6ef4f66088e437ac1d5
|
state/st/txt_hash |
b134a176e1198ae72b0cedd23a478741cb2cb482f136e2a3bdc265fe7dc62944
|
82fad2476e5ae66fca132cc57310bda5cc02ef8f8d7cd5e5d4c8e997c6552c9c
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0520
|
JISEC-CC-CRP-C0519
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
cpe:2.3:a:canon:imagerunner_8500:-:*:*:*:*:*:*:* |
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_FLR.2, ADV_FSP.2, ALC_CMC.2, ASE_CCL.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ALC_CMS.2, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2 |
ALC_FLR.2, ADV_FSP.2, ALC_CMC.2, ASE_CCL.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ALC_CMS.2, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2 |
heuristics/extracted_versions |
1.0 |
1.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
CVE-2008-0303, CVE-2006-4680 |
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- cert_id:
C0520
- supplier:
Canon Inc.
- toe_overseas_name:
Canon imageRUNNER ADVANCE 8500 Series 2600 model1.0
- expiration_date:
2021-09
- claim:
EAL2+ALC_FLR.2PP
- certification_date:
2016-08
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0520_it6590.html
- toe_japan_name:
Canon imageRUNNER ADVANCE 8500 Series 2600 model1.0
- enhanced:
- product:
Canon imageRUNNER ADVANCE 8500 Series 2600 model
- toe_version:
1.0
- product_type:
Multifunction Product
- certification_date:
2016-08-29
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- vendor:
Canon Inc.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- description:
Certification/Validation Report : (376 KB)(2017-01-25) CC Certificate Image : (466 KB)(2016-09-15) Security Target : (813 KB)(2017-01-25)
|
- cert_id:
C0562
- supplier:
Canon Inc.
- toe_overseas_name:
Canon imageRUNNER ADVANCE 6500 Series 2600 model2.1
- expiration_date:
2022-07
- claim:
EAL2+ALC_FLR.2
PP
- revalidations: frozendict({'date': '2017-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0562_it6614_01.html'})
- certification_date:
2017-06
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0562_it6614.html
- toe_japan_name:
Canon imageRUNNER ADVANCE 6500 Series 2600 model2.0
- enhanced:
- product:
Canon imageRUNNER ADVANCE 6500 Series 2600 model
- toe_version:
2.0
- product_type:
Multifunction Product
- certification_date:
2017-06-28
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- vendor:
Canon Inc.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function Function for identifying and authenticating the user.
-
Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function Function for encrypting all data stored in the HDD.
-
LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function Function for testing the integrity of the executable code at startup.
-
Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/cert_id |
C0520
|
C0562
|
heuristics/scheme_data/certification_date |
2016-08
|
2017-06
|
heuristics/scheme_data/claim |
EAL2+ALC_FLR.2PP
|
EAL2+ALC_FLR.2
PP
|
heuristics/scheme_data/enhanced/assurance_level |
EAL2 Augmented with ALC_FLR.2
|
EAL2 Augmented with ALC_FLR.2
|
heuristics/scheme_data/enhanced/cc_version |
3.1 Release4
|
3.1 Release4
|
heuristics/scheme_data/enhanced/certification_date |
2016-08-29
|
2017-06-28
|
heuristics/scheme_data/enhanced/description |
Certification/Validation Report : (376 KB)(2017-01-25) CC Certificate Image : (466 KB)(2016-09-15) Security Target : (813 KB)(2017-01-25)
|
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function Function for identifying and authenticating the user.
-
Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function Function for encrypting all data stored in the HDD.
-
LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function Function for testing the integrity of the executable code at startup.
-
Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/enhanced/evaluation_facility |
ECSEC Laboratory Inc.
Evaluation Center
|
ECSEC Laboratory Inc.
Evaluation Center
|
heuristics/scheme_data/enhanced/product |
Canon imageRUNNER ADVANCE 8500 Series 2600 model
|
Canon imageRUNNER ADVANCE 6500 Series 2600 model
|
heuristics/scheme_data/enhanced/product_type |
Multifunction Product
|
Multifunction Product
|
heuristics/scheme_data/enhanced/protection_profile |
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
|
U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
|
heuristics/scheme_data/enhanced/toe_version |
1.0
|
2.0
|
heuristics/scheme_data/enhanced/vendor |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/expiration_date |
2021-09
|
2022-07
|
heuristics/scheme_data/supplier |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/toe_japan_name |
Canon imageRUNNER ADVANCE 8500 Series 2600 model1.0
|
Canon imageRUNNER ADVANCE 6500 Series 2600 model2.0
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0520_it6590.html
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0562_it6614.html
|
heuristics/scheme_data/toe_overseas_name |
Canon imageRUNNER ADVANCE 8500 Series 2600 model1.0
|
Canon imageRUNNER ADVANCE 6500 Series 2600 model2.1
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
c0520_eimg.pdf
|
c0519_eimg.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata//CreationDate |
D:20160914093959+09'00'
|
D:20160914093818+09'00'
|
pdf_data/cert_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/cert_metadata//ModDate |
D:20160914094027+09'00'
|
D:20160914093904+09'00'
|
pdf_data/cert_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/cert_metadata/pdf_file_size_bytes |
476466
|
476148
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/cert_metadata/pdf_number_of_pages |
1
|
1
|
pdf_data/report_filename |
c0520_erpt.pdf
|
c0519_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0520-01:
1
- Certification No. C0520:
1
|
- CRP-C0519-01:
1
- Certification No. C0519:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2:
3
- EAL3:
1
- EAL2 augmented:
2
- EAL3 augmented:
1
|
- EAL:
- EAL2:
3
- EAL3:
1
- EAL2 augmented:
2
- EAL3 augmented:
1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS PUB 186-2:
1
- FIPS 186-2:
1
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- FIPS:
- FIPS PUB 186-2:
1
- FIPS 186-2:
1
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20170123115844+09'00'
|
D:20170123115736+09'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//ModDate |
D:20170123115901+09'00'
|
D:20170123115758+09'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata/pdf_file_size_bytes |
384718
|
384264
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
35
|
35
|
pdf_data/st_filename |
c0520_est.pdf
|
c0519_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
pdf_data/st_keywords/cc_claims/D |
- D.DOC:
18
- D.FUNC:
11
- D.PROT:
6
- D.CONF:
8
|
- D.DOC:
18
- D.FUNC:
11
- D.PROT:
6
- D.CONF:
8
|
pdf_data/st_keywords/cc_claims/O |
- O.DOC:
14
- O.FUNC:
7
- O.PROT:
7
- O.CONF:
14
- O.USER:
13
- O.INTERFACE:
7
- O.SOFTWARE:
6
- O.AUDIT:
6
|
- O.DOC:
14
- O.FUNC:
7
- O.PROT:
7
- O.CONF:
14
- O.USER:
13
- O.INTERFACE:
7
- O.SOFTWARE:
6
- O.AUDIT:
6
|
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN |
8
|
6
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_ACCESS |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_STORAGE |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.INTERFACE |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYISCAL |
2
|
1
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL |
2
|
2
|
pdf_data/st_keywords/cc_claims/OE/OE.USER |
14
|
12
|
pdf_data/st_keywords/cc_claims/T |
- T.DOC:
6
- T.FUNC:
3
- T.PROT:
3
- T.CONF:
6
|
- T.DOC:
6
- T.FUNC:
3
- T.PROT:
3
- T.CONF:
6
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.2:
12
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- APE:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.2:
12
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- APE:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2:
9
- EAL 2:
2
- EAL2 augmented:
8
- EAL 2 augmented:
1
|
- EAL:
- EAL2:
9
- EAL 2:
2
- EAL2 augmented:
8
- EAL 2 augmented:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
13
- FAU_GEN.2:
6
- FAU_SAR.1:
8
- FAU_SAR.2:
6
- FAU_STG.1:
8
- FAU_STG.4:
6
- FAU_GEN:
2
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
|
- FAU_GEN.1:
13
- FAU_GEN.2:
6
- FAU_SAR.1:
8
- FAU_SAR.2:
6
- FAU_STG.1:
8
- FAU_STG.4:
6
- FAU_GEN:
2
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_COP.1:
26
- FCS_CKM.1:
28
- FCS_CKM.2:
14
- FCS_CKM.4:
15
- FCS_COP.1.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.2.1:
1
|
- FCS_COP.1:
26
- FCS_CKM.1:
28
- FCS_CKM.2:
14
- FCS_CKM.4:
15
- FCS_COP.1.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.2.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
46
- FDP_ACF.1:
35
- FDP_RIP.1:
6
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_IFC.1:
4
- FDP_ACC.1.1:
3
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
3
- FDP_ACF.1.4:
3
- FDP_RIP.1.1:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
6
|
- FDP_ACC.1:
46
- FDP_ACF.1:
35
- FDP_RIP.1:
6
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_IFC.1:
4
- FDP_ACC.1.1:
3
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
3
- FDP_ACF.1.4:
3
- FDP_RIP.1.1:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
6
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_ATD.1:
9
- FIA_UAU.1:
13
- FIA_UID.1:
23
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_SOS.1:
6
- FIA_UAU.7:
7
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS.1.1:
1
|
- FIA_ATD.1:
9
- FIA_UAU.1:
13
- FIA_UID.1:
23
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_SOS.1:
6
- FIA_UAU.7:
7
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
25
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
23
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
25
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
36
|
36
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_CIP_EXP:
2
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_CIP_EXP.1:
16
- FPT_FDI_EXP.1:
11
- FPT_CIP_EXP.1.1:
2
- FPT_CIP_EXP.1.2:
3
- FPT_FDI_EXP.1.1:
2
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
- FPT_CIP_EXP:
2
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_CIP_EXP.1:
16
- FPT_FDI_EXP.1:
11
- FPT_CIP_EXP.1.1:
2
- FPT_CIP_EXP.1.2:
3
- FPT_FDI_EXP.1.1:
2
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 197:
3
- FIPS PUB 46-3:
1
- FIPS PUB 186-2:
3
|
- FIPS:
- FIPS PUB 197:
3
- FIPS PUB 46-3:
1
- FIPS PUB 186-2:
3
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft:
2
- Microsoft Corporation:
1
|
- Microsoft:
- Microsoft:
2
- Microsoft Corporation:
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Canon Inc.
|
Canon Inc.
|
pdf_data/st_metadata//CreationDate |
D:20170116170919+09'00'
|
D:20170116171632+09'00'
|
pdf_data/st_metadata//Creator |
PScript5.dll Version 5.2.2
|
PScript5.dll Version 5.2.2
|
pdf_data/st_metadata//Keywords |
|
|
pdf_data/st_metadata//ModDate |
D:20170116170919+09'00'
|
D:20170116171632+09'00'
|
pdf_data/st_metadata//Producer |
Adobe LiveCycle PDFGenerator
|
Adobe LiveCycle PDFGenerator
|
pdf_data/st_metadata//Subject |
|
|
pdf_data/st_metadata//Title |
Canon imageRUNNER ADVANCE 8500 Series 2600 model Security Target
|
Canon imageRUNNER ADVANCE 6500 Series 2600 model Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
832302
|
826437
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
64
|
64
|
dgst |
8aaae880ff485171
|
c4fbe174b7fcc31c
|