This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Juniper Networks Junos OS 22.3R1 for MX204, ACX5448 and ACX5448-D Certificate Number: 2024/151 |
Canon iR5570/iR6570 Series Encrypted Printing Software-B1 Version 1.01 JISEC-CC-CRP-C0027 |
|
---|---|---|
name | Juniper Networks Junos OS 22.3R1 for MX204, ACX5448 and ACX5448-D | Canon iR5570/iR6570 Series Encrypted Printing Software-B1 Version 1.01 |
category | Network and Network-Related Devices and Systems | Multi-Function Devices |
scheme | AU | JP |
status | active | archived |
not_valid_after | 14.08.2029 | 07.01.2013 |
not_valid_before | 14.08.2024 | 03.06.2005 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2024_151_EFT-T031_OS%2022.3R1%20for%20Junos%20OS%2022.3R1%20for%20MX204,%20ACX5448%20and%20ACX5448-D_os.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2024-EFT-T031-CR-V1.0.pdf | https://www.commoncriteriaportal.org/files/epfiles/c0027_ecvr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20Junos%20OS%2022.3R1%20MX204,%20ACX5448%20and%20ACX5448-D%20Security%20Target%20v1.1_24Oct2024.pdf | https://www.commoncriteriaportal.org/files/epfiles/ |
manufacturer | Juniper Networks, Inc. | Canon Inc. |
manufacturer_web | https://www.juniper.net/ | |
security_level | {} | EAL2 |
dgst | 9bd869f365544ab5 | 3edbe85a07cdaa0d |
heuristics/cert_id | Certificate Number: 2024/151 | JISEC-CC-CRP-C0027 |
heuristics/extracted_sars | AGD_OPE.1, ASE_SPD.1, ADV_FSP.1, ASE_REQ.1, ASE_OBJ.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, AGD_PRE.1, ALC_CMS.1, ALC_CMC.1, ASE_INT.1, ASE_TSS.1, ATE_IND.1 | {} |
heuristics/extracted_versions | 22.3 | 1.01 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | 89f2a255423f4a20 | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf | {} |
pdf_data/cert_filename | AISEP_Certificate_2024_151_EFT-T031_OS 22.3R1 for Junos OS 22.3R1 for MX204, ACX5448 and ACX5448-D_os.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | AISEP-CC-CR-2024-EFT-T031-CR-V1.0.pdf | c0027_ecvr.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Juniper Junos OS 22.3R1 MX204, ACX5448 and ACX5448-D Security Target v1.1_24Oct2024.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level | ||
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor | ||
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis | ||
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | True | False |
state/st/download_ok | True | False |
state/st/extract_ok | True | False |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |