name |
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model 1.3
|
Canon imageRUNNER ADVANCE C2200 Series 2600.1 model Version:1.1
|
category |
Multi-Function Devices
|
Multi-Function Devices
|
not_valid_before |
2014-11-27
|
2013-07-10
|
not_valid_after |
2019-12-02
|
2018-08-07
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0447_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0394_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Canon Inc.
|
Canon Inc.
|
manufacturer_web |
https://www.canon.com/
|
https://www.canon.com/
|
security_level |
ALC_FLR.2, EAL3+ |
ALC_FLR.2, EAL3+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0447_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0394_erpt.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 12, 22), 'maintenance_title': 'Canon imageRUNNER ADVANCE C5900KB/C5200 Series 2600.1 model 1.4', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0447kz_eacr.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0447kz_est.pdf'}) |
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
9300d29c22ba37038fa878cc8c36905f96a6405579d48777cc37ff9096966ac9
|
a8930844134dd5fc2e4157dbe778b60d203238e88576114ae63a12acc79998d7
|
state/report/txt_hash |
3f702f83bc83eb2e1d8704b0e9f50f13e44455374cbb2df0f6109bc149e510ac
|
4ac830c8031ff7dd226f7775b157afdd593b4d6a3b9b082bd987f778f55fb5ae
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
c01979e33ca32581ea22efa6f525b953b2f72d27e4ffa170b3e0e3ad7eee9edf
|
9ae1d3e4b38f319a945acbc1cdf740fdbf09e237a548e921e894622528bda5cc
|
state/st/txt_hash |
b11cf1caeae8dc024992dde46c0c89d271b3057c20f343500aa5dd7c21cf174f
|
711a525de69bf779816fc7984a197c36414a5a092b72386fc62d8abb628f4d63
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0447
|
JISEC-CC-CRP-C0394
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_FLR.2, ALC_DVS.1, ALC_CMS.3, ADV_FSP.3, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, AGD_OPE.1, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ALC_CMC.3, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ADV_TDS.2, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2 |
ALC_FLR.2, ALC_DVS.1, ALC_CMS.3, ADV_FSP.3, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, AGD_OPE.1, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ALC_CMC.3, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ADV_TDS.2, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- cert_id:
C0447
- supplier:
Canon Inc.
- toe_overseas_name:
Canon imageRUNNER ADVANCE C5900KB/C5200 Series 2600.1 model1.4
- expiration_date:
2019-12
- claim:
EAL3+ALC_FLR.2
PP
- revalidations: frozendict({'date': '2015-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0447_it4516_01.html'})
- certification_date:
2014-11
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0447_it4516.html
- toe_japan_name:
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model1.3
- enhanced:
- product:
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model
- toe_version:
1.3
- product_type:
Multifunction Product
- certification_date:
2014-11-27
- cc_version:
3.1 Release4
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1™-2009
- vendor:
Canon Inc.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
- report_link:
https://www.ipa.go.jp/en/security/c0447_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0447_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0447_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
- cert_id:
C0394
- supplier:
Canon Inc.
- toe_overseas_name:
Canon imageRUNNER ADVANCE C2200 Series 2600.1 model1.1
- expiration_date:
2018-08
- claim:
EAL3+ALC_FLR.2
PP
- certification_date:
2013-07
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0394_it2396.html
- toe_japan_name:
Canon imageRUNNER ADVANCE C2200 Series 2600.1 model1.1
- enhanced:
- product:
Canon imageRUNNER ADVANCE C2200 Series 2600.1 model
- toe_version:
1.1
- product_type:
Multifunction Product
- certification_date:
2013-07-10
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor:
Canon Inc.
- evaluation_facility:
ECSEC Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0394_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0394_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0394_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/cert_id |
C0447
|
C0394
|
heuristics/scheme_data/certification_date |
2014-11
|
2013-07
|
heuristics/scheme_data/claim |
EAL3+ALC_FLR.2
PP
|
EAL3+ALC_FLR.2
PP
|
heuristics/scheme_data/enhanced/assurance_level |
EAL3 Augmented with ALC_FLR.2
|
EAL3 Augmented with ALC_FLR.2
|
heuristics/scheme_data/enhanced/cc_version |
3.1 Release4
|
3.1
|
heuristics/scheme_data/enhanced/cert_link |
https://www.ipa.go.jp/en/security/c0447_eimg.pdf
|
https://www.ipa.go.jp/en/security/c0394_eimg.pdf
|
heuristics/scheme_data/enhanced/certification_date |
2014-11-27
|
2013-07-10
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
|
ECSEC Laboratory Inc.
Evaluation Center
|
heuristics/scheme_data/enhanced/product |
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model
|
Canon imageRUNNER ADVANCE C2200 Series 2600.1 model
|
heuristics/scheme_data/enhanced/product_type |
Multifunction Product
|
Multifunction Product
|
heuristics/scheme_data/enhanced/protection_profile |
IEEE Std 2600.1™-2009
|
IEEE Std 2600.1-2009
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0447_erpt.pdf
|
https://www.ipa.go.jp/en/security/c0394_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0447_est.pdf
|
https://www.ipa.go.jp/en/security/c0394_est.pdf
|
heuristics/scheme_data/enhanced/toe_version |
1.3
|
1.1
|
heuristics/scheme_data/enhanced/vendor |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/expiration_date |
2019-12
|
2018-08
|
heuristics/scheme_data/supplier |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/toe_japan_name |
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model1.3
|
Canon imageRUNNER ADVANCE C2200 Series 2600.1 model1.1
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0447_it4516.html
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0394_it2396.html
|
heuristics/scheme_data/toe_overseas_name |
Canon imageRUNNER ADVANCE C5900KB/C5200 Series 2600.1 model1.4
|
Canon imageRUNNER ADVANCE C2200 Series 2600.1 model1.1
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
c0447_erpt.pdf
|
c0394_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0447-01:
1
- Certification No. C0447:
1
|
- CRP-C0394-01:
1
- Certification No. C0394:
1
|
pdf_data/report_keywords/cc_claims/A |
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_claims/T/T.CONF |
2
|
4
|
pdf_data/report_keywords/cc_claims/T/T.DOC |
2
|
4
|
pdf_data/report_keywords/cc_claims/T/T.FUNC |
1
|
2
|
pdf_data/report_keywords/cc_claims/T/T.PROT |
1
|
2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3:
4
- EAL3 augmented:
2
|
- EAL:
- EAL3:
4
- EAL3 augmented:
2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
pdf_data/report_keywords/standard_id/FIPS |
|
- FIPS PUB 186-2:
1
- FIPS 186-2: 1
|
pdf_data/report_keywords/standard_id/FIPS/FIPS PUB 186-2 |
1
|
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/Microsoft/Microsoft |
2
|
4
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20160112164043+09'00'
|
D:20140911142853+09'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//ModDate |
D:20160112164226+09'00'
|
D:20140911142922+09'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata/pdf_file_size_bytes |
330024
|
307593
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
37
|
35
|
pdf_data/st_filename |
c0447_est.pdf
|
c0394_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
pdf_data/st_keywords/cc_claims/D/D.CONF |
8
|
8
|
pdf_data/st_keywords/cc_claims/D/D.DOC |
16
|
19
|
pdf_data/st_keywords/cc_claims/D/D.FUNC |
11
|
11
|
pdf_data/st_keywords/cc_claims/D/D.PROT |
6
|
6
|
pdf_data/st_keywords/cc_claims/O |
- O.HDD:
8
- O.DOC:
16
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
14
- O.INTERFACE:
8
- O.SOFTWARE:
7
- O.AUDIT:
7
|
- O.HDD:
8
- O.DOC:
16
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
14
- O.INTERFACE:
8
- O.SOFTWARE:
7
- O.AUDIT:
7
|
pdf_data/st_keywords/cc_claims/OE |
- OE.AUDIT_STORAGE:
4
- OE.AUDIT_ACCESS:
4
- OE.INTERFACE:
4
- OE.PHYSICAL:
2
- OE.USER:
14
- OE.ADMIN:
8
- OE.AUDIT:
4
- OE.PHYISCAL:
2
|
- OE.AUDIT_STORAGE:
4
- OE.AUDIT_ACCESS:
4
- OE.INTERFACE:
4
- OE.PHYSICAL:
2
- OE.USER:
14
- OE.ADMIN:
8
- OE.AUDIT:
4
- OE.PHYISCAL:
2
|
pdf_data/st_keywords/cc_claims/T |
- T.DOC:
6
- T.FUNC:
3
- T.PROT:
3
- T.CONF:
6
|
- T.DOC:
6
- T.FUNC:
3
- T.PROT:
3
- T.CONF:
6
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.2:
12
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- APE:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.2:
12
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- APE:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3:
9
- EAL 3:
2
- EAL3 augmented:
8
- EAL 3 augmented:
1
|
- EAL:
- EAL3:
9
- EAL 3:
2
- EAL3 augmented:
8
- EAL 3 augmented:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
13
- FAU_GEN.2:
6
- FAU_SAR.1:
8
- FAU_SAR.2:
6
- FAU_STG.1:
8
- FAU_STG.4:
6
- FAU_GEN:
2
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
|
- FAU_GEN.1:
13
- FAU_GEN.2:
6
- FAU_SAR.1:
8
- FAU_SAR.2:
6
- FAU_STG.1:
8
- FAU_STG.4:
6
- FAU_GEN:
2
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_COP.1:
25
- FCS_CKM.1:
24
- FCS_CKM.2:
13
- FCS_CKM.4:
12
- FCS_COP.1.1:
2
- FCS_CKM.1.1:
1
- FCS_CKM.2.1:
1
|
- FCS_COP.1:
25
- FCS_CKM.1:
24
- FCS_CKM.2:
13
- FCS_CKM.4:
12
- FCS_COP.1.1:
2
- FCS_CKM.1.1:
1
- FCS_CKM.2.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
53
|
44
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
40
|
33
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_ATD.1:
9
- FIA_UAU.1:
13
- FIA_UID.1:
22
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_SOS.1:
6
- FIA_UAU.7:
7
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS.1.1:
1
|
- FIA_ATD.1:
9
- FIA_UAU.1:
13
- FIA_UID.1:
22
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_SOS.1:
6
- FIA_UAU.7:
7
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
23
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
25
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
25
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
33
|
33
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_CIP_EXP:
2
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_CIP_EXP.1:
16
- FPT_FDI_EXP.1:
11
- FPT_PHP.1:
6
- FPT_CIP_EXP.1.1:
2
- FPT_CIP_EXP.1.2:
3
- FPT_FDI_EXP.1.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
- FPT_CIP_EXP:
2
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_CIP_EXP.1:
16
- FPT_FDI_EXP.1:
11
- FPT_PHP.1:
6
- FPT_CIP_EXP.1.1:
2
- FPT_CIP_EXP.1.2:
3
- FPT_FDI_EXP.1.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- physical tampering:
4
- malfunction:
1
|
- FI:
- physical tampering:
4
- malfunction:
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 197:
3
- FIPS PUB 46-3:
1
- FIPS PUB 186-2:
4
|
- FIPS:
- FIPS PUB 197:
3
- FIPS PUB 46-3:
1
- FIPS PUB 186-2:
4
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft:
2
- Microsoft Corporation:
1
|
- Microsoft:
- Microsoft:
2
- Microsoft Corporation:
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Canon Inc.
|
|
pdf_data/st_metadata//CreationDate |
D:20151224205603+09'00'
|
D:20140829143628+09'00'
|
pdf_data/st_metadata//Creator |
PScript5.dll Version 5.2.2
|
PScript5.dll Version 5.2.2
|
pdf_data/st_metadata//Keywords |
|
|
pdf_data/st_metadata//ModDate |
D:20151224205606+09'00'
|
D:20140829143631+09'00'
|
pdf_data/st_metadata//Producer |
Adobe LiveCycle PDFGenerator
|
Adobe LiveCycle PDFGenerator
|
pdf_data/st_metadata//Subject |
|
|
pdf_data/st_metadata//Title |
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model Security Target
|
|
pdf_data/st_metadata/pdf_file_size_bytes |
832222
|
843077
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/st_metadata/pdf_number_of_pages |
66
|
63
|
dgst |
9f19da4daef5570e
|
9f643248c7eae1e3
|