name |
Canon imageRUNNER ADVANCE DX C37900KG/C3700 Series 2600 model1.0 |
ZKA SECCOS Sig v2.6.4 R1.1 |
category |
Multi-Function Devices |
Products for Digital Signatures |
scheme |
JP |
DE |
status |
active |
archived |
not_valid_after |
15.09.2025 |
01.09.2019 |
not_valid_before |
15.09.2020 |
22.07.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0683_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0683_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0449a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0683_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0449b_pdf.pdf |
manufacturer |
Canon Inc. |
Sagem Orga GmbH |
manufacturer_web |
https://www.canon.com/ |
https://www.sagem-orga.com/ |
security_level |
EAL2+, ALC_FLR.2 |
AVA_MSU.3, EAL4+, AVA_VLA.4 |
dgst |
ade9df908634bf7a |
5abddce0ce26912a |
heuristics/cert_id |
JISEC-CC-CRP-C0683-01-2020 |
BSI-DSZ-CC-0449-2009 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3, ADV_IMP.1 |
heuristics/extracted_versions |
1.0 |
1.1, 2.6.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0421-2008 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0421-2008 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0683
- certification_date: 01.09.2020
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0683
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000xlv-att/c0683_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. User Authentication Function Function for identifying and authenticating the user. Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. HDD Data Encryption Function Function for encrypting all data stored in the HDD. LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. Self-Test Function Function for testing the integrity of the executable code at startup. Audit Log Function Function for generating audit logs on security events, allowing them to be viewed by the administrator and sending them to an external server. Management Function Function for restricting device settings that influence security to be made only by the administrator.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: Canon imageRUNNER ADVANCE DX C37900KG/C3700 Series 2600 model
- product_type: Multifunction Product
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000xlv-att/c0683_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000xlv-att/c0683_est.pdf
- toe_version: 1.0
- vendor: Canon Inc.
- expiration_date:
- supplier: Canon Inc.
- toe_japan_name: Canon imageRUNNER ADVANCE DX C37900KG / C3700 Series 2600 model1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0683_it0735.html
- toe_overseas_name: Canon imageRUNNER ADVANCE DX C37900KG / C3700 Series 2600 model1.0
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0421-2008 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0421-2008 |
heuristics/protection_profiles |
43ce79b420f23a00 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
{} |
pdf_data/cert_filename |
c0683_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0683-01-2020: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20201106140615+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20201106140939+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 130787
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0683_erpt.pdf |
0449a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0449-2009
- cert_item: ZKA SECCOS Sig v2.6.4 R1.1
- cert_lab: BSI
- developer: Sagem Orga GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0683-01-2020: 1
|
- DE:
- BSI-DSZ-CC-0421: 3
- BSI-DSZ-CC-0421-2008: 1
- BSI-DSZ-CC-0421-2008-MA-01: 1
- BSI-DSZ-CC-0449-2009: 20
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0006-2002: 1
- BSI-PP-0002: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 4+: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA2:
- SHA-2: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Fault Injection: 1
- fault injection: 1
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 25: 3
- AIS 26: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 2
- AIS 36: 3
- AIS 37: 1
- AIS 38: 1
- FIPS:
- ISO:
- ISO/IEC 15408:2005: 3
- ISO/IEC 9796-2: 1
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 1, Developer Sagem ORGA GmbH (confidential document) [8] Configuration List, Version V1.08, Sagem Orga GmbH, 07.07.2009, (confidential document) [9: 1
- Atmel Smart Card IC AT90SC28872RCU, BSI-DSZ-CC-0421, T-Systems GEI GmbH, Version 1.06, 08.10.2008 (confidential document) [12] Security Target for Atmel Smart Card IC AT90SC28872RCU, registered by Bundesamt für: 1
- Target BSI-DSZ-2009-0449, ZKA SECCOS Sig v2.6.4, Version V1.06, Sagem Orga GmbH, 02.07.2009 (confidential document) [7] Evaluation Technical Report (ETR), Version 1.5, Date 08.07.2009, Product ZKA SECCOS Sig v2.6.4: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20211104114319+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20211104115316+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 387100
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090806143205+02'00'
- /Creator: Writer
- /Keywords: "ZKA SECCOS Sig v2.6.4 R1.1, Sagem Orga GmbH, Zertifzierung, Certification, Common Criteria"
- /ModDate: D:20090810103744+02'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0449-2009
- pdf_file_size_bytes: 742990
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
c0683_est.pdf |
0449b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0421: 1
- BSI-DSZ-CC-0421-2008: 1
- BSI-DSZ-CC-0421-2008-MA-01: 1
- BSI-DSZ-CC-0421-2008-MA-02: 1
- BSI-DSZ-CC-0449: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0006-2002: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL2: 8
- EAL2 augmented: 7
|
- EAL:
- EAL 4: 4
- EAL 4 augmented: 3
- EAL 4+: 2
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 11
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 1
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 1
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 3
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 8
- AVA_SOF: 1
- AVA_SOF.1: 4
- AVA_VLA: 1
- AVA_VLA.4: 8
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 26
- FCS_CKM.1.1: 2
- FCS_CKM.2: 14
- FCS_CKM.2.1: 1
- FCS_CKM.4: 14
- FCS_COP.1: 25
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 45
- FDP_ACC.1.1: 3
- FDP_ACF.1: 35
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 7
- FIA_UID.1: 23
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 22
- FMT_MSA.1.1: 2
- FMT_MSA.3: 23
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 19
- FMT_MTD.1.1: 2
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR.1: 34
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 15
- FTA_SSL.3.1: 2
- FTP:
- FTP_ITC.1: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 6
- FCS_CKM.1.1: 3
- FCS_CKM.2: 2
- FCS_CKM.2.1: 2
- FCS_CKM.3: 1
- FCS_CKM.3.1: 2
- FCS_CKM.4: 6
- FCS_CKM.4.1: 3
- FCS_COP: 2
- FCS_COP.1: 5
- FCS_COP.1.1: 5
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 11
- FDP_ACC.1.1: 7
- FDP_ACF: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 7
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 7
- FDP_ACF.1.4: 7
- FDP_ETC: 1
- FDP_ETC.1: 1
- FDP_ETC.1.1: 2
- FDP_ETC.1.2: 2
- FDP_IFC.1: 7
- FDP_ITC: 1
- FDP_ITC.1: 7
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_RIP: 1
- FDP_RIP.1: 1
- FDP_RIP.1.1: 2
- FDP_SDI: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_SDI.2.1: 3
- FDP_SDI.2.2: 3
- FDP_UIT: 3
- FDP_UIT.1: 4
- FDP_UIT.1.1: 8
- FDP_UIT.1.2: 7
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 1
- FIA_ATD.1: 1
- FIA_ATD.1.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 2
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 2
- FIA_UID: 1
- FIA_UID.1: 4
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 2
- FMT_MOF.1.1: 2
- FMT_MSA: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 5
- FMT_MSA.2: 7
- FMT_MSA.2.1: 1
- FMT_MSA.3: 4
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_MTD: 1
- FMT_MTD.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF: 1
- FMT_SMF.1: 3
- FMT_SMF.1.1: 2
- FMT_SMR: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_AMT: 1
- FPT_AMT.1: 3
- FPT_AMT.1.1: 2
- FPT_FLS: 1
- FPT_FLS.1: 2
- FPT_FLS.1.1: 2
- FPT_PHP: 1
- FPT_PHP.1: 1
- FPT_PHP.1.1: 2
- FPT_PHP.1.2: 2
- FPT_PHP.3: 1
- FPT_PHP.3.1: 2
- FPT_TST: 1
- FPT_TST.1: 3
- FPT_TST.1.1: 3
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 10
- FTP_ITC.1.1: 8
- FTP_ITC.1.2: 8
- FTP_ITC.1.3: 10
- FTP_TRP: 2
- FTP_TRP.1: 10
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 4
- FTP_TRP.1.3: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 8
- D.DOC: 19
- D.FUNC: 11
- D.PROT: 6
- O:
- O.AUDIT: 6
- O.CONF: 14
- O.DOC: 14
- O.FUNC: 6
- O.FUNC_: 1
- O.INTERFACE: 7
- O.PROT: 7
- O.SOFTWARE: 6
- O.STORAGE: 7
- O.USER: 13
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 3
- OE.AUDIT_STORAGE: 3
- OE.INTERFACE: 3
- OE.PHYISCAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 2
- Microsoft Corporation: 1
|
- Infineon:
- Philips:
- Sagem:
|
pdf_data/st_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 8
- SHA-512: 8
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 5
- Fault injection: 2
- physical tampering: 7
- SCA:
- DPA: 6
- SPA: 6
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
- CCIMB-2005-08-004: 1
- ISO:
- ISO/IEC 10118-3: 1
- ISO/IEC 11770-3: 1
- ISO/IEC 15408: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-3: 1
- ISO/IEC 7816-4: 2
- ISO/IEC 7816-8: 1
- ISO/IEC 7816-9: 1
- ISO/IEC 9796-2: 3
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Canon Inc.
- /CreationDate: D:20211101160948+09'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20211101160948+09'00'
- /Producer: Microsoft® Word 2016
- /Title: Canon imageRUNNER ADVANCE DX C37900KG/C3700 Series 2600 model Security Target
- pdf_file_size_bytes: 1637738
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 63
|
- /Author: Karsten Klohs
- /Comments: OdsDok V2.00n
- /Company: ORGA-Kartensysteme GmbH
- /CreationDate: D:20090702162539+02'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20090702162724+02'00'
- /OdsAcceptance: not applicable
- /OdsApproval: not applicable
- /OdsAuthor: Karsten Klohs
- /OdsCompany: Sagem ORGA GmbH
- /OdsCompanyCity: Paderborn
- /OdsConfidentiality:
- /OdsDocCatCombined: CSL (ST-Lite)
- /OdsDocCatLong: ST-Lite
- /OdsDocID: 3SECCOS.CSL.0004
- /OdsDocPool: 3.000000
- /OdsNumber: 0004
- /OdsPPTCombined: SECCOS (SECCOS - Secure Chip Card Operating System)
- /OdsReviewProto: not applicable
- /OdsTitel: ZKA SECCOS Sig v2.6.4
- /OdsVerDate: 02.07.2009
- /OdsVerID: V1.05
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20090702142453
- /Subject: Security Target for CC Evaluation EAL 4+
- /Title: ZKA SECCOS Sig v2.6.4
- pdf_file_size_bytes: 533925
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 111
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |