Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon imageRUNNER ADVANCE DX C37900KG/C3700 Series 2600 model1.0
JISEC-CC-CRP-C0683-01-2020
JCLX80jTOP20ID : Java Trusted Open Platform IFX#v42, with patch version 2.0, emedded on SLE66CLX800PE or SLE66CLX360PE
ANSSI-CC-2009/34
name Canon imageRUNNER ADVANCE DX C37900KG/C3700 Series 2600 model1.0 JCLX80jTOP20ID : Java Trusted Open Platform IFX#v42, with patch version 2.0, emedded on SLE66CLX800PE or SLE66CLX360PE
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
status active archived
not_valid_after 15.09.2025 01.09.2019
not_valid_before 15.09.2020 27.10.2009
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0683_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0683_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc_2009-34fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0683_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible_2009-34en.pdf
manufacturer Canon Inc. Trusted Logic / Infineon
manufacturer_web https://www.canon.com/ https://www.trusted-logic.com/
security_level EAL2+, ALC_FLR.2 EAL5+
dgst ade9df908634bf7a e35cd307ad95ed6d
heuristics/cert_id JISEC-CC-CRP-C0683-01-2020 ANSSI-CC-2009/34
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ALC_DVS.2, AVA_VLA.4, AVA_MSU.3
heuristics/extracted_versions 1.0 2.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2009/35
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2009/35
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0683
  • certification_date: 01.09.2020
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0683
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000xlv-att/c0683_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. User Authentication Function Function for identifying and authenticating the user. Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. HDD Data Encryption Function Function for encrypting all data stored in the HDD. LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. Self-Test Function Function for testing the integrity of the executable code at startup. Audit Log Function Function for generating audit logs on security events, allowing them to be viewed by the administrator and sending them to an external server. Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE DX C37900KG/C3700 Series 2600 model
    • product_type: Multifunction Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000xlv-att/c0683_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000xlv-att/c0683_est.pdf
    • toe_version: 1.0
    • vendor: Canon Inc.
  • expiration_date:
  • supplier: Canon Inc.
  • toe_japan_name: Canon imageRUNNER ADVANCE DX C37900KG / C3700 Series 2600 model1.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0683_it0735.html
  • toe_overseas_name: Canon imageRUNNER ADVANCE DX C37900KG / C3700 Series 2600 model1.0
heuristics/protection_profiles 43ce79b420f23a00 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf {}
pdf_data/cert_filename c0683_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0683-01-2020: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20201106140615+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20201106140939+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 130787
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename c0683_erpt.pdf anssi-cc_2009-34fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VLA.4
    • cc_version: Critères Communs version 2.3 conforme à la norme ISO 15408:2005
    • cert_id: ANSSI-CC-2009/34
    • cert_item: Carte à puce JCLX80jTOP20ID : Java Trusted Open Platform IFX#v42, avec patch en version 2.0, masquée sur composants SLE66CLX800PE et SLE66CLX360PE
    • cert_item_version: Version plate-forme : IFX#v42 Version patch : 2.0
    • cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Tél : +33 (0)5 57 26 08 75, mél : [email protected]
    • developer: Trusted Logic 5 rue du Bailliage, 78000 VERSAILLES, FRANCE Infineon Technologies AG AIM CC SM PS - Am Campeon 1-12 - 85579 Neubiberg, GERMANY Commanditaire Trusted Logic 5 rue du Bailliage, 78000 VERSAILLES, FRANCE
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Néant
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0683-01-2020: 1
  • DE:
    • BSI-DSZ-CC-0482: 1
    • BSI-DSZ-CC-0482-2008-MA-05: 1
  • FR:
    • ANSSI-CC-2009/34: 23
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL4: 3
    • EAL5: 1
    • EAL5+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 et: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 1
    • ACM_SCP: 1
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
  • AGD:
    • AGD_ADM: 1
    • AGD_USR: 1
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_CCA: 1
    • AVA_MSU: 1
    • AVA_MSU.3: 1
    • AVA_SOF: 1
    • AVA_VLA: 1
    • AVA_VLA.4: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 5
  • Infineon:
    • Infineon: 3
    • Infineon Technologies: 2
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • Serma:
    • Serma Technologies: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • RSA:
    • RSA2048: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 7
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • BSI:
    • AIS 31: 2
    • AIS 34: 2
    • AIS31: 1
    • AIS34: 1
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 1
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 4
  • JavaCard:
    • Java Card 2.2.1: 3
pdf_data/report_metadata
  • /CreationDate: D:20211104114319+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20211104115316+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 387100
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /CreationDate: D:20091125155640+01'00'
  • /Keywords:
  • /ModDate: D:20091125155640+01'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • pdf_file_size_bytes: 202613
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename c0683_est.pdf anssi-cible_2009-34en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2: 8
    • EAL2 augmented: 7
  • EAL:
    • EAL5: 2
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 11
  • APE:
    • APE_ECD: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_HLD: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VLA.4: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 14
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 14
    • FCS_COP.1: 25
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 45
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 35
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UID.1: 23
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 22
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 23
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 19
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 15
    • FTA_SSL.3.1: 2
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FCS:
    • FCS_CKM: 8
    • FCS_CKM.1: 3
    • FCS_CKM.3: 1
    • FCS_COP: 22
    • FCS_COP.1: 11
    • FCS_RND: 6
    • FCS_RND.1: 6
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC: 5
    • FDP_ACC.1: 2
    • FDP_ACF: 4
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_IFC: 6
    • FDP_IFC.1: 1
    • FDP_IFC.2: 2
    • FDP_IFF: 4
    • FDP_IFF.1: 6
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.2: 7
    • FDP_ITC: 4
    • FDP_ITC.1: 3
    • FDP_ITT: 3
    • FDP_ITT.1: 1
    • FDP_ROL: 2
    • FDP_ROL.1: 2
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1: 6
    • FIA_UAU: 2
    • FIA_UAU.4: 1
  • FMT:
    • FMT_MSA: 26
    • FMT_MSA.1: 6
    • FMT_MSA.2: 2
    • FMT_MSA.3: 10
    • FMT_SMF: 10
    • FMT_SMF.1: 5
    • FMT_SMR: 8
    • FMT_SMR.1: 8
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS: 4
    • FPT_FLS.1: 1
    • FPT_ITT: 2
    • FPT_ITT.1: 1
    • FPT_PHP: 2
    • FPT_PHP.3: 1
    • FPT_RCV: 2
    • FPT_RCV.3: 4
    • FPT_SEP: 2
    • FPT_SEP.1: 2
    • FPT_TDC: 2
    • FPT_TDC.1: 2
    • FPT_TST: 4
    • FPT_TST.1: 4
    • FPT_TST.2: 6
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT: 2
    • FRU_FLT.2: 1
    • FRU_RSA: 2
    • FRU_RSA.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 8
    • D.DOC: 19
    • D.FUNC: 11
    • D.PROT: 6
  • O:
    • O.AUDIT: 6
    • O.CONF: 14
    • O.DOC: 14
    • O.FUNC: 6
    • O.FUNC_: 1
    • O.INTERFACE: 7
    • O.PROT: 7
    • O.SOFTWARE: 6
    • O.STORAGE: 7
    • O.USER: 13
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.CARD-MANAGEMENT: 1
    • A.NATIVE: 1
  • D:
    • D.APP-CODE: 2
    • D.APP-INST: 2
    • D.COMMAND: 2
    • D.CVM: 2
    • D.GP-REGISTRY: 2
    • D.ISD-: 1
    • D.ISD-PERSO: 2
    • D.ISD-SESSION-KEYS: 2
    • D.JCS_KEYS: 1
  • O:
    • O.ABUSE-FUNC: 2
    • O.CVM-BLOCK: 2
    • O.DELETION: 2
    • O.ERROR-COUNTERS: 2
    • O.GLOBAL-CVM: 2
    • O.IC-SUPPORT: 1
    • O.IDENTIFICATION: 3
    • O.INFO-CONFIDENTIALITY: 3
    • O.INFO-INTEGRITY: 4
    • O.INFO-ORIGIN: 3
    • O.INSTALL: 4
    • O.KEY-MNGT: 1
    • O.LIFE-CYCLE: 3
    • O.LOAD: 4
    • O.LOCK: 2
    • O.NO-KEY-REUSE: 2
    • O.OS-SUPPORT: 1
    • O.PROT-: 1
    • O.PROT-INF-LEAK: 4
    • O.PROT-MALFUNCTION: 3
    • O.PROT-PHYS-TAMPER: 4
    • O.RECOVERY: 3
    • O.REQUEST: 2
    • O.RND: 3
    • O.VERIFICATION: 3
  • OE:
    • OE.CARD-MANAGEMENT: 1
    • OE.IC: 1
    • OE.KEY-LENGTH: 2
    • OE.RECOVERY: 1
    • OE.SCP: 2
    • OE.SECRETS: 2
    • OE.SUPPORT: 1
  • OSP:
    • OSP: 2
    • OSP.FILE-ORIGIN: 2
    • OSP.KEY-LENGTH: 2
    • OSP.NO-RMI-APPLETS: 2
    • OSP.PERSONALIZATION: 2
    • OSP.PROCESS-TOE: 3
    • OSP.SECRETS: 2
  • T:
    • T.ABUSE-FUNC: 1
    • T.BRUTE-FORCE: 2
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-DATA: 1
    • T.CRYPTO: 4
    • T.DELETION: 3
    • T.FORCED-RESET: 2
    • T.IMPERSONATE: 2
    • T.INF-LEAK: 2
    • T.INSTALL: 4
    • T.INTEG-: 1
    • T.INTEG-JCS-DATA: 1
    • T.INVALID-INPUT: 2
    • T.INVALID-ORDER: 2
    • T.LIFE-CYCLE: 3
    • T.MALFUNCTION: 2
    • T.PHYS-TAMPER: 2
    • T.REPLAY: 2
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
  • DES:
    • DES:
      • DES: 29
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
  • FF:
    • DH:
      • DH: 2
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA-CRT: 1
    • RSA2048: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 12
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • ECB:
    • ECB: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 2
    • Physical tampering: 1
    • malfunction: 7
    • physical tampering: 3
  • SCA:
    • DPA: 3
    • Leak-Inherent: 1
    • SPA: 2
    • physical probing: 4
  • other:
    • reverse engineering: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 3
  • BSI:
    • AIS34: 2
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS 46-2: 1
    • FIPS PUB 46-3: 6
  • ISO:
    • ISO/IEC 15408:2005: 3
    • ISO/IEC 15946-1: 1
    • ISO/IEC 15946-3: 1
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 1
  • SCP:
    • SCP01: 3
    • SCP02: 6
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 10
  • JavaCard:
    • Java Card 2.2.1: 4
    • Java Card 2.2.2: 1
pdf_data/st_metadata
  • /Author: Canon Inc.
  • /CreationDate: D:20211101160948+09'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20211101160948+09'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Canon imageRUNNER ADVANCE DX C37900KG/C3700 Series 2600 model Security Target
  • pdf_file_size_bytes: 1637738
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
  • /CreationDate: D:20091125155704+01'00'
  • /Keywords:
  • /ModDate: D:20091125155704+01'00'
  • /Producer: GPL Ghostscript 8.54
  • pdf_file_size_bytes: 1470192
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 86
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different