Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon imageRUNNER ADVANCE DX 8700 Series 2600 model1.0
JISEC-CC-CRP-C0703-01-2021
TNOR Guard v. 1.1.3
SERTIT-120
name Canon imageRUNNER ADVANCE DX 8700 Series 2600 model1.0 TNOR Guard v. 1.1.3
category Multi-Function Devices Boundary Protection Devices and Systems
scheme JP NO
not_valid_after 04.02.2026 12.05.2027
not_valid_before 04.02.2021 12.05.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0703_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-120%20C%20v1.0.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0703_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-120%20CR%20v1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0703_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TNOR%20Guards%20739_20726_aaaa_sc_ed10-4-public.pdf
manufacturer Canon Inc. Thales Norway AS
manufacturer_web https://www.canon.com/ https://www.thales.no/
security_level EAL2+, ALC_FLR.2 EAL4+, AVA_VAN.4, ALC_FLR.3
dgst af8d5e1eab28e24e 03972af324dcd07f
heuristics/cert_id JISEC-CC-CRP-C0703-01-2021 SERTIT-120
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1
heuristics/extracted_versions 1.0 1.1.3
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0703
  • certification_date: 01.02.2021
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0703
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001707-att/c0703_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. User Authentication Function Function for identifying and authenticating the user. Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. HDD Data Encryption Function Function for encrypting all data stored in the HDD. LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. Self-Test Function Function for testing the integrity of the executable code at startup. Audit Log Function Function for generating audit logs on security events, allowing them to be viewed by the administrator and sending them to an external server. Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE DX 8700 Series 2600 model
    • product_type: Multifunction Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001707-att/c0703_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001707-att/c0703_est.pdf
    • toe_version: 1.0
    • vendor: Canon Inc.
  • expiration_date:
  • supplier: Canon Inc.
  • toe_japan_name: Canon imageRUNNER ADVANCE DX 8700 Series 2600 model1.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0703_it0739.html
  • toe_overseas_name: Canon imageRUNNER ADVANCE DX 8700 Series 2600 model1.0
  • category: Boundary Protection Devices and Systems
  • certification_date: 12.05.2022
  • developer: Thales Norway AS
  • enhanced:
    • category: Boundary Protection Devices and Systems
    • cert_id: SERTIT-120
    • certification_date: 12.05.2022
    • description: TNOR Guard is a technology that provides controlled information flow between networks with different system and application security policies. The TNOR Guard (TOE) is part of the XOmail product family for messaging and information exchange in mission-critical military and civilian networks. The Guard implements high-assurance information flow control for the trusted exchange of information across security domain boundaries. This product is also described in this report as the Target of Evaluation (TOE). The main security feature of the TOE is to mediate a one-way or bidirectional flow between two security domains. The TOE inspects every information object that is requested sent between the security domains, and makes an automated release decision according to configured policy. The TOE covers the following four Guard products: STANAG 4406 Ed 2 Message Guard For connectivity towards the NATO standard Military Message Handling System (MMHS), SMTP Message Guard (E-mail) For connectivity towards standard e-mail systems such as Microsoft Exchange. Supports RFC 6477 for Military Message Handling attributes within the SMTP domain, Chat (XMPP) Guard Instant Messaging service between security domains. XML/SOAP Guard Exchange of XML/SOAP data between security domains.
    • developer: Thales Norway AS
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/1311036-1656573547/SERTIT/Sertifikater/2022/120/SERTIT-120%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/1310630-1654589563/SERTIT/Sertifikater/2022/120/TNOR%20Guards%20739_20726_aaaa_sc_ed10-4-public.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/1310627-1654589561/SERTIT/Sertifikater/2022/120/SERTIT-120%20CR%20v1.0.pdf'})]})
    • evaluation_facility: System Sikkerhet AS
    • expiration_date: 12.05.2027
    • level: EAL 4, ALC_FLR.3, AVA_VAN.4
    • mutual_recognition: CCRA, SOG-IS
    • product: TNOR Guard version 1.1.3
    • sponsor: Forsvarsmateriell IKT-kapasiteter
  • product: TNOR Guard
  • url: https://sertit.no/certified-products/tnor-guard-article2842-1919.html
heuristics/protection_profiles 43ce79b420f23a00 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf {}
pdf_data/cert_filename c0703_eimg.pdf SERTIT-120 C v1.0.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0703-01-2021: 1
  • NO:
    • SERTIT-120: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/vendor
  • Thales:
    • Thales: 1
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
pdf_data/cert_metadata
  • /CreationDate: D:20210709151423+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210716103432+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 142957
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /Author: helgerudt
  • /CreationDate: D:20220629133919+02'00'
  • /Creator: Hewlett-Packard MFP
  • /ModDate: D:20220629142649+02'00'
  • /Producer: PixEdit AS, PixEdit Version 8.7.4.6
  • /Subject: 201676 201334 VEDLEGG01
  • pdf_file_size_bytes: 1289183
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0703_erpt.pdf SERTIT-120 CR v1.0.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0703-01-2021: 1
  • NO:
    • SERTIT-120: 22
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 2: 1
    • EAL 4: 27
    • EAL 4 augmented: 24
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 26
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 27
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 5
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 12
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • PKE:
    • PKE: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 7
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-110: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • CC:
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 8
    • ISO/IEC 17025: 2
    • ISO/IEC 18045: 2
  • RFC:
    • RFC 6477: 1
pdf_data/report_metadata
  • /CreationDate: D:20220113171602+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20220114043844+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 374752
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /CreationDate: D:20220518100037+02'00'
  • /ModDate: D:20220518100037+02'00'
  • pdf_file_size_bytes: 529073
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename c0703_est.pdf TNOR Guards 739_20726_aaaa_sc_ed10-4-public.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2: 8
    • EAL2 augmented: 7
  • EAL:
    • EAL4: 8
    • EAL4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 11
  • APE:
    • APE_ECD: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ALC:
    • ALC_FLR.3: 6
  • ASE:
    • ASE_CCL: 2
    • ASE_ECD: 2
    • ASE_INT: 2
    • ASE_OBJ: 2
    • ASE_REQ: 2
    • ASE_SPD: 2
    • ASE_TSS: 2
  • AVA:
    • AVA_VAN.4: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 14
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 14
    • FCS_COP.1: 25
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 45
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 35
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UID.1: 23
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 22
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 23
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 19
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 15
    • FTA_SSL.3.1: 2
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP: 2
    • FAU_ARP.1: 9
    • FAU_GEN: 2
    • FAU_GEN.1: 13
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAA: 1
    • FAU_SAA.1: 10
    • FAU_SAR: 1
    • FAU_SAR.1: 11
    • FAU_SAR.2: 8
    • FAU_STG: 1
    • FAU_STG.1: 12
    • FAU_STG.3: 9
    • FAU_STG.4: 9
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.1: 10
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 1
    • FCS_COP: 1
    • FCS_COP.1: 10
    • FCS_NRO.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 9
    • FDP_ACC.2: 10
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ETC: 1
    • FDP_ETC.2: 13
    • FDP_IFC: 19
    • FDP_IFC.1: 14
    • FDP_IFC.2: 11
    • FDP_IFF: 19
    • FDP_IFF.1: 16
    • FDP_IFF.2: 16
    • FDP_IFF.2.2: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 15
    • FDP_RIP: 1
    • FDP_RIP.1: 1
    • FDP_RIP.2: 10
    • FDP_UIT: 1
    • FDP_UIT.1: 9
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 9
    • FIA_UID: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 13
  • FMT:
    • FMT_MOF: 19
    • FMT_MOF.1: 5
    • FMT_MSA: 1
    • FMT_MSA.1: 10
    • FMT_MSA.3: 15
    • FMT_MTD: 2
    • FMT_MTD.1: 12
    • FMT_MTD.3: 8
    • FMT_MTS: 1
    • FMT_REV: 1
    • FMT_REV.1: 9
    • FMT_SMF: 1
    • FMT_SMF.1: 15
    • FMT_SMR: 1
    • FMT_SMR.1: 9
    • FMT_SMR.2: 16
    • FMT_TST.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 11
    • FPT_RCV: 1
    • FPT_RCV.4: 10
    • FPT_STM.1: 2
    • FPT_TDC: 1
    • FPT_TDC.1: 11
    • FPT_TST: 1
    • FPT_TST.1: 12
  • FRU:
    • FRU_PRS: 1
    • FRU_PRS.1: 10
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP: 1
    • FTP_TRP.1: 15
    • FTP_TRP.2: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 8
    • D.DOC: 19
    • D.FUNC: 11
    • D.PROT: 6
  • O:
    • O.AUDIT: 6
    • O.CONF: 14
    • O.DOC: 14
    • O.FUNC: 6
    • O.FUNC_: 1
    • O.INTERFACE: 7
    • O.PROT: 7
    • O.SOFTWARE: 6
    • O.STORAGE: 7
    • O.USER: 13
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A..Z: 1
    • A.APPROVED_CRYPTO: 3
    • A.APPROVED_PKI: 2
    • A.CORRECT_CONFIGURATION: 3
    • A.NETWORK_PROTECTED: 2
    • A.PHYSICAL_ACCESS_MANAGED: 3
    • A.TRUSTED_AND_TRAINED_ADMIN: 2
    • A.TRUSTED_LABELLER: 3
  • O:
    • O.ACCESS: 8
    • O.AUDIT: 13
    • O.CMD_ACL: 10
    • O.CONFIGURATION_CHANGE: 5
    • O.CONTROLLED_INFORMATION: 1
    • O.CONTROLLED_INFORMATION_FLOW: 5
    • O.CORRECT_TSF_OPERATION: 6
    • O.INTERNAL_LEAST_PRIVILEG: 1
    • O.INTERNAL_LEAST_PRIVILEGE: 9
    • O.LABEL_MAPPING: 8
    • O.MAC: 5
    • O.MGMT_MODE: 6
    • O.MINIMAL_PROXY: 10
    • O.OBJECT_INTEGRITY: 9
    • O.RESIDUAL_INFORMATION: 7
    • O.RESOURCE_SHARING: 7
    • O.SECURE_STATE: 8
    • O.SUBJECT_ISOLATION: 12
    • O.TRANSITION: 5
    • O.TSF_INTEGRITY: 9
    • O.VALID_LABEL: 6
  • OE:
    • OE.APPROVED_CRYPTO: 7
    • OE.APPROVED_PKI: 7
    • OE.BORDER_PROTECTION: 12
    • OE.CONFIGURATION: 8
    • OE.CONTENT_INSPECTION_S: 1
    • OE.CONTENT_INSPECTION_SE: 2
    • OE.CONTENT_INSPECTION_SERVICE: 6
    • OE.DIRECTORY_SERVICE: 6
    • OE.MINIMAL_POSTURE: 10
    • OE.NETWORK: 10
    • OE.PHYSICAL_ACCESS_MANA: 2
    • OE.PHYSICAL_ACCESS_MANAG: 1
    • OE.PHYSICAL_ACCESS_MANAGED: 6
    • OE.PLATFORM: 10
    • OE.TIME_SOURCE: 6
    • OE.TRUSTED_AND_TRAINED_: 1
    • OE.TRUSTED_AND_TRAINED_A: 1
    • OE.TRUSTED_AND_TRAINED_ADMIN: 8
    • OE.TRUSTED_AND_TRAINED_ADMINS: 1
    • OE.TRUSTED_LABELLER: 7
  • T:
    • T.ADMIN_MASQUERADE: 4
    • T.AUDIT_COMPROMISE: 2
    • T.COVERT_CHANNEL: 2
    • T.DOS: 4
    • T.INFORMATION_LEAK: 2
    • T.INSECURE_STATE: 4
    • T.MALWARE_INJECTION: 2
    • T.METADATA_LEAK: 4
    • T.NETWORK_ATTACK: 2
    • T.OBJECT_TAMPERING: 4
    • T.RECONNAISSANCE: 4
    • T.RESIDUAL_DATA: 2
    • T.TSF_COMPROMISE: 3
    • T.UNATTENDED_ADMIN_SESSION: 2
    • T.UNAUTHORIZED_ACCESS: 4
    • T.UNNOTICED_ATTACK: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
    • Microsoft Corporation: 1
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 80
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
  • FF:
    • DH:
      • DH: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 22
  • PKE:
    • PKE: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 3
  • FIPS:
    • FIPS PUB 180-4: 2
  • ISO:
    • ISO/IEC 15408: 6
  • PKCS:
    • PKCS #11: 2
    • PKCS#11: 4
    • PKCS11: 2
  • RFC:
    • RFC 5321: 1
    • RFC 5322: 1
    • RFC 6120: 1
    • RFC 6121: 1
    • RFC 6477: 1
    • RFC 7622: 2
    • RFC3507: 2
    • RFC5905: 1
    • RFC6120: 2
    • RFC6121: 1
  • X509:
    • X.509: 1
pdf_data/st_metadata
  • /Author: Canon Inc.
  • /CreationDate: D:20211122092913+09'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20211122092913+09'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Canon imageRUNNER ADVANCE DX 8700 Series 2600 model Security Target
  • pdf_file_size_bytes: 1629673
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
  • /Author: Radical
  • /CreationDate: D:20220510093219+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220510093219+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: System/Subsystem Specification
  • pdf_file_size_bytes: 3028038
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different