Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon imageRUNNER ADVANCE DX 8700 Series 2600 model1.0
JISEC-CC-CRP-C0703-01-2021
TCOS Residence Permit Card Version 1.0 Release 1 / SLE78CLX1440P
BSI-DSZ-CC-0729-2011
name Canon imageRUNNER ADVANCE DX 8700 Series 2600 model1.0 TCOS Residence Permit Card Version 1.0 Release 1 / SLE78CLX1440P
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
status active archived
not_valid_after 04.02.2026 01.09.2019
not_valid_before 04.02.2021 25.08.2011
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0703_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0703_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0729a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0703_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0729b_pdf.pdf
manufacturer Canon Inc. T-Systems International GMBH
manufacturer_web https://www.canon.com/ https://www.t-systems.de/
security_level EAL2+, ALC_FLR.2 EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5
dgst af8d5e1eab28e24e 6f7d525fa2f29468
heuristics/cert_id JISEC-CC-CRP-C0703-01-2021 BSI-DSZ-CC-0729-2011
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0733-2011, BSI-DSZ-CC-0835-2013
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0728-2011
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0836-V2-2017, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0836-2013, BSI-DSZ-CC-0733-2011, BSI-DSZ-CC-0835-V2-2017
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0703
  • certification_date: 01.02.2021
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0703
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001707-att/c0703_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. User Authentication Function Function for identifying and authenticating the user. Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. HDD Data Encryption Function Function for encrypting all data stored in the HDD. LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. Self-Test Function Function for testing the integrity of the executable code at startup. Audit Log Function Function for generating audit logs on security events, allowing them to be viewed by the administrator and sending them to an external server. Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE DX 8700 Series 2600 model
    • product_type: Multifunction Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001707-att/c0703_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001707-att/c0703_est.pdf
    • toe_version: 1.0
    • vendor: Canon Inc.
  • expiration_date:
  • supplier: Canon Inc.
  • toe_japan_name: Canon imageRUNNER ADVANCE DX 8700 Series 2600 model1.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0703_it0739.html
  • toe_overseas_name: Canon imageRUNNER ADVANCE DX 8700 Series 2600 model1.0
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0728-2011
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010
heuristics/protection_profiles 43ce79b420f23a00 e953e9038a8c827e
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0069b_pdf.pdf
pdf_data/cert_filename c0703_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0703-01-2021: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20210709151423+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210716103432+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 142957
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename c0703_erpt.pdf 0729a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0729-2011
    • cert_item: TCOS Residence Permit Card Version 1.0 Release 1 / SLE78CLX1440P
    • cert_lab: BSI
    • developer: T-Systems International GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0703-01-2021: 1
  • DE:
    • BSI-DSZ-CC-0728-2011: 3
    • BSI-DSZ-CC-0729-2011: 20
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0069-2010: 1
    • BSI-CC-PP-0069-2010: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 4: 6
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 7
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 6
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 6
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 4
    • FCS_COP: 9
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 5
  • Infineon:
    • Infineon: 6
    • Infineon Technologies: 2
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • SRC:
    • SRC Security Research & Consulting: 3
  • TSystems:
    • T-Systems International: 9
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDEA: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • Diffie-Hellman: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 7
  • PACE:
    • PACE: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 22: 1
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • BSI:
    • AIS 20: 1
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 2
    • AIS 36: 4
    • AIS 38: 1
  • FIPS:
    • FIPS 180-2: 3
    • FIPS 197: 1
    • FIPS 46-3: 1
  • ICAO:
    • ICAO: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Permit Card Version 1.0 Release 1/ SLE78CLX1440P, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for Infineon Technologies Smart Card IC: 1
    • Release 1 / SLE78CLX1440P, 18.08.2011, Version 1.03 (confidential document) [12] TCOS Residence Permit Card 1.0, Release 1, Administrator's Guidance, Guidance Documentation: 1
    • Report BSI-DSZ-CC-0729-2011 Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [11] Configuration list for the TOE, Konfigurationsliste von TCOS Residence Permit Card Version 1: 1
pdf_data/report_metadata
  • /CreationDate: D:20220113171602+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20220114043844+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 374752
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20110928151422+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, eAT, elektronischer Aufenthaltstitel, RP_Card, RP Card, electronic Residence Permit Card, ID_Card, ID Card"
  • /ModDate: D:20110928151539+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: TCOS Residence Permit Card Version 1.0 Release 1 / SLE78CLX1440P
  • /Title: Certification Report BSI-DSZ-CC-0729-2011
  • pdf_file_size_bytes: 961910
  • pdf_hyperlinks: https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename c0703_est.pdf 0729b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0728-2011: 1
    • BSI-DSZ-CC-729: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0061-2009: 1
    • BSI-CC-PP-0035-2007: 1
    • BSI-CC-PP-0059-: 1
    • BSI-CC-PP-0059-2009: 1
    • BSI-CC-PP-0068: 1
    • BSI-CC-PP-0068-2010: 2
    • BSI-PP-0026: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
    • BSI-PP-0069: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2: 8
    • EAL2 augmented: 7
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL4: 12
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 11
  • APE:
    • APE_ECD: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 2
    • ADV_FSP: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 3
    • ADV_TDS: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 6
    • ALC_DVS.2: 11
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 6
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 14
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 14
    • FCS_COP.1: 25
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 45
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 35
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UID.1: 23
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 22
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 23
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 19
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 15
    • FTA_SSL.3.1: 2
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_SAS: 8
    • FAU_SAS.1: 15
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 94
    • FCS_CKM.1: 20
    • FCS_CKM.2: 8
    • FCS_CKM.4: 49
    • FCS_CKM.4.1: 1
    • FCS_COP: 104
    • FCS_COP.1: 14
    • FCS_RND: 7
    • FCS_RND.1: 11
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 52
    • FDP_ACC.1: 18
    • FDP_ACF: 46
    • FDP_ACF.1: 31
    • FDP_AFC: 1
    • FDP_IFC.1: 8
    • FDP_ITC: 8
    • FDP_ITC.1: 10
    • FDP_ITC.2: 19
    • FDP_ITT.1: 1
    • FDP_RIP: 5
    • FDP_RIP.1: 20
    • FDP_RIP.1.1: 1
    • FDP_SDI: 21
    • FDP_SDI.1: 3
    • FDP_SDI.2: 5
    • FDP_UCT: 1
    • FDP_UIT: 1
  • FIA:
    • FIA_AFL: 46
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_API: 33
    • FIA_API.1: 6
    • FIA_API.1.1: 4
    • FIA_APO: 14
    • FIA_APO.1: 4
    • FIA_APO.1.1: 1
    • FIA_UAU: 95
    • FIA_UAU.1: 17
    • FIA_UAU.4: 11
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 19
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UIA: 2
    • FIA_UID: 46
    • FIA_UID.1: 16
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_LIM: 9
    • FMT_LIM.1: 24
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 22
    • FMT_LIM.2.1: 2
    • FMT_MDT.3: 1
    • FMT_MOF: 8
    • FMT_MOF.1: 1
    • FMT_MSA: 61
    • FMT_MSA.1: 10
    • FMT_MSA.2: 3
    • FMT_MSA.3: 11
    • FMT_MSA.4: 1
    • FMT_MTD: 150
    • FMT_MTD.1: 12
    • FMT_MTD.3: 14
    • FMT_MTD.3.1: 1
    • FMT_SMF: 19
    • FMT_SMF.1: 63
    • FMT_SMF.1.1: 2
    • FMT_SMR: 5
    • FMT_SMR.1: 50
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS: 4
    • FPT_FLS.1: 17
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP: 11
    • FPT_PHP.1: 2
    • FPT_PHP.3: 17
    • FPT_PHP.3.1: 1
    • FPT_TST: 5
    • FPT_TST.1: 15
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 31
    • FTP_ITC.1: 2
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 8
    • D.DOC: 19
    • D.FUNC: 11
    • D.PROT: 6
  • O:
    • O.AUDIT: 6
    • O.CONF: 14
    • O.DOC: 14
    • O.FUNC: 6
    • O.FUNC_: 1
    • O.INTERFACE: 7
    • O.PROT: 7
    • O.SOFTWARE: 6
    • O.STORAGE: 7
    • O.USER: 13
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.CGA: 3
    • A.SCA: 3
  • O:
    • O.MEM_ACCESS: 1
    • O.RND: 3
  • OE:
    • OE.CGA_SSCD: 2
    • OE.HID_VAD: 4
  • T:
    • T.MEM_ACCESS: 1
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
    • Microsoft Corporation: 1
  • Infineon:
    • Infineon Technologies: 1
    • Infineon Technologies AG: 1
pdf_data/st_keywords/eval_facility
  • TSystems:
    • T-Systems International: 156
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
  • AES_competition:
    • AES:
      • AES: 22
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 2
      • TDES: 1
      • Triple-DES: 9
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 6
      • KMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
  • FF:
    • DH:
      • DH: 2
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • DH: 4
      • Diffie-Hellman: 12
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-2: 2
      • SHA-224: 3
      • SHA-256: 4
      • SHA-384: 1
      • SHA-512: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 121
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 2
    • P-256: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 1
    • Malfunction: 10
    • Physical Tampering: 2
    • Physical tampering: 1
    • fault injection: 2
    • malfunction: 6
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • Leak-Inherent: 6
    • Physical Probing: 2
    • physical probing: 3
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG14: 1
    • EF.SOD: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 3
  • BSI:
    • AIS 31: 1
    • AIS 36: 1
    • AIS31: 3
    • AIS36: 4
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 180-2: 1
    • FIPS PUB 46-3: 1
    • FIPS180: 1
    • FIPS197: 2
    • FIPS46: 2
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#3: 4
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
    • RFC3369: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf: 1
    • For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf. [EACTR, B.7]). 8 For the ePassport application, the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Canon Inc.
  • /CreationDate: D:20211122092913+09'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20211122092913+09'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Canon imageRUNNER ADVANCE DX 8700 Series 2600 model Security Target
  • pdf_file_size_bytes: 1629673
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
  • /Author: T-Systems International GmbH
  • /CreationDate: D:20110816010001
  • /Creator: T-Systems AFPL Ghostscript
  • /Keywords: TCOS Identity Card, eAT, eRP
  • /ModDate: D:20110816111444+02'00'
  • /Producer: GPL Ghostscript 8.64
  • /Subject: TCOS RP Card Version 1.0 Release 1
  • /Title: Security Target TCOS Residence Permit Card Version 1.0 Release 1 SLE78CLX480P
  • pdf_file_size_bytes: 985093
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 148
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different