name |
Canon imageRUNNER ADVANCE DX 8700 Series 2600 model1.0 |
TCOS FlexCert Version 2.0 Release 2/SLC52 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
active |
active |
not_valid_after |
04.02.2026 |
24.06.2026 |
not_valid_before |
04.02.2021 |
24.06.2021 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0703_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0904V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0703_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0904V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0703_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0904V2b_pdf.pdf |
manufacturer |
Canon Inc. |
Deutsche Telekom Security GmbH |
manufacturer_web |
https://www.canon.com/ |
https://www.telekom.de/security |
security_level |
EAL2+, ALC_FLR.2 |
ALC_DVS.2, EAL4+, ATE_DPT.2, AVA_VAN.5 |
dgst |
af8d5e1eab28e24e |
8bed4c0262f0c75c |
heuristics/cert_id |
JISEC-CC-CRP-C0703-01-2021 |
BSI-DSZ-CC-0904-V2-2021 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
AGD_PRE.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, ATE_DPT.2, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ADV_FSP.4, ALC_LCD.1, ALC_DVS.2, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ADV_FUN.1, ALC_CMC.4, ADV_IMP.1 |
heuristics/extracted_versions |
1.0 |
2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1079-V2-2020, BSI-DSZ-CC-0904-2015 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-1079-V2-2020, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0904-2015, BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0703
- certification_date: 01.02.2021
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0703
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001707-att/c0703_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. User Authentication Function Function for identifying and authenticating the user. Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. HDD Data Encryption Function Function for encrypting all data stored in the HDD. LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. Self-Test Function Function for testing the integrity of the executable code at startup. Audit Log Function Function for generating audit logs on security events, allowing them to be viewed by the administrator and sending them to an external server. Management Function Function for restricting device settings that influence security to be made only by the administrator.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: Canon imageRUNNER ADVANCE DX 8700 Series 2600 model
- product_type: Multifunction Product
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001707-att/c0703_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001707-att/c0703_est.pdf
- toe_version: 1.0
- vendor: Canon Inc.
- expiration_date:
- supplier: Canon Inc.
- toe_japan_name: Canon imageRUNNER ADVANCE DX 8700 Series 2600 model1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0703_it0739.html
- toe_overseas_name: Canon imageRUNNER ADVANCE DX 8700 Series 2600 model1.0
|
- category: eHealth
- cert_id: BSI-DSZ-CC-0904-V2-2021
- certification_date: 24.06.2021
- enhanced:
- applicant: Deutsche Telekom Security GmbH Untere Industriestraße 20 57250 Netphen
- assurance_level: EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5
- certification_date: 24.06.2021
- description: The Target of Evaluation (TOE) is the product TCOS FlexCert 2.0 Release 1/SLE78CLX1440P developed by T-Systems International GmbH. The TOE is a smart card product according to the G2 Card Operating System specification from gematik. The TOE is intended to be used as a card operating system platform for different card types and applications of the card generation G2 in the framework of the German health care system. The TOE implements from the PP-0082-V2 the base part and the packages Crypto Box, Logical Channel and Contactless.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0904-V2-2021 (Ausstellungsdatum / Certification Date 24.06.2021, gültig bis / valid until 23.06.2026) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificate', 'description': 'Software'}), frozendict({'id': 'BSI-DSZ-CC-0904-2015-MA-02 (13.05.2020)', 'description': 'The maintenance procedure addresses the change of the production site.'}), frozendict({'id': 'BSI', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI', 'description': 'Security Target'})]
- evaluation_facility: SRC Security Research & Consulting GmbH
- expiration_date: 23.06.2026
- product: TCOS FlexCert Version 2.0 Release 2/SLC52
- protection_profile: Card Operating System Generation 2 (PP COS G2), Version 2.1, 10 July 2019, BSI-CC-PP-0082-V4-2019
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0904V2c_pdf.pdf?__blob=publicationFile&v=3
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0904V2b_pdf.pdf?__blob=publicationFile&v=2
- product: TCOS FlexCert Version 2.0 Release 2/SLC52
- subcategory: Smartcards
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_SmartCards/0904.html
- vendor: Deutsche Telekom Security GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1067-V4-2023, BSI-DSZ-CC-1068-V3-2022, BSI-DSZ-CC-1067-V3-2022, BSI-DSZ-CC-1067-V5-2024, BSI-DSZ-CC-1068-V4-2023, BSI-DSZ-CC-1068-V5-2024 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1079-V2-2020 |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1067-V4-2023, BSI-DSZ-CC-1068-V3-2022, BSI-DSZ-CC-1067-V3-2022, BSI-DSZ-CC-1067-V5-2024, BSI-DSZ-CC-1068-V4-2023, BSI-DSZ-CC-1068-V5-2024 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1079-V2-2020 |
heuristics/protection_profiles |
43ce79b420f23a00 |
af9c3335f79dec6f |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082V4b_pdf.pdf |
pdf_data/cert_filename |
c0703_eimg.pdf |
0904V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0703-01-2021: 1
|
- DE:
- BSI-DSZ-CC-0904-V2-2021: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210709151423+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210716103432+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 142957
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210701140233+02'00'
- /Creator: Writer
- /ModDate: D:20210701140348+02'00'
- /Producer: LibreOffice 6.3
- /Subject: TCOS FlexCert Version 2.0 Release 2/SLC52 from Deutsche Telekom Security GmbH
- /Title: Certification Report BSI-DSZ-CC-0904-V2-2021
- pdf_file_size_bytes: 241525
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0703_erpt.pdf |
0904V2a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0904-V2-2021
- cert_item: TCOS FlexCert Version 2.0 Release 2/SLC52
- cert_lab: BSI
- developer: Deutsche Telekom Security GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 2.1, 10 July 2019, BSI-CC-PP-0082-V4- 2019
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0703-01-2021: 1
|
- DE:
- BSI-DSZ-CC-0904-2015: 3
- BSI-DSZ-CC-0904-2015-MA-01: 2
- BSI-DSZ-CC-0904-V2-2021: 26
- BSI-DSZ-CC-1079-: 1
- BSI-DSZ-CC-1079-V2-: 2
- BSI-DSZ-CC-1079-V2-2020: 4
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0082-V4-: 1
- BSI-CC-PP-0082-V4-2019: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 3
- EAL6 augmented: 2
- EAL6+: 2
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 4
- FCS_COP: 28
- FCS_RNG: 6
- FCS_RNG.1: 1
- FIA:
- FPT:
- FTP:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 9
- Infineon Technologies AG: 6
|
pdf_data/report_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 20
- SRC:
- SRC Security Research & Consulting: 3
- TSystems:
- T-Systems International: 2
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 3
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-03116-1: 1
- BSI TR-03143: 4
- BSI TR-03144: 9
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 4
- AIS 23: 1
- AIS 25: 4
- AIS 26: 4
- AIS 31: 6
- AIS 32: 1
- AIS 34: 4
- AIS 35: 1
- AIS 36: 5
- AIS 37: 2
- AIS 38: 1
- AIS 46: 2
- AIS20: 2
- AIS31: 2
- FIPS:
- FIPS 180-4: 7
- FIPS 197: 13
- FIPS PUB 180-4: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18031:2005: 1
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 2/SLC52, Version 0.92, 26 May 2021, Deutsche Telekom Security GmbH (confidential document) [10] TCOS FlexCert Version 2.0 Release 2, Administrator’s Guidance, Guidance Documentation of TCOS: 1
- Certification Report DSZ-CC-1079-V2-2020, Version 2, 15 May 2020, TÜV Informationstechnik GmbH (confidential document) [18] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
- G12, Revision 1.3, 3 April 2020, Infineon Technologies AG, BSI-DSZ-CC-1079-V2- 2020 (confidential document) Security Target Lite of the underlying hardware platform, Public Security Target Common Criteria: 1
- RNG] Zufallszahlengenerierung in TCOS, Version 0.7, 3 November 2020, T-Systems International GmbH (confidential document) [AIS 20] see chapter 14, [4] of this report [AIS 31] see chapter 14, [4] of this report Note: End: 1
- Version 2.0 Release 2/SLC52, Version 1.1, 2 June 2021, SRC Security Research & Consulting GmbH (confidential document) [9] Configuration List BSI-DSZ-CC-0904-V2-2021, Konfigurationsliste von TCOS FlexCert Version 2.0: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20220113171602+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20220114043844+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 374752
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210701134203+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, G2 COS, eHealth"
- /ModDate: D:20210701140047+02'00'
- /Producer: LibreOffice 6.3
- /Subject: TCOS FlexCert Version 2.0 Release 2/SLC52 from Deutsche Telekom Security GmbH
- /Title: Certification Report BSI-DSZ-CC-0904-V2-2021
- pdf_file_size_bytes: 944995
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
pdf_data/st_filename |
c0703_est.pdf |
0904V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1079-V2-2020: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP- 0082-V4: 1
- BSI-CC-PP-0082-V4-2019: 2
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 21
- BSI-CC-PP0082: 4
- BSI-CC-PP0084: 2
- BSI-PP-0082: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL2: 8
- EAL2 augmented: 7
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
- EAL 5 augmented: 1
- EAL 6: 1
- EAL4: 10
- EAL4 augmented: 2
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 11
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 4
- ADV_FSP: 1
- ADV_FSP.4: 2
- ADV_FUN.1: 1
- ADV_IMP.1: 2
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 5
- ATE_FUN: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 26
- FCS_CKM.1.1: 2
- FCS_CKM.2: 14
- FCS_CKM.2.1: 1
- FCS_CKM.4: 14
- FCS_COP.1: 25
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 45
- FDP_ACC.1.1: 3
- FDP_ACF.1: 35
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 7
- FIA_UID.1: 23
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 22
- FMT_MSA.1.1: 2
- FMT_MSA.3: 23
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 19
- FMT_MTD.1.1: 2
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR.1: 34
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 15
- FTA_SSL.3.1: 2
- FTP:
- FTP_ITC.1: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_SAS: 10
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 42
- FCS_CKM.1: 23
- FCS_CKM.2: 4
- FCS_CKM.4: 28
- FCS_CKM.4.1: 2
- FCS_COP: 141
- FCS_COP.1: 20
- FCS_RNG: 36
- FCS_RNG.1: 28
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 64
- FDP_ACC.1: 39
- FDP_ACF: 77
- FDP_ACF.1: 38
- FDP_IFC: 5
- FDP_IFC.1: 10
- FDP_IFF.1: 1
- FDP_ITC.1: 19
- FDP_ITC.2: 17
- FDP_ITT: 5
- FDP_ITT.1: 3
- FDP_RIP: 6
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FDP_SDC: 10
- FDP_SDC.1: 5
- FDP_SDC.1.1: 1
- FDP_SDI: 9
- FDP_SDI.1: 2
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 6
- FDP_UCT.1: 1
- FDP_UIT: 6
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 19
- FIA_AFL.1: 4
- FIA_API: 11
- FIA_API.1: 17
- FIA_API.1.1: 2
- FIA_ATD: 5
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU: 37
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 12
- FIA_UAU.4.1: 1
- FIA_UAU.5: 15
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID: 7
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 28
- FIA_USB.1: 29
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 2
- FMT:
- FMT_LIM: 17
- FMT_LIM.1: 17
- FMT_LIM.1.1: 1
- FMT_LIM.2: 16
- FMT_LIM.2.1: 1
- FMT_MSA: 52
- FMT_MSA.1: 7
- FMT_MSA.3: 25
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 27
- FMT_MTD.1: 4
- FMT_SMF: 1
- FMT_SMF.1: 34
- FMT_SMF.1.1: 1
- FMT_SMR: 6
- FMT_SMR.1: 22
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 10
- FPT_EMS.1: 16
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 7
- FPT_FLS.1: 16
- FPT_FLS.1.1: 2
- FPT_ITE: 14
- FPT_ITE.1: 12
- FPT_ITE.1.1: 2
- FPT_ITE.1.2: 2
- FPT_ITE.2: 12
- FPT_ITE.2.1: 6
- FPT_ITE.2.2: 2
- FPT_ITT: 5
- FPT_ITT.1: 2
- FPT_PHP: 5
- FPT_PHP.3: 7
- FPT_TDC: 1
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 3
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 12
- FTP_ITC.1: 6
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 8
- D.DOC: 19
- D.FUNC: 11
- D.PROT: 6
- O:
- O.AUDIT: 6
- O.CONF: 14
- O.DOC: 14
- O.FUNC: 6
- O.FUNC_: 1
- O.INTERFACE: 7
- O.PROT: 7
- O.SOFTWARE: 6
- O.STORAGE: 7
- O.USER: 13
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 3
- OE.AUDIT_STORAGE: 3
- OE.INTERFACE: 3
- OE.PHYISCAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- O:
- O.AES: 1
- O.PACE_CHIP: 9
- O.RND: 3
- T:
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 2
- Microsoft Corporation: 1
|
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 2
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 137
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 49
- AES-192: 1
- AES-256: 1
- AES128: 2
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 12
- SHA-384: 7
- SHA-512: 5
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 3
- brainpoolP384r1: 3
- brainpoolP512r1: 2
- NIST:
- NIST P-256: 1
- P-256: 3
- P-384: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 7
- malfunction: 6
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 8
- Physical Probing: 2
- Physical probing: 1
- SPA: 1
- physical probing: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 31: 1
- AIS 36: 1
- AIS31: 5
- AIS36: 4
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 4
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS180: 2
- FIPS186: 5
- FIPS197: 8
- ICAO:
- ISO:
- ISO/IEC 18033-3: 3
- ISO/IEC 9797-1: 2
- NIST:
- NIST SP 800-38B: 1
- SP 800-38A: 3
- PKCS:
- RFC:
- RFC 3447: 1
- RFC 5639: 1
- RFC3447: 7
- RFC5639: 8
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Canon Inc.
- /CreationDate: D:20211122092913+09'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20211122092913+09'00'
- /Producer: Microsoft® Word 2016
- /Title: Canon imageRUNNER ADVANCE DX 8700 Series 2600 model Security Target
- pdf_file_size_bytes: 1629673
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 63
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |