name |
Canon imageRUNNER ADVANCE 500/400 Series 2600.1 model 1.3
|
Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model 1.0
|
category |
Multi-Function Devices
|
Multi-Function Devices
|
not_valid_before |
2014-11-27
|
2016-02-25
|
not_valid_after |
2019-12-02
|
2021-02-25
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0448_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0497_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Canon Inc.
|
Canon Inc.
|
manufacturer_web |
https://www.canon.com/
|
https://www.canon.com/
|
security_level |
ALC_FLR.2, EAL3+ |
ALC_FLR.2, EAL3+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0448_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0497_erpt.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) |
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
ca15727f6886df523fc68bf330c0506a4ba3570a34422294729f1a511f575c0b
|
925a12caa5ee353c76e512590d287fa094ca63bc243f235e9c4d338bdb384498
|
state/report/txt_hash |
5cbb327b1ce348fb89bc15bfde5c761063ec0e2c7dc6998435ef0a49be3f191e
|
5d5eff0b90435bf3491db783a037a3b43ee2f8342a64de7c651c6da51886bcf0
|
state/st/convert_garbage |
False
|
True
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
98156f0a8bb5ad2d225219a1e74e81e99dbf5aeede4520ef0a59e2b02b904612
|
1aff760e1dcd525216a02d0aa9239142633283799215f91f6940392ede241ca8
|
state/st/txt_hash |
dac2d095597874254b47a9bfd3c13127d1528fa6cd508bcde4b2371f73806907
|
62064bb034e4ff94394169e376b97e528925a222f2e5f7036c26b61481496d03
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0448
|
JISEC-CC-CRP-C0497
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- cert_id:
C0448
- supplier:
Canon Inc.
- toe_overseas_name:
Canon imageRUNNER ADVANCE 500/400 Series 2600.1 model1.3
- expiration_date:
2019-12
- claim:
EAL3+ALC_FLR.2
PP
- revalidations: frozendict({'date': '2016-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0448_it4517_01.html'})
- certification_date:
2014-11
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0448_it4517.html
- toe_japan_name:
Canon imageRUNNER ADVANCE 500/400 Series 2600.1 model1.3
- enhanced:
- product:
Canon imageRUNNER ADVANCE 500/400 Series 2600.1 model
- toe_version:
1.3
- product_type:
Multifunction Product
- certification_date:
2014-11-27
- cc_version:
3.1 Release4
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1™-2009
- vendor:
Canon Inc.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
- report_link:
https://www.ipa.go.jp/en/security/c0448_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0448_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0448_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, and I-Fax capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
- cert_id:
C0497
- supplier:
Canon Inc.
- toe_overseas_name:
Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model1.0
- expiration_date:
2021-03
- claim:
EAL3+ALC_FLR.2
PP
- certification_date:
2016-02
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0497_it3444.html
- toe_japan_name:
Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model1.0
- enhanced:
- product:
Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model
- toe_version:
1.0
- product_type:
Multifunction Product
- certification_date:
2016-02-25
- cc_version:
3.1 Release4
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1™-2009
- vendor:
Canon Inc.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
- report_link:
https://www.ipa.go.jp/en/security/c0497_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0497_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0497_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, and I-Fax capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/cert_id |
C0448
|
C0497
|
heuristics/scheme_data/certification_date |
2014-11
|
2016-02
|
heuristics/scheme_data/claim |
EAL3+ALC_FLR.2
PP
|
EAL3+ALC_FLR.2
PP
|
heuristics/scheme_data/enhanced/assurance_level |
EAL3 Augmented with ALC_FLR.2
|
EAL3 Augmented with ALC_FLR.2
|
heuristics/scheme_data/enhanced/cc_version |
3.1 Release4
|
3.1 Release4
|
heuristics/scheme_data/enhanced/cert_link |
https://www.ipa.go.jp/en/security/c0448_eimg.pdf
|
https://www.ipa.go.jp/en/security/c0497_eimg.pdf
|
heuristics/scheme_data/enhanced/certification_date |
2014-11-27
|
2016-02-25
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, and I-Fax capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
PRODUCT DESCRIPTION
Description of TOE
The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, and I-Fax capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP.
TOE security functionality
The TOE embodies the following security functions.
-
User Authentication Function
Function for identifying and authenticating the user.
-
Function Use Restriction Function
Function for restricting the use of the MFP depending on the authority of the user.
-
Job Output Restriction Function
Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator.
-
Forward Received Jobs Function
Function for restricting the machine from forwarding received data directly to the LAN.
-
HDD Data Erase Function
Function for erasing unnecessary data from the hard disk by overwriting the data.
-
HDD Data Encryption Function
Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP.
-
LAN Data Protection Function
Function for protecting all IP packets that are communicated with an IT device.
-
Self-Test Function
Function for testing the integrity of the executable code at startup.
-
Audit Log Function
Function for generating audit logs on security events and allowing them to be viewed by the administrator.
-
Management Function
Function for restricting device settings that influence security to be made only by the administrator.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
|
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
|
heuristics/scheme_data/enhanced/product |
Canon imageRUNNER ADVANCE 500/400 Series 2600.1 model
|
Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model
|
heuristics/scheme_data/enhanced/product_type |
Multifunction Product
|
Multifunction Product
|
heuristics/scheme_data/enhanced/protection_profile |
IEEE Std 2600.1™-2009
|
IEEE Std 2600.1™-2009
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0448_erpt.pdf
|
https://www.ipa.go.jp/en/security/c0497_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0448_est.pdf
|
https://www.ipa.go.jp/en/security/c0497_est.pdf
|
heuristics/scheme_data/enhanced/toe_version |
1.3
|
1.0
|
heuristics/scheme_data/enhanced/vendor |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/expiration_date |
2019-12
|
2021-03
|
heuristics/scheme_data/supplier |
Canon Inc.
|
Canon Inc.
|
heuristics/scheme_data/toe_japan_name |
Canon imageRUNNER ADVANCE 500/400 Series 2600.1 model1.3
|
Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model1.0
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0448_it4517.html
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0497_it3444.html
|
heuristics/scheme_data/toe_overseas_name |
Canon imageRUNNER ADVANCE 500/400 Series 2600.1 model1.3
|
Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model1.0
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
c0448_erpt.pdf
|
c0497_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0448-01:
1
- Certification No. C0448:
1
|
- CRP-C0497-01:
1
- Certification No. C0497:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL3 |
4
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL3 augmented |
2
|
3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- FIPS:
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20160112164121+09'00'
|
D:20160713090714+09'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//ModDate |
D:20160112164155+09'00'
|
D:20160713155803+09'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata/pdf_file_size_bytes |
326777
|
326477
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
36
|
36
|
pdf_data/st_filename |
c0448_est.pdf
|
c0497_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A/A.ACCESS |
3
|
2
|
pdf_data/st_keywords/cc_claims/A/A.ADMIN |
6
|
4
|
pdf_data/st_keywords/cc_claims/A/A.USER |
3
|
3
|
pdf_data/st_keywords/cc_claims/D |
- D.DOC:
18
- D.FUNC:
11
- D.PROT:
6
- D.CONF:
8
|
- D.DOC:
16
- D.FUNC:
12
- D.PROT:
6
- D.CONF:
9
- D.DOC_: 1
|
pdf_data/st_keywords/cc_claims/D/D.CONF |
8
|
9
|
pdf_data/st_keywords/cc_claims/D/D.DOC |
18
|
16
|
pdf_data/st_keywords/cc_claims/D/D.FUNC |
11
|
12
|
pdf_data/st_keywords/cc_claims/D/D.PROT |
6
|
6
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT |
7
|
3
|
pdf_data/st_keywords/cc_claims/O/O.CONF |
16
|
8
|
pdf_data/st_keywords/cc_claims/O/O.DOC |
16
|
8
|
pdf_data/st_keywords/cc_claims/O/O.FUNC |
8
|
5
|
pdf_data/st_keywords/cc_claims/O/O.HDD |
8
|
5
|
pdf_data/st_keywords/cc_claims/O/O.INTERFACE |
8
|
4
|
pdf_data/st_keywords/cc_claims/O/O.PROT |
8
|
4
|
pdf_data/st_keywords/cc_claims/O/O.SOFTWARE |
7
|
5
|
pdf_data/st_keywords/cc_claims/O/O.USER |
14
|
10
|
pdf_data/st_keywords/cc_claims/OE |
- OE.AUDIT_STORAGE:
4
- OE.AUDIT_ACCESS:
4
- OE.INTERFACE:
4
- OE.PHYSICAL:
2
- OE.USER:
14
- OE.ADMIN:
8
- OE.AUDIT:
4
- OE.PHYISCAL: 2
|
- OE.AUDIT_STORAGE:
3
- OE.AUDIT_ACCESS:
3
- OE.INTERFACE:
2
- OE.PHYSICAL:
2
- OE.USER:
10
- OE.ADMIN:
5
- OE.AUDIT:
2
|
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN |
8
|
5
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT |
4
|
2
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_ACCESS |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.AUDIT_STORAGE |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.INTERFACE |
4
|
2
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL |
2
|
2
|
pdf_data/st_keywords/cc_claims/OE/OE.USER |
14
|
10
|
pdf_data/st_keywords/cc_claims/T/T.CONF |
6
|
4
|
pdf_data/st_keywords/cc_claims/T/T.DOC |
6
|
4
|
pdf_data/st_keywords/cc_claims/T/T.FUNC |
3
|
2
|
pdf_data/st_keywords/cc_claims/T/T.PROT |
3
|
2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
1
|
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.2:
12
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1: 1
- ALC_LCD.1:
1
|
- ALC_FLR.2:
12
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.3 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.3 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 |
12
|
12
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/APE/APE_ECD |
2
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3:
9
- EAL 3:
2
- EAL3 augmented:
8
- EAL 3 augmented:
1
|
- EAL:
- EAL3:
9
- EAL 3:
2
- EAL3 augmented:
8
- EAL 3 augmented:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
13
- FAU_GEN.2:
6
- FAU_SAR.1:
8
- FAU_SAR.2:
6
- FAU_STG.1:
8
- FAU_STG.4:
6
- FAU_GEN:
2
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
|
- FAU_GEN:
7
- FAU_GEN.2:
6
- FAU_SAR: 1
- FAU_SAR.1:
6
- FAU_SAR.2:
6
- FAU_STG.1:
6
- FAU_STG.4:
6
- FAU_GEN.1:
6
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_GENA: 1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
2
|
7
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
13
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 |
8
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 |
8
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_COP.1:
25
- FCS_CKM.1:
24
- FCS_CKM.2:
13
- FCS_CKM.4:
12
- FCS_COP.1.1:
2
- FCS_CKM.1.1:
1
- FCS_CKM.2.1:
1
|
- FCS_COP: 6
- FCS_CKM: 2
- FCS_CKM.2:
12
- FCS_COP.1:
19
- FCS_CKM.1:
24
- FCS_CKM.4:
11
- FCS_COP.1.1:
1
- FCS_CKM.1.1:
1
- FCS_CKM.2.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
24
|
24
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
13
|
12
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
12
|
11
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
25
|
19
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
45
- FDP_ACF.1:
34
- FDP_RIP.1:
6
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_IFC.1:
4
- FDP_ACC.1.1:
3
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
3
- FDP_ACF.1.4:
3
- FDP_RIP.1.1:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
6
|
- FDP_ACC: 17
- FDP_ACC.1:
26
- FDP_ACF.1:
20
- FDP_ACF: 10
- FDP_RIP.1:
4
- FDP_ACE: 2
- FDP_ACFI: 1
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_IFC.1:
3
- FDP_ACC.1.1:
2
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
3
- FDP_ACF.1.4:
3
- FDP_RIP.1.1:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
6
- FDP_ACEF: 1
- FDP_RIP: 2
- FDP_ACE.1: 1
- FDP_ACG.1: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
45
|
26
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
34
|
20
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
6
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 |
6
|
5
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
1
|
5
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
13
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 |
7
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
22
|
20
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.1:
25
- FMT_MSA.3:
24
- FMT_MTD.1:
18
- FMT_SMF.1:
25
- FMT_SMR.1:
33
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMF.1.1:
1
|
- FMT_MSA: 13
- FMT_MSA.3:
19
- FMT_MSA.1:
10
- FMT_MTD: 4
- FMT_MTD.1.1:
3
- FMT_MTD.1:
13
- FMT_SMF.1:
23
- FMT_SMR.1:
30
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMF.1.1:
1
- FMT_SMEF.1: 3
- FMT_SMF: 2
- FMT_SMR: 3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
25
|
10
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
24
|
19
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
18
|
13
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
25
|
23
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
33
|
30
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_CIP_EXP:
2
- FPT_FDI_EXP:
3
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_CIP_EXP.1:
16
- FPT_FDI_EXP.1:
11
- FPT_PHP.1:
6
- FPT_CIP_EXP.1.1:
2
- FPT_CIP_EXP.1.2:
3
- FPT_FDI_EXP.1.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
|
- FPT_CIP_EXP:
2
- FPT_STM.1:
6
- FPT_TST.1:
6
- FPT_CIP_EXP.1:
16
- FPT_FDI: 3
- FPT_PHP.1:
5
- FPT_CIP_EXP.1.1:
2
- FPT_CIP_EXP.1.2:
3
- FPT_FDI_EXP:
2
- FPT_FDI_EXP.1:
8
- FPT_FDI_EXP.1.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_STM.1.1:
1
- FPT_PHP: 1
- FPT_STM: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_CIP_EXP |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_CIP_EXP.1 |
16
|
16
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_CIP_EXP.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_CIP_EXP.1.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1 |
11
|
8
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FDI_EXP.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 |
6
|
5
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
9
|
6
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
- FTA_SSL.3:
15
- FTA_SSL.3.1:
2
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- physical tampering:
4
- malfunction:
1
|
- FI:
- physical tampering:
4
- malfunction:
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 197:
3
- FIPS PUB 46-3:
1
- FIPS PUB 186-2:
4
|
- FIPS:
- FIPS PUB 197:
3
- FIPS PUB 46-3:
1
- FIPS PUB 186-2:
4
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
3
|
4
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES |
1
|
2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft:
2
- Microsoft Corporation:
1
|
- Microsoft:
- Microsoft:
2
- Microsoft Corporation:
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Canon Inc.
|
Canon Inc.
|
pdf_data/st_metadata//CreationDate |
D:20151224203609+09'00'
|
D:20160701165804+09'00'
|
pdf_data/st_metadata//Creator |
PScript5.dll Version 5.2.2
|
PScript5.dll Version 5.2.2
|
pdf_data/st_metadata//Keywords |
|
|
pdf_data/st_metadata//ModDate |
D:20151224203611+09'00'
|
D:20160701165811+09'00'
|
pdf_data/st_metadata//Producer |
Adobe LiveCycle PDFGenerator
|
Adobe LiveCycle PDFGenerator
|
pdf_data/st_metadata//Subject |
|
|
pdf_data/st_metadata//Title |
Canon imageRUNNER ADVANCE 500/400 Series 2600.1 model Security Target
|
Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
828817
|
1435533
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/st_metadata/pdf_number_of_pages |
62
|
63
|
dgst |
b029424fd7dc3a82
|
13ee853e5878a7f7
|