name |
EOS-1D Mark II firmware Ver.1.0.1 |
Infineon Smart Card IC (Security Controller) SLE66C82P/m1474a15 and SLE66C42P/m1495a15 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
20.12.2010 |
01.09.2019 |
not_valid_before |
01.01.2007 |
16.11.2004 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0010_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0204a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0010_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0204b.pdf |
manufacturer |
Canon Inc. |
Infineon Technologies AG |
manufacturer_web |
https://www.canon.com/ |
https://www.infineon.com/ |
security_level |
EAL2+, ALC_DVS.1 |
EAL5 |
dgst |
b0c543b69416411f |
079f81475a4b984c |
heuristics/cert_id |
JISEC-CC-CRP-C0010 |
BSI-DSZ-CC-0204-2004 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_IND.2, ALC_DVS.1, ADV_FSP.1, ATE_FUN.1, ADV_HLD.1, AGD_USR.1, AVA_SOF.1, ADV_RCR.1, AGD_ADM.1, ATE_COV.1, AVA_VLA.1 |
ADV_IMP.2, ASE_OBJ.1, ATE_COV.2, AGD_USR.1, ASE_REQ.1, ASE_TSS.1, AVA_VLA.4, ADV_SPM.3, ADV_INT.1, ASE_DES.1, ADV_RCR.2, ALC_DVS.2, ATE_IND.2, ADV_HLD.3, ASE_PPC.1, AGD_ADM.1, ADV_FSP.3, ATE_DPT.2, ASE_SRE.1, AVA_CCA.1, AVA_MSU.3, ALC_LCD.2, ASE_INT.1, ALC_TAT.2, ATE_FUN.1, ASE_ENV.1, AVA_SOF.1, ADV_LLD.1 |
heuristics/extracted_versions |
1.0.1 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0010
- certification_date: 01.08.2004
- claim: EAL2+ ALC_DVS.1
- enhanced:
- assurance_level: EAL2+ALC_DVS.1
- description: PRODUCT DESCRIPTION The product is EOS-1D Mark II digital camera in which the firmware of the digital camera (TOE) was included. Unlike the conventional 35mm film photos, the photos taken by the digital camera have various merits. For example, the photos taken by digital camera do not require development and printing, these photos do no have secular degradation, and these photos are easy to store, search and transmit. On the other hand, because of digitized photos, there are some demerits that digitized photos have the feature that processing and alteration can be easily performed using photo retouch tools. In using the photos taken by the digital camera as the evidence, the integrity of the photos is becoming a big issue. The firmware which is TOE provides the function that generate the verification data, which verify the integrity of the photos taken by EOS-1D Mark II. Please refer to "EOS-1D Mark II" on the following URLs for detail information about the product. (English) http://www.canon.co.jp/Imaging/BeBit-e.html
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.Evaluation Center
- product: EOS-1D Mark II firmware Ver.1.0.1
- product_type: IT product (Embedded software)
- vendor: Canon Inc.
- expiration_date: 01.07.2011
- revalidations: [frozendict({'date': '2005-11', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0010_it4023_02.html'})]
- supplier: Canon Inc.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0010_it4023.html
- toe_japan_name: EOS-1D Mark II firmware Ver.1.0.1
- toe_overseas_link: None
- toe_overseas_name: EOS-1D Mark II N firmware Ver.1.0.1A
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0010_erpt.pdf |
0204a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0204-2004
- cert_item: Infineon Smart Card IC (Security Controller) SLE66C82P/m1474a15 and SLE66C42P/m1495a15
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0010-01: 1
- Certification No. C0010: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 3
- EAL2 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 10
- EAL5 augmented: 3
- EAL5+: 2
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 3
- ACM_SCP.3: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 2
- ADV_FSP.3: 1
- ADV_HLD: 2
- ADV_HLD.3: 1
- ADV_IMP: 2
- ADV_IMP.2: 1
- ADV_INT: 2
- ADV_INT.1: 1
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.2: 1
- ADV_SPM: 2
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 2
- ALC_TAT: 2
- ALC_TAT.2: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 4
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 5
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_COP.1: 2
- FCS_RND.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FPT_TST.2: 1
- FRU:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 25
- Infineon Technologies AG: 14
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 5
- Physical Probing: 1
- physical probing: 2
- side channel: 1
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- FIPS:
- ISO:
|
- BSI:
- AIS 25: 2
- AIS 26: 3
- AIS 31: 3
- AIS 32: 3
- AIS 34: 2
- AIS 36: 3
- ISO:
- ISO/IEC 15408:1999: 1
- ISO/IEC15408: 1999: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 2004, for the Product Smart Card IC (Security Controller) SLE66C82P/SLE66C42P / m1474/m1495, (confidential document) [8] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
- AG, Security and Chipcard ICs, SLE 66CxxxP Security Controller Family, Data Book Version 08.04, (confidential document) [10] SLE66CxxxP, Products and Bondout Errata Sheet, Version 07.04, (confidential document) [11: 1
- Management Scope (ACM_SCP), Version 1.2, 07. October 2004 (i.e. TOE Configuration List, confidential document) Certification Report BSI-DSZ-CC-0204-2004 B-26 This page is intentionally left blank: 1
- Security Controller Family, Confidential Instruction Set, 05.01, (confidential document) [12] Confidential Application Note, SLE66CxxxP, Transfer of a ROM M ask from SLE66CxxS to: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20051222105917+09'00'
- /ModDate: D:20051222105917+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 86516
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: BSI
- /CreationDate: D:20041116103922
- /Creator: Microsoft Word - 0204a.doc
- /ModDate: D:20041116104205+01'00'
- /Producer: Acrobat PDFWriter 4.0 für Windows NT
- /Title: 0204a.PDF
- pdf_file_size_bytes: 197971
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 48
|
pdf_data/st_filename |
c0010_est.pdf |
0204b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 3
- EAL2+: 1
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 4
- EAL5: 4
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 5
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 8
- ADV_RCR.1: 6
- AGD:
- AGD_ADM.1: 9
- AGD_USR.1: 6
- ALC:
- ATE:
- ATE_COV.1: 6
- ATE_FUN.1: 5
- ATE_IND.2: 6
- AVA:
- AVA_SOF.1: 6
- AVA_VLA.1: 4
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 1
- ACM_SCP: 3
- ACM_SCP.2: 1
- ACM_SCP.3: 5
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 5
- ADV_HLD.3: 4
- ADV_IMP.2: 3
- ADV_INT.1: 2
- ADV_LLD.1: 11
- ADV_RCR.2: 3
- ADV_SPM.3: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.2: 1
- ALC_TAT.2: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_CCA.1: 2
- AVA_MSU.3: 3
- AVA_SOF: 3
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 2
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 2
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.2: 6
- FPT:
- FTP:
|
- FAU:
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.4: 5
- FCS_COP.1: 17
- FCS_COP.1.1: 2
- FCS_RND: 2
- FCS_RND.1: 4
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_ITC.1: 4
- FDP_ITT.1: 3
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.2: 5
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 4
- FPT_FLS.1: 4
- FPT_ITT.1: 3
- FPT_PHP.3: 7
- FPT_SEP.1: 4
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.2: 23
- FPT_TST.2.1: 2
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- OE:
- OE.LOG_TAMER: 2
- OE.LOG_TAMPER: 8
- OE.PHS_TAMPER: 10
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 8
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 8
- malfunction: 1
- SCA:
- DPA: 3
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- cryptographic algorithm). The algorithm of the secure hash function (cryptographic algorithm) is out of scope of the strength of function: 1
- cryptographic algorithm). The algorithm of the secure hash function (cryptographic algorithm) is out of scope of the strength of function. 6.4 Assurance Measures This section provides the TOE assurance: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20051222105245+09'00'
- /ModDate: D:20051222105245+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 106178
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /Author: Novinsky
- /CreationDate: D:20040224141104+01'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20040224141104+01'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Microsoft Word - SecurityTarget_12.doc
- pdf_file_size_bytes: 210823
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |