Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
EOS-1D Mark II firmware Ver.1.0.1
JISEC-CC-CRP-C0010
Electronic Engineering Systems, Inc. (EESI) SuperNet 2000 EAL4/r1
None
name EOS-1D Mark II firmware Ver.1.0.1 Electronic Engineering Systems, Inc. (EESI) SuperNet 2000 EAL4/r1
category Other Devices and Systems Data Protection
scheme JP US
not_valid_after 20.12.2010 07.09.2012
not_valid_before 01.01.2007 01.10.2000
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0010_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10290-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0010_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10290-st.pdf
manufacturer Canon Inc. Electronic Engineering Systems, Inc.
manufacturer_web https://www.canon.com/ https://www.eescom.com/
security_level EAL2+, ALC_DVS.1 EAL4
dgst b0c543b69416411f b25c6f7e00cc0a1f
heuristics/cert_id JISEC-CC-CRP-C0010
heuristics/cert_lab [] US
heuristics/extracted_sars AGD_USR.1, AVA_SOF.1, AVA_VLA.1, ADV_RCR.1, ALC_DVS.1, ATE_COV.1, ADV_FSP.1, ATE_IND.2, ADV_HLD.1, AGD_ADM.1, ATE_FUN.1 AGD_USR.1, ADV_HLD.2, AVA_SOF.1, ADV_FSP.2, AVA_MSU.2, ADV_RCR.1, ALC_DVS.1, ALC_TAT.1, ALC_LCD.1, ATE_DPT.1, ADV_IMP.1, ADV_SPM.1, AVA_VLA.2, ADV_LLD.1, ATE_IND.2, AGD_ADM.1, ATE_COV.2, ATE_FUN.1
heuristics/extracted_versions 1.0.1 2000
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0010
  • certification_date: 01.08.2004
  • claim: EAL2+ ALC_DVS.1
  • enhanced:
    • assurance_level: EAL2+ALC_DVS.1
    • description: PRODUCT DESCRIPTION The product is EOS-1D Mark II digital camera in which the firmware of the digital camera (TOE) was included. Unlike the conventional 35mm film photos, the photos taken by the digital camera have various merits. For example, the photos taken by digital camera do not require development and printing, these photos do no have secular degradation, and these photos are easy to store, search and transmit. On the other hand, because of digitized photos, there are some demerits that digitized photos have the feature that processing and alteration can be easily performed using photo retouch tools. In using the photos taken by the digital camera as the evidence, the integrity of the photos is becoming a big issue. The firmware which is TOE provides the function that generate the verification data, which verify the integrity of the photos taken by EOS-1D Mark II. Please refer to "EOS-1D Mark II" on the following URLs for detail information about the product. (English) http://www.canon.co.jp/Imaging/BeBit-e.html
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.Evaluation Center
    • product: EOS-1D Mark II firmware Ver.1.0.1
    • product_type: IT product (Embedded software)
    • vendor: Canon Inc.
  • expiration_date: 01.07.2011
  • revalidations: [frozendict({'date': '2005-11', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0010_it4023_02.html'})]
  • supplier: Canon Inc.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0010_it4023.html
  • toe_japan_name: EOS-1D Mark II firmware Ver.1.0.1
  • toe_overseas_link: None
  • toe_overseas_name: EOS-1D Mark II N firmware Ver.1.0.1A
pdf_data/report_filename c0010_erpt.pdf st_vid10290-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: TTAP-VR-0016
    • cert_item: SuperNet 2000 EAL4/r1
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0010-01: 1
    • Certification No. C0010: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 3
    • EAL2 augmented: 2
  • EAL:
    • EAL4: 18
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.1: 3
  • AVA:
    • AVA_SOF.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.TAMPER: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • FIPS:
    • FIPS PUB 198: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
pdf_data/report_metadata
  • /CreationDate: D:20051222105917+09'00'
  • /ModDate: D:20051222105917+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 86516
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /CreationDate: D:20001020061448Z
  • /Creator: FrameMaker 5.5.6p145
  • /ModDate: D:20070508143528-04'00'
  • /Producer: Acrobat Distiller 4.05 for Windows
  • /Title: Untitled Document
  • pdf_file_size_bytes: 46770
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 9
pdf_data/st_filename c0010_est.pdf st_vid10290-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
    • EAL2+: 1
  • EAL:
    • EAL 4: 7
    • EAL4: 12
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 6
  • ADO:
    • ADO_DEL.1: 5
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 12
    • ADV_HLD.1: 8
    • ADV_RCR.1: 6
  • AGD:
    • AGD_ADM.1: 9
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 9
  • ATE:
    • ATE_COV.1: 6
    • ATE_FUN.1: 5
    • ATE_IND.2: 6
  • AVA:
    • AVA_SOF.1: 6
    • AVA_VLA.1: 4
  • ACM:
    • ACM_AUT.1: 12
    • ACM_CAP.4: 21
    • ACM_SCP.2: 9
  • ADO:
    • ADO_DEL.2: 11
    • ADO_IGS.1: 9
  • ADV:
    • ADV_FSP.1: 2
    • ADV_FSP.2: 13
    • ADV_HLD.2: 17
    • ADV_IMP.1: 9
    • ADV_LLD.1: 18
    • ADV_RCR.1: 8
    • ADV_SPM.1: 12
  • AGD:
    • AGD_ADM.1: 15
    • AGD_USR.1: 13
  • ALC:
    • ALC_DVS.1: 10
    • ALC_LCD.1: 10
    • ALC_TAT.1: 11
  • ASE:
    • ASE_DES: 2
    • ASE_ENV: 2
    • ASE_OBJ: 2
    • ASE_PPC: 2
    • ASE_REQ: 2
    • ASE_TSS: 2
  • ATE:
    • ATE_COV.2: 9
    • ATE_DPT.1: 8
    • ATE_FUN.1: 13
    • ATE_IND.2: 10
  • AVA:
    • AVA_MSU.2: 16
    • AVA_SOF: 2
    • AVA_SOF.1: 9
    • AVA_VLA.2: 14
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 2
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 2
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.2: 6
  • FPT:
    • FPT_RVM.1: 1
  • FTP:
    • FTP_SEP.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 24
    • FDP_ACC.1.1: 2
    • FDP_ACF: 1
    • FDP_ACF.1: 22
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
  • FIA:
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
  • FMT:
    • FMT_MOF.1: 13
    • FMT_MSA: 2
    • FMT_MSA.1: 11
    • FMT_MSA.3: 10
    • FMT_SMR: 1
    • FMT_SMR.1: 17
  • FPT:
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RVM.1: 8
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 8
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.TAMPER: 5
  • O:
    • O.GEN_KEY: 8
    • O.GEN_VD: 9
  • OE:
    • OE.LOG_TAMER: 2
    • OE.LOG_TAMPER: 8
    • OE.PHS_TAMPER: 10
  • A:
    • A.ADMIN: 9
    • A.ELECTRICAL: 1
    • A.KEY: 1
    • A.KEYS: 3
    • A.MODIFY: 2
    • A.NOEVIL: 1
    • A.PHYSICAL: 4
    • A.SECURITY-AWARE: 4
    • A.TRUSTED: 4
  • O:
    • O.BYPASS: 4
    • O.CONF: 2
    • O.CONFIGURATION: 14
    • O.DETECT: 4
    • O.E: 8
    • O.FLOPPY: 4
    • O.INDICATE: 2
    • O.INSTALL: 2
    • O.ISOLATE: 4
    • O.MODIFY: 4
    • O.RESTRICTED_ACCESS: 4
    • O.SELECT: 4
  • T:
    • T.CABINET_COMPROMISE: 3
    • T.CONFIGURATION: 4
    • T.DSS_COMPROMISE: 2
    • T.E: 8
    • T.NETWORK_ISOLATE: 2
    • T.SENSITIVE: 2
    • T.SPOOF: 2
    • T.SWITCH_FAILURE: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 198: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • cryptographic algorithm). The algorithm of the secure hash function (cryptographic algorithm) is out of scope of the strength of function: 1
    • cryptographic algorithm). The algorithm of the secure hash function (cryptographic algorithm) is out of scope of the strength of function. 6.4 Assurance Measures This section provides the TOE assurance: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20051222105245+09'00'
  • /ModDate: D:20051222105245+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 106178
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
  • /Author: SMMonac
  • /CreationDate: D:20001025051504Z
  • /Creator: Microsoft Word - SecurityTarget-r.FINAL-V2.0
  • /ModDate: D:20070508143245-04'00'
  • /Producer: Acrobat PDFWriter 4.05 for Windows NT
  • /Title: SecurityTarget-r.FINAL-V2.0.doc
  • pdf_file_size_bytes: 2136655
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different