name |
Canon imageRUNNER ADVANCE DX C477 Series 2600 model1.0 |
Apple iOS 12 |
category |
Multi-Function Devices |
Mobility |
scheme |
JP |
US |
status |
active |
archived |
not_valid_after |
15.03.2027 |
14.03.2021 |
not_valid_before |
15.03.2022 |
14.03.2019 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0739_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10937-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0739_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10937-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0739_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10937-st.pdf |
manufacturer |
Canon Inc. |
Apple Inc. |
manufacturer_web |
https://www.canon.com/ |
https://www.apple.com/ |
security_level |
EAL2+, ALC_FLR.2 |
{} |
dgst |
b6eb868cd76e7ba4 |
e2813f592d92e8df |
heuristics/cert_id |
JISEC-CC-CRP-C0739-01-2022 |
CCEVS-VR-10937-2019 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ALC_CMS.2, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
1.0 |
12 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0739
- certification_date: 01.03.2022
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0739
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000cpm-att/c0739_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. User Authentication Function Function for identifying and authenticating the user. Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. HDD Data Encryption Function Function for encrypting all data stored in the HDD. LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. Self-Test Function Function for testing the integrity of the executable code at startup. Audit Log Function Function for generating audit logs on security events, allowing them to be viewed by the administrator and sending them to an external server. Management Function Function for restricting device settings that influence security to be made only by the administrator.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: Canon imageRUNNER ADVANCE DX C477 Series 2600 model
- product_type: Multifunction Product
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000cpm-att/c0739_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000cpm-att/c0739_est.pdf
- toe_version: 1.0
- vendor: Canon Inc.
- expiration_date:
- supplier: Canon Inc.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0739_it0754.html
- toe_overseas_name: Canon imageRUNNER ADVANCE DX C477 Series 2600 model1.0
|
- category: Mobility, Virtual Private Network, Wireless LAN
- certification_date: 14.03.2019
- evaluation_facility: atsec information security corporation
- expiration_date: 14.03.2021
- id: CCEVS-VR-VID10937
- product: Apple iOS 12
- scheme: US
- url: https://www.niap-ccevs.org/product/10937
- vendor: Apple Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
43ce79b420f23a00 |
df09b703c88c665a, c88af12926be2779, f4474c6c73660987 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf |
pdf_data/cert_filename |
c0739_eimg.pdf |
st_vid10937-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0739-01-2022: 1
|
- US:
- CCEVS-VR-VID10937-2019: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20220511142507+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20220511143028+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 109473
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
- /CreationDate: D:20190318141418-04'00'
- /ModDate: D:20190318141418-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 182426
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0739_erpt.pdf |
st_vid10937-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-10937-2019
- cert_item: Apple iPad and iPhone Mobile Devices with iOS 12
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0739-01-2022: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20220513160427+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20220513160609+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 362431
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
- /CreationDate: D:20190318140644-04'00'
- /ModDate: D:20190318140644-04'00'
- pdf_file_size_bytes: 720627
- pdf_hyperlinks: https://help.apple.com/deployment/mdm/, https://help.apple.com/profilemanager/mac/, https://developer.apple.com/documentation/security/certificate_key_and_trust_services, https://developer.apple.com/documentation/security/keychain_services, https://support.apple.com/en-us/HT205583, https://support.apple.com/en-us/HT209144, https://help.apple.com/iphone/12/, https://support.apple.com/en-us/HT204506, https://help.apple.com/ipad/12/, https://help.apple.com/deployment/ios/, https://help.apple.com/configurator/mac/, https://support.apple.com/en-us/HT204060, https://help.apple.com/iphone/11/#/iphfd5021a18, https://www.apple.com/business/docs/DEP_Guide.pdf, https://developer.apple.com/enterprise/documentation/Configuration-Profile-Reference.pdf, https://www.niap-ccevs.org/st/st_vid10937-agd.pdf, https://developer.apple.com/enterprise/documentation/MDM-Protocol-Reference.pdf, https://developer.apple.com/bug-reporting/profiles-and-logs/?platform=ios
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
c0739_est.pdf |
st_vid10937-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL2: 8
- EAL2 augmented: 7
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 11
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 12
- AGD_PRE.1: 8
- ALC:
- ALC_CMC.1: 6
- ALC_CMS.1: 3
- ALC_CMS.2: 4
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 10
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.1: 6
- ASE_REQ.1: 12
- ASE_SPD.1: 10
- ASE_TSS.1: 7
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 26
- FCS_CKM.1.1: 2
- FCS_CKM.2: 14
- FCS_CKM.2.1: 1
- FCS_CKM.4: 14
- FCS_COP.1: 25
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 45
- FDP_ACC.1.1: 3
- FDP_ACF.1: 35
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 7
- FIA_UID.1: 23
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 22
- FMT_MSA.1.1: 2
- FMT_MSA.3: 23
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 19
- FMT_MTD.1.1: 2
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR.1: 34
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 15
- FTA_SSL.3.1: 2
- FTP:
- FTP_ITC.1: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_ALT: 2
- FAU_ALT_EXT.2: 5
- FAU_ALT_EXT.2.1: 1
- FAU_ALT_EXT.2.2: 2
- FAU_GEN: 3
- FAU_GEN.1: 6
- FAU_GEN.1.1: 5
- FAU_GEN.1.2: 5
- FAU_SEL: 2
- FAU_SEL.1: 3
- FAU_SEL.1.1: 2
- FAU_STG: 2
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FAU_STG_EXT.4: 1
- FCS:
- FCS_CKM: 14
- FCS_CKM.1: 9
- FCS_CKM.1.1: 3
- FCS_CKM.2: 12
- FCS_CKM.2.1: 4
- FCS_CKM_EXT.1: 5
- FCS_CKM_EXT.1.1: 3
- FCS_CKM_EXT.1.2: 2
- FCS_CKM_EXT.1.3: 2
- FCS_CKM_EXT.2: 5
- FCS_CKM_EXT.2.1: 2
- FCS_CKM_EXT.3: 8
- FCS_CKM_EXT.3.1: 2
- FCS_CKM_EXT.3.2: 4
- FCS_CKM_EXT.4: 4
- FCS_CKM_EXT.4.1: 3
- FCS_CKM_EXT.4.2: 2
- FCS_CKM_EXT.5: 3
- FCS_CKM_EXT.5.1: 2
- FCS_CKM_EXT.5.2: 2
- FCS_CKM_EXT.6: 3
- FCS_CKM_EXT.6.1: 2
- FCS_CKM_EXT.7: 2
- FCS_CKM_EXT.7.1: 3
- FCS_COP: 2
- FCS_COP.1: 24
- FCS_COP.1.1: 10
- FCS_RBG: 2
- FCS_RBG_EXT.1: 21
- FCS_RBG_EXT.1.1: 5
- FCS_RBG_EXT.1.2: 5
- FCS_RBG_EXT.1.3: 3
- FCS_SRV: 2
- FCS_SRV_EXT.1: 3
- FCS_SRV_EXT.1.1: 2
- FCS_STG: 2
- FCS_STG_EXT.1: 4
- FCS_STG_EXT.1.1: 2
- FCS_STG_EXT.1.2: 2
- FCS_STG_EXT.1.3: 2
- FCS_STG_EXT.1.4: 2
- FCS_STG_EXT.1.5: 2
- FCS_STG_EXT.2: 7
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 5
- FCS_STG_EXT.3.1: 2
- FCS_STG_EXT.3.2: 2
- FCS_STG_EXT.4: 3
- FCS_STG_EXT.4.1: 1
- FCS_TLSC: 2
- FCS_TLSC_EXT: 4
- FCS_TLSC_EXT.1: 6
- FCS_TLSC_EXT.1.1: 8
- FCS_TLSC_EXT.1.2: 5
- FCS_TLSC_EXT.1.3: 4
- FCS_TLSC_EXT.1.4: 4
- FCS_TLSC_EXT.1.5: 2
- FCS_TLSC_EXT.1.6: 2
- FCS_TLSC_EXT.2: 2
- FCS_TLSC_EXT.2.1: 2
- FDP:
- FDP_ACF: 2
- FDP_ACF_EXT.1: 2
- FDP_ACF_EXT.1.1: 2
- FDP_ACF_EXT.1.2: 2
- FDP_DAR: 2
- FDP_DAR_EXT.1: 4
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 2
- FDP_DAR_EXT.2: 3
- FDP_DAR_EXT.2.1: 2
- FDP_DAR_EXT.2.2: 2
- FDP_DAR_EXT.2.3: 2
- FDP_DAR_EXT.2.4: 2
- FDP_IFC: 2
- FDP_IFC_EXT.1: 4
- FDP_IFC_EXT.1.1: 3
- FDP_PBA: 2
- FDP_PBA_EXT.1: 3
- FDP_PBA_EXT.1.1: 1
- FDP_RIP: 2
- FDP_RIP.2: 3
- FDP_RIP.2.1: 2
- FDP_STG: 2
- FDP_STG_EXT.1: 3
- FDP_STG_EXT.1.1: 2
- FDP_UPC: 2
- FDP_UPC_EXT.1: 2
- FDP_UPC_EXT.1.1: 4
- FDP_UPC_EXT.1.2: 2
- FIA:
- FIA_AFL: 2
- FIA_AFL_EXT.1: 3
- FIA_AFL_EXT.1.1: 2
- FIA_AFL_EXT.1.2: 2
- FIA_AFL_EXT.1.3: 2
- FIA_AFL_EXT.1.4: 2
- FIA_AFL_EXT.1.5: 2
- FIA_AFL_EXT.1.6: 2
- FIA_BLT: 2
- FIA_BLT_EXT.1: 2
- FIA_BLT_EXT.1.1: 2
- FIA_BLT_EXT.2: 2
- FIA_BLT_EXT.2.1: 2
- FIA_BLT_EXT.3: 2
- FIA_BLT_EXT.3.1: 2
- FIA_BLT_EXT.4: 2
- FIA_BLT_EXT.4.1: 2
- FIA_BMG: 2
- FIA_BMG_EXT.1: 2
- FIA_BMG_EXT.1.1: 12
- FIA_BMG_EXT.1.2: 8
- FIA_BMG_EXT.2: 2
- FIA_BMG_EXT.2.1: 4
- FIA_BMG_EXT.3: 2
- FIA_BMG_EXT.3.1: 4
- FIA_BMG_EXT.5: 2
- FIA_BMG_EXT.5.1: 2
- FIA_ENR: 2
- FIA_ENR_EXT.2: 3
- FIA_ENR_EXT.2.1: 2
- FIA_PAE: 2
- FIA_PAE_EXT.1: 3
- FIA_PAE_EXT.1.1: 2
- FIA_PMG: 2
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 2
- FIA_TRT: 2
- FIA_TRT_EXT.1: 3
- FIA_TRT_EXT.1.1: 2
- FIA_UAU: 2
- FIA_UAU.5: 3
- FIA_UAU.5.1: 9
- FIA_UAU.5.2: 3
- FIA_UAU.6: 2
- FIA_UAU.6.1: 4
- FIA_UAU.7: 4
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.1: 3
- FIA_UAU_EXT.1.1: 2
- FIA_UAU_EXT.2: 2
- FIA_UAU_EXT.2.1: 2
- FIA_UAU_EXT.2.2: 2
- FMT:
- FMT_MOF: 2
- FMT_MOF_EXT.1: 4
- FMT_MOF_EXT.1.1: 3
- FMT_MOF_EXT.1.2: 5
- FMT_POL: 2
- FMT_POL_EXT.2: 3
- FMT_POL_EXT.2.1: 2
- FMT_POL_EXT.2.2: 2
- FMT_SMF: 4
- FMT_SMF.1: 2
- FMT_SMF_EXT: 3
- FMT_SMF_EXT.1: 12
- FMT_SMF_EXT.1.1: 5
- FMT_SMF_EXT.2: 3
- FMT_SMF_EXT.2.1: 2
- FMT_SMF_EXT.3: 3
- FMT_SMF_EXT.3.1: 3
- FMT_SMF_EXT.3.2: 3
- FMT_UNR_EXT: 1
- FMT_UNR_EXT.1: 4
- FMT_UNR_EXT.1.1: 2
- FPT:
- FPT_AEX: 2
- FPT_AEX_EXT.1: 3
- FPT_AEX_EXT.1.1: 2
- FPT_AEX_EXT.1.2: 2
- FPT_AEX_EXT.2: 3
- FPT_AEX_EXT.2.1: 2
- FPT_AEX_EXT.3: 4
- FPT_AEX_EXT.3.1: 2
- FPT_AEX_EXT.4: 2
- FPT_AEX_EXT.4.1: 2
- FPT_AEX_EXT.4.2: 2
- FPT_JTA: 2
- FPT_JTA_EXT.1: 4
- FPT_JTA_EXT.1.1: 2
- FPT_KST: 2
- FPT_KST_EXT.1: 2
- FPT_KST_EXT.1.1: 2
- FPT_KST_EXT.2: 3
- FPT_KST_EXT.2.1: 2
- FPT_KST_EXT.3: 3
- FPT_KST_EXT.3.1: 2
- FPT_NOT: 2
- FPT_NOT_EXT.1: 4
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 4
- FPT_STM.1.1: 2
- FPT_TST: 2
- FPT_TST_EXT: 5
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 6
- FPT_TST_EXT.1.2: 4
- FPT_TST_EXT.2: 3
- FPT_TST_EXT.2.1: 2
- FPT_TST_EXT.3: 2
- FPT_TST_EXT.3.1: 2
- FPT_TUD: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 3
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 2
- FPT_TUD_EXT.2.3: 4
- FPT_TUD_EXT.2.4: 2
- FPT_TUD_EXT.3: 2
- FPT_TUD_EXT.3.1: 2
- FPT_TUD_EXT.4: 2
- FPT_TUD_EXT.4.1: 3
- FPT_TUD_EXT.4.2: 2
- FTA:
- FTA_SSL: 2
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 2
- FTA_SSL_EXT.1.2: 2
- FTA_SSL_EXT.1.3: 2
- FTA_TAB: 2
- FTA_TAB.1: 3
- FTA_TAB.1.1: 2
- FTA_WSE: 2
- FTA_WSE_EXT: 1
- FTA_WSE_EXT.1: 2
- FTA_WSE_EXT.1.1: 2
- FTP:
- FTP_DIT_EXT.1: 1
- FTP_ITC: 2
- FTP_ITC_EXT: 3
- FTP_ITC_EXT.1: 12
- FTP_ITC_EXT.1.1: 13
- FTP_ITC_EXT.1.2: 4
- FTP_ITC_EXT.1.3: 4
- FTP_ITT_EXT.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 8
- D.DOC: 19
- D.FUNC: 11
- D.PROT: 6
- O:
- O.AUDIT: 6
- O.CONF: 14
- O.DOC: 14
- O.FUNC: 6
- O.FUNC_: 1
- O.INTERFACE: 7
- O.PROT: 7
- O.SOFTWARE: 6
- O.STORAGE: 7
- O.USER: 13
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 3
- OE.AUDIT_STORAGE: 3
- OE.INTERFACE: 3
- OE.PHYISCAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- A:
- A.CONFIG: 1
- A.CONNNECTIVITY: 1
- A.MOBILE_DEVICE_PLATFORM: 1
- A.NOTIFY: 1
- A.NO_TOE_BYPASS: 2
- A.PHYSICAL: 1
- A.PRECAUTION: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- A.TRUSTED_ADMIN: 1
- A.TRUSTED_CONFIG: 1
- O:
- O.ACCOUNTABILITY: 1
- O.AUTH: 1
- O.AUTH_COMM: 1
- O.COMMS: 1
- O.CONFIG: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.INTEGRITY: 1
- O.PRIVACY: 1
- O.STORAGE: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.WIRELESS_ACCESS_POINT_CONNECTION: 1
- OE:
- OE.CONFIG: 1
- OE.DATA_PROPER_ADMIN: 1
- OE.DATA_PROPER_USER: 1
- OE.IT_ENTERPRISE: 1
- OE.MOBILE_DEVICE_PLATFORM: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 2
- OE.PHYSICAL: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- OE.TRUSTED_CONFIG: 1
- OE.WIRELESS_NETWORK: 1
- T:
- T.BACKUP: 1
- T.EAVESDROP: 1
- T.FLAWAPP: 3
- T.MALICIOUS_APPS: 1
- T.NETWORK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PERSISTENT: 3
- T.PHYSICAL: 3
- T.PHYSICAL_ACCESS: 1
- T.TSF_CONFIGURATION: 1
- T.TSF_FAILURE: 2
- T.UNAUTHORIZED: 2
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED: 1
- T.USER_DATA_REUSE: 1
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 2
- Microsoft Corporation: 1
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 37
- AES-: 1
- AES-128: 7
- AES-256: 2
- AES256: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 5
- HMAC: 6
- HMAC-SHA-256: 9
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 5
- SHA-512: 7
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 22
- IKEv1: 2
- IKEv2: 22
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 51
- TLS 1.0: 2
- TLS 1.1: 3
- TLS 1.2: 4
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- XEX:
- XTS:
|
pdf_data/st_keywords/ecc_curve |
|
- Curve:
- NIST:
- P-256: 14
- P-384: 14
- secp256r1: 2
- secp384r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 4
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 1
- FIPS 186-4: 8
- FIPS 197: 1
- FIPS 198-1: 1
- FIPS PUB 186-4: 7
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-132: 1
- NIST SP 800-38A: 1
- NIST SP 800-38C: 2
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 4
- NIST SP 800-56A: 2
- NIST SP 800-57: 2
- SP 800-108: 1
- SP 800-56B: 2
- SP 800-56C: 1
- SP 800-56c: 1
- SP 800-90A: 4
- RFC:
- RFC 2560: 1
- RFC 2818: 1
- RFC 3394: 3
- RFC 3602: 1
- RFC 4106: 1
- RFC 4301: 3
- RFC 4303: 1
- RFC 4401: 1
- RFC 4945: 1
- RFC 5216: 1
- RFC 5246: 10
- RFC 5280: 3
- RFC 5289: 8
- RFC 5869: 1
- RFC 6125: 1
- RFC 6379: 1
- RFC 7748: 3
- RFC4346: 1
- RFC5246: 4
- RFC7748: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.PHYSICAL_ACCESS Physical Access (EP_MDM_AGENT_V3.0) The mobile: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Canon Inc.
- /CreationDate: D:20220510083656+09'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220510083656+09'00'
- /Producer: Microsoft® Word 2016
- /Title: Canon imageRUNNER ADVANCE DX C477 Series 2600 model Security Target
- pdf_file_size_bytes: 1588056
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 63
|
- /Author: atsec information security
- /CreationDate: D:20190313185043+00'00'
- /Creator: Microsoft Word
- /Keywords: PP_MD_V3.1,EP_MDM_AGENT_V3.0, PP_WLAN_CLI_EP_V1.0, MOD_VPN_CLI_V2.1, CC, iOS 12,Apple
- /ModDate: D:20190313185043+00'00'
- /Subject: Common Criteria Exact Conformance
- /Title: Apple iPad and iPhone Mobile Devices with iOS 12
- pdf_file_size_bytes: 2432435
- pdf_hyperlinks: https://developer.apple.com/documentation/security/keychain_services, https://developer.apple.com/documentation/security/certificate_key_and_trust_services, https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=376, https://support.apple.com/en-us/HT205583, https://help.apple.com/iphone/12/, https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=336, https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=361, https://developer.apple.com/documentation/security/1550981-ssl_cipher_suite_values?language=objc, https://www.bluetooth.com/specifications/adopted-specifications, https://developer.apple.com/library/ios/featuredarticles/iPhoneConfigurationProfileRef/Introduction/Introduction.html%23/apple_ref/doc/uid/TP40010206-CH1-SW248, https://developer.apple.com/bug-reporting/profiles-and-logs/?platform=ios, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=372, https://support.apple.com/en-us/HT209144, https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=379, https://www.apple.com/r/store/government/, https://help.apple.com/deployment/ios/, https://www.apple.com/, https://www.apple.com/business/docs/DEP_Guide.pdf, https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=311, https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=356, https://developer.apple.com/enterprise/documentation/Configuration-Profile-Reference.pdf, https://support.apple.com/en-us/HT204506, https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=395, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=388, https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=307, https://www.niap-ccevs.org/Profile/Info.cfm?id=360, https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=310, https://www.niap-ccevs.org/pp/pp_md_v3.1.htm#abbr_TSF, https://help.apple.com/configurator/mac/, https://apple.com/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=250, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=376, https://www.niap-ccevs.org/st/st_vid10937-agd.pdf, https://developer.apple.com/enterprise/documentation/MDM-Protocol-Reference.pdf, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=243, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=198, https://help.apple.com/deployment/mdm/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=389, https://help.apple.com/profilemanager/mac/, https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=383, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=309, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=336, https://help.apple.com/ipad/12/, https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=381, https://support.apple.com/en-us/HT204060, https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=357, https://www.apple.com/us_smb_78313/shop, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=361, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=365
- pdf_is_encrypted: False
- pdf_number_of_pages: 172
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |