Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon imageRUNNER ADVANCE DX C57900KG/C5700 Series 2600 model1.0
JISEC-CC-CRP-C0686-01-2020
Apple iOS 13 on iPhone and Apple iPadOS 13 on iPad Mobile Devices
CCEVS-VR-VID-11036-2020
name Canon imageRUNNER ADVANCE DX C57900KG/C5700 Series 2600 model1.0 Apple iOS 13 on iPhone and Apple iPadOS 13 on iPad Mobile Devices
category Multi-Function Devices Mobility
scheme JP US
status active archived
not_valid_after 05.10.2025 06.11.2022
not_valid_before 05.10.2020 06.11.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0686_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11036-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0686_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11036-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0686_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11036-st.pdf
manufacturer Canon Inc. Apple Inc.
manufacturer_web https://www.canon.com/ https://www.apple.com/
security_level EAL2+, ALC_FLR.2 {}
dgst bd17a424fa502318 1fcc835c9d199d4c
heuristics/cert_id JISEC-CC-CRP-C0686-01-2020 CCEVS-VR-VID-11036-2020
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1
heuristics/extracted_versions 1.0 13
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0686
  • certification_date: 01.10.2020
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0686
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000012ji-att/c0686_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. User Authentication Function Function for identifying and authenticating the user. Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. HDD Data Encryption Function Function for encrypting all data stored in the HDD. LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. Self-Test Function Function for testing the integrity of the executable code at startup. Audit Log Function Function for generating audit logs on security events, allowing them to be viewed by the administrator and sending them to an external server. Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Canon imageRUNNER ADVANCE DX C57900KG/C5700 Series 2600 model
    • product_type: Multifunction Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000012ji-att/c0686_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000012ji-att/c0686_est.pdf
    • toe_version: 1.0
    • vendor: Canon Inc.
  • expiration_date:
  • supplier: Canon Inc.
  • toe_japan_name: Canon imageRUNNER ADVANCE DX C57900KG / C5700 Series 2600 model1.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0686_it0744.html
  • toe_overseas_name: Canon imageRUNNER ADVANCE DX C57900KG / C5700 Series 2600 model1.0
  • category: Mobility
  • certification_date: 06.11.2020
  • evaluation_facility: atsec information security corporation
  • expiration_date: 06.11.2022
  • id: CCEVS-VR-VID11036
  • product: Apple iOS 13 on iPhone and Apple iPadOS 13 on iPad Mobile Devices
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11036
  • vendor: Apple Inc.
heuristics/protection_profiles 43ce79b420f23a00 36b1d4890baaa7f4, df09b703c88c665a, c88af12926be2779, f4474c6c73660987
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_mdm_agent_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf
pdf_data/cert_filename c0686_eimg.pdf st_vid11036-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0686-01-2020: 1
  • US:
    • CCEVS-VR-VID11036-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
  • atsec:
    • atsec: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_metadata
  • /CreationDate: D:20201106141619+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20201106141858+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 131040
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20201117115457-05'00'
  • /ModDate: D:20201117115457-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 182124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0686_erpt.pdf st_vid11036-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID11036-2020
    • cert_item: Apple iOS 13 on iPhone and Apple iPadOS 13 on iPad Mobile Devices
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0686-01-2020: 1
  • US:
    • CCEVS-VR-VID11036-2020: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 5
  • Cisco:
    • Cisco: 1
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • atsec:
    • atsec: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/hash_function
  • PBKDF:
    • PBKDF: 1
    • PBKDF2: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 7
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 6
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 5
  • VPN:
    • VPN: 20
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 6
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • RFC:
    • RFC 2743: 1
    • RFC 4401: 1
  • X509:
    • X.509: 1
pdf_data/report_metadata
  • /CreationDate: D:20211125120906+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20211125122109+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 390054
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
pdf_data/st_filename c0686_est.pdf st_vid11036-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2: 8
    • EAL2 augmented: 7
  • EAL:
    • EAL1: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 11
  • APE:
    • APE_ECD: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 14
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 14
    • FCS_COP.1: 25
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 45
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 35
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UID.1: 23
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 22
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 23
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 19
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 15
    • FTA_SSL.3.1: 2
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ALT: 2
    • FAU_ALT_EXT.2: 5
    • FAU_ALT_EXT.2.1: 1
    • FAU_ALT_EXT.2.2: 2
    • FAU_GEN: 3
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 4
    • FAU_GEN.1.2: 5
    • FAU_SEL: 2
    • FAU_SEL.1: 3
    • FAU_SEL.1.1: 2
    • FAU_STG: 2
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 4
    • FCS_CKM_EXT.1: 5
    • FCS_CKM_EXT.1.1: 3
    • FCS_CKM_EXT.1.2: 2
    • FCS_CKM_EXT.1.3: 2
    • FCS_CKM_EXT.2: 5
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 9
    • FCS_CKM_EXT.3.1: 2
    • FCS_CKM_EXT.3.2: 4
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 3
    • FCS_CKM_EXT.4.2: 2
    • FCS_CKM_EXT.5: 3
    • FCS_CKM_EXT.5.1: 2
    • FCS_CKM_EXT.5.2: 2
    • FCS_CKM_EXT.6: 3
    • FCS_CKM_EXT.6.1: 2
    • FCS_CKM_EXT.7: 2
    • FCS_CKM_EXT.7.1: 3
    • FCS_COP: 2
    • FCS_COP.1: 28
    • FCS_COP.1.1: 10
    • FCS_RBG: 2
    • FCS_RBG_EXT.1: 23
    • FCS_RBG_EXT.1.1: 6
    • FCS_RBG_EXT.1.2: 6
    • FCS_RBG_EXT.1.3: 4
    • FCS_SRV: 2
    • FCS_SRV_EXT.1: 3
    • FCS_SRV_EXT.1.1: 2
    • FCS_STG: 2
    • FCS_STG_EXT.1: 5
    • FCS_STG_EXT.1.1: 2
    • FCS_STG_EXT.1.2: 2
    • FCS_STG_EXT.1.3: 2
    • FCS_STG_EXT.1.4: 2
    • FCS_STG_EXT.1.5: 2
    • FCS_STG_EXT.2: 7
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 5
    • FCS_STG_EXT.3.1: 2
    • FCS_STG_EXT.3.2: 2
    • FCS_STG_EXT.4: 4
    • FCS_STG_EXT.4.1: 1
    • FCS_TLSC: 2
    • FCS_TLSC_EXT: 4
    • FCS_TLSC_EXT.1: 11
    • FCS_TLSC_EXT.1.1: 7
    • FCS_TLSC_EXT.1.2: 4
    • FCS_TLSC_EXT.1.3: 3
    • FCS_TLSC_EXT.1.4: 3
    • FCS_TLSC_EXT.1.5: 1
    • FCS_TLSC_EXT.1.6: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 2
  • FDP:
    • FDP_ACF: 2
    • FDP_ACF_EXT.1: 2
    • FDP_ACF_EXT.1.1: 2
    • FDP_ACF_EXT.1.2: 2
    • FDP_DAR: 2
    • FDP_DAR_EXT.1: 4
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 2
    • FDP_DAR_EXT.2: 3
    • FDP_DAR_EXT.2.1: 2
    • FDP_DAR_EXT.2.2: 3
    • FDP_DAR_EXT.2.3: 2
    • FDP_DAR_EXT.2.4: 2
    • FDP_IFC: 2
    • FDP_IFC_EXT.1: 4
    • FDP_IFC_EXT.1.1: 3
    • FDP_PBA: 2
    • FDP_PBA_EXT.1: 3
    • FDP_PBA_EXT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 3
    • FDP_RIP.2.1: 2
    • FDP_STG: 2
    • FDP_STG_EXT.1: 3
    • FDP_STG_EXT.1.1: 2
    • FDP_UPC: 2
    • FDP_UPC_EXT.1: 2
    • FDP_UPC_EXT.1.1: 4
    • FDP_UPC_EXT.1.2: 2
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 2
    • FIA_AFL_EXT.1.2: 2
    • FIA_AFL_EXT.1.3: 2
    • FIA_AFL_EXT.1.4: 2
    • FIA_AFL_EXT.1.5: 2
    • FIA_AFL_EXT.1.6: 2
    • FIA_BLT: 2
    • FIA_BLT_EXT.1: 2
    • FIA_BLT_EXT.1.1: 2
    • FIA_BLT_EXT.2: 2
    • FIA_BLT_EXT.2.1: 2
    • FIA_BLT_EXT.3: 2
    • FIA_BLT_EXT.3.1: 2
    • FIA_BLT_EXT.4: 2
    • FIA_BLT_EXT.4.1: 2
    • FIA_BMG: 2
    • FIA_BMG_EXT.1: 2
    • FIA_BMG_EXT.1.1: 13
    • FIA_BMG_EXT.1.2: 12
    • FIA_BMG_EXT.2: 2
    • FIA_BMG_EXT.2.1: 4
    • FIA_BMG_EXT.3: 2
    • FIA_BMG_EXT.3.1: 4
    • FIA_BMG_EXT.5: 2
    • FIA_BMG_EXT.5.1: 2
    • FIA_ENR: 2
    • FIA_ENR_EXT.2: 3
    • FIA_ENR_EXT.2.1: 2
    • FIA_PAE: 2
    • FIA_PAE_EXT.1: 3
    • FIA_PAE_EXT.1.1: 2
    • FIA_PMG: 2
    • FIA_PMG_EXT.1: 3
    • FIA_PMG_EXT.1.1: 2
    • FIA_PSK_EXT.1: 1
    • FIA_TRT: 2
    • FIA_TRT_EXT.1: 4
    • FIA_TRT_EXT.1.1: 2
    • FIA_UAU: 2
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 9
    • FIA_UAU.5.2: 3
    • FIA_UAU.6: 2
    • FIA_UAU.6.1: 4
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 2
    • FIA_UAU_EXT.1: 3
    • FIA_UAU_EXT.1.1: 2
    • FIA_UAU_EXT.2: 2
    • FIA_UAU_EXT.2.1: 2
    • FIA_UAU_EXT.2.2: 2
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF_EXT.1: 4
    • FMT_MOF_EXT.1.1: 6
    • FMT_MOF_EXT.1.2: 5
    • FMT_POL: 2
    • FMT_POL_EXT.2: 3
    • FMT_POL_EXT.2.1: 2
    • FMT_POL_EXT.2.2: 2
    • FMT_SMF: 4
    • FMT_SMF.1: 2
    • FMT_SMF_EXT: 3
    • FMT_SMF_EXT.1: 9
    • FMT_SMF_EXT.1.1: 5
    • FMT_SMF_EXT.2: 3
    • FMT_SMF_EXT.2.1: 2
    • FMT_SMF_EXT.4: 4
    • FMT_SMF_EXT.4.1: 3
    • FMT_SMF_EXT.4.2: 3
    • FMT_UNR_EXT.1: 3
    • FMT_UNR_EXT.1.1: 3
  • FPT:
    • FPT_AEX: 2
    • FPT_AEX_EXT.1: 3
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 2
    • FPT_AEX_EXT.2: 3
    • FPT_AEX_EXT.2.1: 2
    • FPT_AEX_EXT.3: 4
    • FPT_AEX_EXT.3.1: 2
    • FPT_AEX_EXT.4: 2
    • FPT_AEX_EXT.4.1: 2
    • FPT_AEX_EXT.4.2: 2
    • FPT_JTA: 2
    • FPT_JTA_EXT.1: 4
    • FPT_JTA_EXT.1.1: 2
    • FPT_KST: 2
    • FPT_KST_EXT.1: 2
    • FPT_KST_EXT.1.1: 2
    • FPT_KST_EXT.2: 3
    • FPT_KST_EXT.2.1: 2
    • FPT_KST_EXT.3: 3
    • FPT_KST_EXT.3.1: 2
    • FPT_NOT: 2
    • FPT_NOT_EXT.1: 4
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
    • FPT_TST: 2
    • FPT_TST_EXT: 5
    • FPT_TST_EXT.1: 11
    • FPT_TST_EXT.1.1: 2
    • FPT_TST_EXT.2: 3
    • FPT_TST_EXT.2.1: 2
    • FPT_TST_EXT.3: 2
    • FPT_TST_EXT.3.1: 2
    • FPT_TUD: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 3
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
    • FPT_TUD_EXT.2.3: 4
    • FPT_TUD_EXT.2.4: 2
    • FPT_TUD_EXT.3: 2
    • FPT_TUD_EXT.3.1: 2
    • FPT_TUD_EXT.4: 2
    • FPT_TUD_EXT.4.1: 4
    • FPT_TUD_EXT.4.2: 2
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 2
    • FTA_SSL_EXT.1.2: 2
    • FTA_SSL_EXT.1.3: 2
    • FTA_TAB: 2
    • FTA_TAB.1: 3
    • FTA_TAB.1.1: 2
    • FTA_WSE: 2
    • FTA_WSE_EXT: 1
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 2
  • FTP:
    • FTP_DIT_EXT.1: 2
    • FTP_ITC: 2
    • FTP_ITC_EXT: 4
    • FTP_ITC_EXT.1: 14
    • FTP_ITC_EXT.1.1: 10
    • FTP_ITC_EXT.1.2: 4
    • FTP_ITC_EXT.1.3: 4
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 8
    • D.DOC: 19
    • D.FUNC: 11
    • D.PROT: 6
  • O:
    • O.AUDIT: 6
    • O.CONF: 14
    • O.DOC: 14
    • O.FUNC: 6
    • O.FUNC_: 1
    • O.INTERFACE: 7
    • O.PROT: 7
    • O.SOFTWARE: 6
    • O.STORAGE: 7
    • O.USER: 13
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.CONFIG: 1
    • A.CONNNECTIVITY: 1
    • A.MOBILE_DEVICE_PLATFORM: 1
    • A.NOTIFY: 1
    • A.NO_TOE_BYPASS: 2
    • A.PHYSICAL: 1
    • A.PRECAUTION: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.ACCOUNTABILITY: 1
    • O.APPLY_POLICY: 1
    • O.AUTH: 1
    • O.AUTH_COMM: 1
    • O.COMMS: 1
    • O.CONFIG: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.DATA_PROTECTION_TRANSIT: 1
    • O.INTEGRITY: 1
    • O.PRIVACY: 1
    • O.STORAGE: 2
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.CONFIG: 1
    • OE.DATA_PROPER_ADMIN: 1
    • OE.DATA_PROPER_USER: 1
    • OE.IT_ENTERPRISE: 1
    • OE.MOBILE_DEVICE_PLATFORM: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
    • OE.WIRELESS_NETWORK: 1
  • T:
    • T.BACKUP: 1
    • T.EAVESDROP: 1
    • T.FLAWAPP: 3
    • T.NETWORK: 1
    • T.PERSISTENT: 3
    • T.PHYSICAL: 4
    • T.TSF_CONFIGURATION: 1
    • T.TSF_FAILURE: 2
    • T.UNAUTHORIZED: 2
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED: 1
    • T.USER_DATA_REUSE: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
    • Microsoft Corporation: 1
  • Cisco:
    • Cisco: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
  • AES_competition:
    • AES:
      • AES: 40
      • AES-: 3
      • AES-128: 6
      • AES-256: 3
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CBC-MAC: 5
      • HMAC: 5
      • HMAC-SHA-256: 13
      • HMAC-SHA-384: 4
      • HMAC-SHA-512: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
  • FF:
    • DH:
      • DH: 2
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 13
      • Diffie-Hellman: 14
    • DSA:
      • DSA: 2
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF: 3
    • PBKDF2: 11
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 6
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 5
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 23
    • IKEv1: 3
    • IKEv2: 24
  • IPsec:
    • IPsec: 53
  • SSH:
    • SSH: 2
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 67
      • TLS 1.0: 2
      • TLS 1.1: 3
      • TLS 1.2: 4
  • VPN:
    • VPN: 81
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 10
  • RNG:
    • RBG: 14
    • RNG: 1
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 12
  • CCM:
    • CCM: 5
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 5
  • GCM:
    • GCM: 6
  • XEX:
    • XEX: 1
  • XTS:
    • XTS: 5
pdf_data/st_keywords/ecc_curve
  • Curve:
    • Curve25519: 7
  • NIST:
    • P-256: 12
    • P-384: 12
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 4
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 3
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 180-4: 3
    • FIPS 186-4: 7
    • FIPS 197: 3
    • FIPS 198-1: 3
    • FIPS PUB 186-4: 3
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-132: 1
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 2
  • RFC:
    • RFC 2246: 1
    • RFC 2818: 1
    • RFC 3394: 2
    • RFC 3526: 7
    • RFC 3602: 1
    • RFC 4106: 1
    • RFC 4301: 3
    • RFC 4303: 1
    • RFC 4401: 1
    • RFC 4945: 1
    • RFC 5216: 1
    • RFC 5246: 10
    • RFC 5280: 5
    • RFC 5282: 1
    • RFC 5288: 2
    • RFC 5289: 8
    • RFC 5869: 1
    • RFC 5996: 3
    • RFC 6125: 1
    • RFC 6379: 1
    • RFC 6960: 1
    • RFC 7748: 4
    • RFC4346: 1
    • RFC5246: 4
    • RFC7748: 2
  • X509:
    • X.509: 7
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application (PP_MD_V3.1) Applications: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Canon Inc.
  • /CreationDate: D:20211122131849+09'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20211122131849+09'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Canon imageRUNNER ADVANCE DX C57900KG/C5700 Series 2600 model Security Target
  • pdf_file_size_bytes: 1640442
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different