| name |
Canon iR5570/iR6570 Series Encrypted Printing Software-B1 Version 1.01 |
Strong Customer Authentication for Apple Pay on iPhone 15 Pro with A17 Pro running iOS 17.4(iOS 17.4 (Build 21E219)) |
| category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
FR |
| status |
archived |
active |
| not_valid_after |
07.01.2013 |
08.01.2030 |
| not_valid_before |
03.06.2005 |
08.01.2025 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_40fr.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0027_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_40fr.pdf |
| st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_40en.pdf |
| manufacturer |
Canon Inc. |
Apple Inc. |
| manufacturer_web |
https://www.canon.com/ |
https://www.apple.com/ |
| security_level |
EAL2 |
ADV_FSP.3, EAL2+, ALC_FLR.3 |
| dgst |
ca11951ff35cba31 |
ecbeeaa7c47eedea |
| heuristics/cert_id |
JISEC-CC-CRP-C0027 |
ANSSI-CC-2024/40 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
{} |
ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
1.01 |
17.4 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0562
- certification_date: 01.06.2017
- claim: EAL2+ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.2
- cc_version: 3.1 Release4
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of implementing the functionality required by the U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009) defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: Canon imageRUNNER ADVANCE 6500 Series 2600 model
- product_type: Multifunction Product
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- toe_version: 2.0
- vendor: Canon Inc.
- expiration_date: 01.07.2022
- revalidations: [frozendict({'date': '2017-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0562_it6614_01.html'})]
- supplier: Canon Inc.
- toe_japan_name: Canon imageRUNNER ADVANCE 6500 Series 2600 model2.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0562_it6614.html
- toe_overseas_name: Canon imageRUNNER ADVANCE 6500 Series 2600 model2.1
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
|
Certificat-ANSSI-CC-2024_40fr.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20250110095627+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20250110095834+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 143605
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
c0027_ecvr.pdf |
ANSSI-CC-2024_40fr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0027: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2022-11-001: 1
- CCMB-2022-11-002: 1
- CCMB-2022-11-003: 1
- CCMB-2022-11-005: 1
- CCMB-2022-11-006: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20050615165030+09'00'
- /ModDate: D:20050615165030+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13122
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/st_filename |
|
ANSSI-Cible-CC-2024_40en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
|
| pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 2
- ADV_FSP.2: 4
- ADV_FSP.3: 3
- ADV_TDS.1: 4
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR: 1
- ALC_FLR.3: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
|
- FDP:
- FDP_ACC: 25
- FDP_ACC.1: 10
- FDP_ACC.2: 4
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 23
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 4
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 8
- FDP_ETC.2: 2
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 2
- FDP_ETC.2.3: 2
- FDP_ETC.2.4: 2
- FDP_IFC.1: 9
- FDP_ITC.1: 5
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 4
- FDP_ITT.1.1: 1
- FDP_RIP.1: 15
- FDP_RIP.1.1: 1
- FDP_SDI.1: 10
- FDP_SDI.1.1: 1
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 1
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_SOS.2: 4
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 2
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 14
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITC.1: 4
- FPT_ITC.1.1: 1
- FPT_RPL: 10
- FPT_RPL.1: 4
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- A.CDCVM: 5
- A.DE-: 2
- A.DEVICE_AUTH: 1
- A.PERSO: 5
- A.WATCH_USER: 3
- D:
- OE:
- T:
- T.CORRUPT: 5
- T.PHYSICAL: 2
- T.RECOVER: 5
- T.REPLAY: 2
- T.SILENT: 4
- T.SKIMMING: 3
- T.USURP: 5
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS 140-3: 1
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
- out of scope: 2
- pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
|
| pdf_data/st_metadata |
|
- /CreationDate: D:20241015151332Z
- /Creator: Word
- /ModDate: D:20241015161358+01'00'
- /Producer: Adobe Mac PDF Plug-in
- /Title: Microsoft Word - [ST] iPhone15Pro_A17Pro_iOS17_SecurityTarget_v5.0.docx
- pdf_file_size_bytes: 2823175
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
False |
True |
| state/st/download_ok |
False |
True |
| state/st/extract_ok |
False |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |