name |
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 1.04 |
Junos OS 22.2R1 for MX10003 |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
AU |
status |
archived |
active |
not_valid_after |
07.10.2013 |
22.12.2027 |
not_valid_before |
21.02.2005 |
22.12.2022 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0020_it4029_ecvr.pdf |
https://www.commoncriteriaportal.org/files/epfiles/AISEP-CC-CR-2022-EFT-T024-22.2R1_MX10003-CR-V1.0_20231010.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/files/epfiles/Juniper%20Junos%2022.2R1%20for%20MX10003%20%20Security%20Target%20v1.3.pdf |
manufacturer |
Canon Inc. |
Juniper Networks, Inc. |
manufacturer_web |
None |
None |
security_level |
EAL2 |
{} |
dgst |
cb316569ccee2a79 |
34b85005f7f4ed15 |
heuristics/cert_id |
JISEC-CC-CRP-C0020 |
|
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
1.04 |
22.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0020
- certification_date: 01.02.2005
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- description: PRODUCT DESCRIPTION This product is a software program to be installed for use on the Canon iR4570/iR3570/iR2870/iR2270-series multifunction products (hereafter referred to collectively as the “multifunction product”). The multifunction product is an office machine with the combined functionality of copying, sending (Universal Send), fax reception, Mail Box, printing, and so forth. When the copying, sending (Universal Send), fax reception (fax/I-fax reception) or printing function is used, temporary image data is created on the hard drive of the multifunction product. Also, when the Mail Box function is used (for document storage) or the fax reception function is used (for “in-memory reception” of faxes/I-faxes or forwarding of faxes/I-faxes), image data is stored in a specified inbox on the multifunction product. By installing this product, security enhancements are added to the multifunction product, helping counter the threat of disclosure of temporary image data on the hard drive and image data in the inboxes.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.Evaluation Center
- product: Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0020_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0020_est.pdf
- toe_version: Version 1.04
- vendor: Canon Inc.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2005-07', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0020_it4029_01.html'})]
- supplier: Canon Inc.
- toe_japan_name: Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 1.04
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0020_it4029.html
- toe_overseas_name: Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 1.07
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0020_it4029_ecvr.pdf |
AISEP-CC-CR-2022-EFT-T024-22.2R1_MX10003-CR-V1.0_20231010.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0020: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20050223102600+09'00'
- /ModDate: D:20050223102600+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13527
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/st_filename |
|
Juniper Junos 22.2R1 for MX10003 Security Target v1.3.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 3
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 5
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 22
- FCS_COP.1: 10
- FCS_COP.1.1: 3
- FCS_MKA: 2
- FCS_MKA_EXT.1: 5
- FCS_MKA_EXT.1.1: 1
- FCS_MKA_EXT.1.2: 1
- FCS_MKA_EXT.1.3: 1
- FCS_MKA_EXT.1.4: 1
- FCS_MKA_EXT.1.5: 1
- FCS_MKA_EXT.1.6: 1
- FCS_MKA_EXT.1.7: 1
- FCS_MKA_EXT.1.8: 1
- FCS_NTP_EXT.1.4: 2
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 1
- FCS_SSHS_EXT: 2
- FCS_SSHS_EXT.1: 7
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.2.3: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 3
- FIA_UAU: 2
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 2
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 17
- FMT_MOF.1: 3
- FMT_MTD: 13
- FMT_MTD.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.2: 6
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_CAK_EXT.1: 6
- FPT_CAK_EXT.1.1: 1
- FPT_FLS: 3
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_RPL.1: 7
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 1
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 5
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 9
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 6
- FTA_SSL.4: 5
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 7
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 7
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINSTRATOR: 1
- O:
- O.AUTHENTICATION: 2
- O.AUTHORIZED_ADMINIS: 1
- O.AUTHORIZED_ADMINISTRATION: 1
- O.CRYPTOGRAPHIC_FUN: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.PORT_FILTERING: 2
- O.REPLAY_DETECTION: 2
- O.SYSTEM_MONITORING: 2
- O.TSF_INTEGRITY: 2
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 2
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.DATA_INTEGRITY: 1
- T.NETWORK_ACCESS: 1
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- CMAC: 8
- HMAC: 2
- HMAC-SHA-256: 4
- HMAC-SHA-512: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 2
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- KEX:
- Key Exchange: 2
- Key exchange: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 14
- P-384: 12
- P-521: 10
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 3526: 2
- RFC 4251: 2
- RFC 4252: 1
- RFC 4253: 3
- RFC 4254: 1
- RFC 5077: 1
- RFC 5656: 1
- RFC 6668: 1
- RFC3526: 1
- RFC4344: 1
- RFC5656: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 10 1.6.5 Summary of out of scope items: 1
- 10 1.6.5 Summary of out of scope items....................................................................................10 2: 1
- for remote administration; • Serial connection client for local administration. 1.6.5 Summary of out of scope items • Use of telnet, since it violates the Trusted Path requirement set (see Section 5.7.2) • Use: 1
- out of scope: 2
|
pdf_data/st_metadata |
|
- /CreationDate: D:20231011144856+11'00'
- /Creator: Microsoft® Word for Microsoft 365
- /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId: 8a5c636b-017f-4255-b6eb-bbb08b59de35
- /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ContentBits: 2
- /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled: true
- /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Method: Standard
- /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name: 0633b888-ae0d-4341-a75f-06e04137d755
- /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate: 2022-06-28T10:07:57Z
- /MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId: bea78b3c-4cdb-4130-854a-1d193232e5f4
- /ModDate: D:20231011144856+11'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 929909
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0569, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0591, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0564, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0570, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0555, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0563, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0556, http://www.juniper.net/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0571, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0580, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0546, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0572, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0581, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0537, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0547
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |